http://streaming.linux-magazin.de/events/lisa08/talks/

November 9 - 14 from San Diego, CA

LISA '08 - Invited Talks

22nd Large Installation System Administration Conference

 

If you follow the fortunes of large installation IT, tune in on November 12 for a front row ticket to the Invited Talks series of the USENIX LISA conference.

Our Tech Session Package includes a selection of the best invited talks, along with a bonus collection of keynote, refereed, and plenary sessions. If you don't have the time or airfare for a trip to San Diego, join us at your desktop for the USENIX LISA Invited Talks collection. The whole series is yours for only US$ 149 - less than a single night in a downtown hotel.

java

Videos are played directly in your browser by a Java applet. Parallel to this, the presentation slides are shown in sync with the video.
You can use the time slider at the bottom edge of the window to fast forward or reverse the video: the slides will stay in sync.

Tech Sessions Video Archive
Wednesday, November 12

Keynote Address

Implementing Intellipedia Within a "Need to Know" Culture
Speaker: Sean Dennehy, Chief of Intellipedia Development, Directorate of Intelligence, U.S. Central Intelligence Agency

Sean will share the technical and cultural changes underway at the CIA involving the adoption of wikis, blogs, and social bookmarking tools. In 2005, Dr. Calvin Andrus published The Wiki and The Blog: Toward a Complex Adaptive Intelligence Community. Three years later, a vibrant and rapidly growing community has transformed how the CIA aggregates, communicates, and organizes intelligence information. These tools are being used to improve information sharing across the U.S. intelligence community by moving information out of traditional channels.

play video
Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory
Speaker: Mike Patnode, Centrify

If you have a mixed environment, some of these might be on your must-do list: centralizing authentication, access control and policy management in Microsoft AD, using the Group Policy features of Active Directory for Linux management, delivering SSO to your users, and complying with government regulations. How can you pull it all off? We'll discuss the challenges, as well as explore the various options both in the public domain and from commercial providers and discuss their requirements and capabilities. The questions we'll answer include: Why would I want to integrate Linux with Active Directory? What are the issues (e.g., compatibility and maintenance, capabilities, integration, organizational impediments, cost)? What are the choices in terms of technology requirements and components?

play video
How to Proceed When 1000 Call Agents Tell You, "My Computer Is Slow": Creating a User Experience Monitoring System
Speaker: Tobias Oetiker, OETIKER+PARTNER AG

Once users have figured out that their computers are slow, there is an uphill battle to improve the performance and at the same time lose that slowness image. In this talk I will report on the development of a Perl-based system for passive application monitoring for a large Swiss telecom company. The system keeps track of hundreds of different performance metrics. Running on over 1,000 client workstations, several gigabytes of performance data are gathered each week and stored in a central PostgreSQL database. An Ajax-enabled Web application allows users to explore, compare, and investigate performance data. Hear how investigating performance problems has turned from random guesswork into a clearly defined process, based on objective measurements rather than rumors.

play video
Does Your House Have Lions? Controlling for the Risk from Trusted Insiders
Speaker: Marcel Simon, Medco Health Solutions

How do you control for risk from trusted insiders? The nature of the job that system/network/database administrators, application developers, operations center staff, etc., do pretty much requires them to have privileged access to your infrastructure. That very privilege means rogues among such individuals can both do great damage and cover their tracks, so how do you protect your information? This talk proposes a practical, technology-neutral approach to trusted insider controls that adapts readily to your business practices and has proven itself over years of production usage

play video
Thursday, November 13
Reconceptualizing Security
Speaker: Bruce Schneier, Chief Security Technology Officer, BT

Security is both a feeling and a reality. You can feel secure without actually being secure and you can be secure even though you don't feel secure. We tend to discount the feeling in favor of the reality, but they're both important. The divergence between the two explains why we have so much security theater, and why so many smart security solutions go unimplemented. Several different fields—behavioral economics, the psychology of decision-making, evolutionary biology—shed light on how we perceive security, risk, and cost. It's only when the feeling and the reality of security converge that we have real security.

play video
Session: Virtualization
Session Chair: Chris McEniry, Sony Computer Entertainment America
Storm: Weathering Network and Electrical Surges Using Virtualization
Speaker: Mark Dehus and Dirk Grunwald, University of Colorado
IZO: Applications of Large-Window Compression to Virtual Machine Management
Speaker: Mark A. Smith, Jan Pieper, Daniel Gruhl, and Lucas Villa Real, IBM Almaden Research Center
Portable Desktop Applications Based on P2P Transportation and Virtualization
Speaker: Youhui Zhang, Xiaoling Wang, and Hong Liang, Tsinghua University
play video
Session: On the Wire
Session Chair: Brent Hoon Kang, University of North Carolina at Charlotte
Topnet: A Network-aware top(1)
Speaker: Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos, Institute of Computer Science, Foundation for Research and Technology (ICI-FORTH), Hellas, Greece
Fast Packet Classification for Snort
Speaker: Alok Tongaonkar, Sreenaath Vasudevan, and R. Sekar, Stony Brook University
play video
WTFM: Documentation and the System Administrator
Speaker: Janice Gelb, Sun Microsystems

Most system administrators fear and hate documentation, both writing and reading it. This presentation attempts to alleviate that frustration by explaining why system administration documentation is important, showing how to resolve common documentation problem areas using real-world examples, and describing how to improve product documentation from your company and from companies that make products that you use.

play video
Friday, November 14
The State of Electronic Voting, 2008
Speaker: David Wagner, University of California, Berkeley

As electronic voting has seen a surge in growth in the U.S. in recent years, controversy has swirled. Are these systems trustworthy? Can we rely upon them to count our votes? In this talk, I will discuss what is known and what isn't. I will survey some of the most important developments and analyses of voting systems, including the groundbreaking top-to-bottom review commissioned by California Secretary of State Debra Bowen last year. I will take stock of where we stand today, the outlook for the future, and the role that technologists can play in improving elections.

play video
Deterministic System Administration
Speaker: Andrew Hume, AT&T Labs-Research

The vision is clear and seductive: take a modest-sized specification of a computing environment and automatically derive all the stuff you actually need, from DHCP configurations to ordering cables. Is it possible to account for every box, every cable, every RAID box, every volume mounted, every OS deployed? I describe an attempt to do so, fighting the forces of Chaos and Nature, armed only with logical positivism, Ruby, little languages, and sarcasm.

play video
System Administration and the Economics of Plenty
Speaker: Tom Limoncelli, Google NYC

Over the years IT resources (disk space, CPU, bandwidth) have gone from being scarce to being nearly infinitely plentiful. Why do our IT policies still reflect the days of scarcity? Seeing the world in terms of "the economics of plenty" brings about a paradigm shift that changes the way we treat our users, manage our systems, and take care of ourselves. Tom will discuss how this change in thinking can improve IT policies and practices and will present his thoughts on why the open source movement depends on this paradigm shift.


Reply via email to