Path: gmdzi!unido!mcsun!uunet!usenix!carolyn
From: caro...@usenix.ORG (Carolyn Carr)
Newsgroups: comp.org.usenix
Subject: The Fifth Annual USENIX Large Installation Systems Administration Conference
Keywords: USENIX Association
Message-ID: <893@usenix.ORG>
Date: 18 Sep 91 01:27:43 GMT
Organization: Usenix Association Office, Berkeley
Lines: 596
The Fifth Annual
Large Installation Systems Administration Conference
September 30 - October 3, 1991
San Diego, California
********************************
Sponsored by the USENIX Association
The USENIX Association is pleased to announce the 5th Large Installation
Systems Administration (LISA) Conference to be held at the San Diego
Hilton Beach & Tennis Resort in San Diego, CA on September 30 - October
3, 1991.
The LISA conferences address topics of interest to people administering
large UNIX sites. Previously, attempts have been made to define "large"
in terms of number of machines, gigabytes of disk, or number of users.
We feel that it is more fruitful to define a large installation as one
that has problems that cannot be solved by simply scaling up current
well-understood solutions used on single machines with few users. Such
problems may be caused by factors other than sheer numbers, including
integration of UNIX and non-UNIX machines into a single network.
************
To receive information on registration and hotels, please contact:
USENIX Conference Office
22672 Lambert St., Suite 613
El Toro, CA 92630
Telephone # (714) 588-8649
FAX # (714) 588-9706
email address: j...@usenix.org
************
IMPORTANT CONFERENCE DATES & SCHEDULE OF EVENTS
SUNDAY, SEPTEMBER 29
6pm - 9pm Opening Registration and No Host Reception
MONDAY, SEPTEMBER 30
9am - 5pm Tutorial: Topics in Large Installation
Systems Administration
TUESDAY, OCTOBER 1
9am - 4:30pm Technical Sessions
5:30pm - 7:30pm Conference Reception
7:30pm - 9:30pm Birds of a Feather Sessions
WEDNESDAY, OCTOBER 2
9am - 5pm Technical Sessions
6pm - 10pm Birds of a Feather Sessions & Vendor
Displays
THURSDAY, OCTOBER 3
9am - 5pm Technical Sessions
BIRDS OF A FEATHER SESSIONS and TABLE TOP VENDOR DISPLAYS
Birds of a Feather Sessions will be held in the evening to
allow attendees to meet and discuss topics of interest to them in a
less formal format. Because this year's conference will include more
small group interactions during the day, we would particularly like to
encourage Birds of a Feather Sessions on topics that would not normally
be discussed during typical USENIX technical presentations (for
instance, discussions of specific vendor products.) To schedule a Birds
of a Feather Session, or request more information, please contact Lee
Damon (address information below).
Vendor Displays - If enough interest is shown, the LISA conference will
offer vendors a chance to show their wares to the approximately 300
professional UNIX systems administrators expected to attend. Not only
are these conference attendees technically astute, most of them have
significant input into purchasing decisions made by their institutions.
PLEASE NOTE: The conference facilities limit the demonstration to one
evening, with one six-foot draped table for each exhibitor. Vendor
displays will be at no charge.
To make arrangements to schedule a Birds of a Feather Session OR Vendor
Display, contact:
Lee Damon
n...@watson.ibm.com
IBM TJ Watson Research Center
Taconic and Hwy 134
Yorktown Heights, NY 10598
(914) 945-2137
PROGRAM COMMITTEE
Elizabeth Zwicky, Chair SRI International
Steve Romig The Ohio State University
Bjorn Satdeva /sys/admin, inc.
Steve Simmons Industrial Technology
Institute
Pat Wilson Dartmouth College
TUTORIAL PROGRAM - Monday, September 30, 1991 - 9am - 5pm
The tutorial sessions for this year's LISA conference will be trying a
new approach to USENIX tutorial instruction. There will be three
tutorial sessions running simultaneously. Tutorial attendees will be
able to switch between their choice of sessions (on a space available
basis) as often as they like mixing and matching as they wish. All
tutorial attendees will receive copies of the presentation materials
for all of the tutorial sessions, so even if there is a conflict for
the sessions they wish to view, the materials will be available for
later review.
SLIP
Full IP connectivity is now possible for machines at remote sites
(including your house) across dialup modems via SLIP. This discussion
covers the SLIP problem space, how SLIP works, how to install and test
it, and what equipment is needed to run it efficiently. Brief mention
is made of the new PPP protocol. New for 1991-92.
New Modems
Low cost digital signal processors have brought inexpensive high-speed
modems (9600 baud and above) to reality. Learn what to look for when
purchasing a high performance modem, how to configure them, how to
install them, and how to troubleshoot modem problems. New for 1991-92.
Routers, Bridges, and Gateways
As network interconnects become more and more important, the advantages
and tradeoffs to installing dedicated routers (and bridges) must be
studied. We'll discuss the products, those trade-offs, performance
expectations, and how to choose the packet shuffling equipment which
best fits the needs of your site. New for 1991-92.
IDA Sendmail
IDA Sendmail is a net-supported, rapidly evolving version of sendmail
originally based on 4.3 BSD sendmail. It gives the administrator the
flexibility of direct access to dbm files (among other things) and
comes ready to install "as is" on almost any system. You may want to
consider IDA Sendmail as the "total sendmail solution" for your site.
This talk covers the IDA sendmail specifics -- not the general problem
of configuring sendmail for your site. New for 1991-92.
X Terminals
Should you buy workstations when you can by X Terminals? Discover the
world of inexpensive network workstations, their performance from a
user's point of view, and their performance with respect to your
network. New for 1991-92.
C News & NNTP
With over a million people now reading and posting to USENET news,
managing a news hub has become a complicated and time consuming system
administration chore. This track will present a comprehensive overview
of the C News system including installation, maintenance, and
troubleshooting. This section will also include an introduction to
the Network News Transfer Protocol (NNTP), and a look at some NNTP news
reading programs. New for 1991-92.
Source Tree Management
Dealing with large source trees with several simultaneous developers
is a major problem in software development and CASE. This session
describes the problem, issues, and methodologies behind its solution.
It includes overviews of RCS and SCCS in addition to in-depth
discussion of the CVS (public domain and free) source code management
system. New for 1991-92.
Patch
Patch is a marvelous program that enables simple, distributed updating
of remote source code. This brief session tells you everything you
need to know to automate your patch distributions.
PERL
PERL is a new interpreted language ideally suited to system
administration. Its syntax includes all the best parts of C, awk, sed,
and shell programming. This tutorial leverages your knowledge of C
programming to get you up-to-speed in this vibrant new programming
paradigm.
Configuring Sendmail
This session will concentrate on modifying, programming, and debugging
sendmail configuration files. Not only will syntax and semantics be
covered but also test and verification techniques. The extended time
will allow examination of several exemplary pieces of configuration
files and a complete explication of testing and verifying sendmail
configuration files including a verification suite.
Ethics
Dealing with large user communities leads to new problems in data
collection, software licensing, security, and ethics. This session
will discuss scenarios and techniques that can be applied by system
managers systems to insure happy, healthy, ethical user communities.
Operations
Setting up your machine room and performing day-to-day activities can
be painful tasks without a certain organization. This session presents
hints and helps that will ease your daily operations.
COPS
A collection of tools which can be used to verify security on UNIX
machines, COPS is available in the public domain. This session will
cover basic UNIX security ideas, what COPS checks for, and what its
output really means to you.
Syslog
Writing your programs so that they exploit the network-oriented
logging protocol can greatly ease debugging and site maintenance.
This session discusses the syslog system and how to use it.
New for 1991-92.
NTP
Is network time synchronization important to you? It is if your site
uses NFS and utilities like make(1). More accurate and more reliable
than traditional timed(8), NTP is available for most popular machines.
Here we'll discuss what it is, how to install it, and how to configure
it.
Automounters & AMD
Using automounters can dramatically decrease the time you spend
maintaining your distributed file system tables. Additionally,
automounters reduce users' dependencies on servers' reliability.
This session explains the theory and operation of automounters
(including both Sun's automounter and the public domain AMD). New
for 1991-92.
Disaster Recovery
Natural disasters or malicious action can wipe out a site. This
session details the kinds of disasters which can strike your site,
how to prepare for them, and how to recover when a disaster strikes you.
This session covers a wide range of installation sizes (from a single-
system operation through a multi-thousand-node networked site),
operation types (including academic, research, corporate, and
government), and platforms (such as personal computers, UNIX
workstations, shared computing resources, LANs and WANs, internetworks,
etc.), concentrating on networked UNIX workstations. New for 1991-92.
The Instructors
Brent Chapman is a consultant in the San Francisco Bay Area,
specializing in the configuration, operation, and networking of UNIX
systems. During the last several years, he has been an operations
manager for a financial services company, a corporate research lab,
a software engineering company, and a hardware engineering company.
He holds a B.S. in Electrical Engineering and Computer Science from
the University of California, Berkeley.
Tom Christiansen is a software development engineer at CONVEX Computer
Corporation in Richardson, Texas, where he designs software tools to
streamline software development and systems administration and to
improve overall UNIX system security. Most of these tools are written
in PERL. Tom holds a M.S. in Computer Science from the University of
Wisconsin.
Trent Hein, a card-carrying member of the Colorado System Administration
mafia, is a consultant with XOR Computer Systems, a Colorado based firm
specializing in network engineering and system administration. In the
past, he spent a summer with CSRG at Berkeley and many years in the
system administration trenches at the University of Colorado. Trent
has taught a number of tutorials at past USENIX conferences, and holds
a B.S. in Computer Science.
Dr. Rob Kolstad is Staff Engineer at Sun Microsystems at the Rocky
Mountain Technology Center in Colorado Springs, Colorado. He recently
led development of Sun's new Backup Copilot product. Rob is secretary
of the USENIX Board of Directors and sponsored the first USENIX System
Administrators Workshop.
Herb Morreale is a consultant with XOR Computer Systems, a Colorado
based firm specializing in network engineering and system
administration. Herb writes nifty network monitoring tools and spends
much of his day managing Colorado's largest news hub. Herb holds a B.S.
in Computer Science from the University of Colorado.
Dr. Evi Nemeth spent last year at Dartmouth College on leave from the
University of Colorado at Boulder where she is on the Computer Science
faculty. She is co-author of a book on system administration: The
Unix System Administration Handbook, published by Prentice Hall and a
well-known authority on system administration.
Jeff Polk is the system administrator at Sun's Rocky Mountain
Technology Center in Colorado Springs. He presented the Fast Dump
paper at the Dallas USENIX in 1988 and holds a B.S. in computer science
from the University of Colorado at Colorado Springs.
TENTATIVE TECHNICAL PROGRAM - OCTOBER 1 - 3, 1991
TUESDAY, OCTOBER 1
9:00 - 10:00 KEYNOTE ADDRESS:
Standards Efforts for System Administration
Martin Kirk, X/Open Company Ltd.
Currently, Mr. Kirk chairs the Systems Administration
Standards Committees for both X/Open and IEEE POSIX.
10:00 - 10:30 Break
10:30 - 12:00 SIMILAR BUT DIFFERENT
Managing Program Binaries in a Heterogeneous UNIX
Network
Paul Anderson, University of Edinburgh
If You've Seen One UNIX, You've Seen Them All
Bob Arnold, ASK/Ingres Product Division
Software Maintenance in a Campus Environment: The
Xhier Approach
Math Faculty Computing Facility, University of Waterloo
Integrating UNIX Within a Microcomputer-Oriented
Development Environment
P. J. Bumbulis, D. D. Cowan, Eric Giguere and T. M.
Stepien, University of Waterloo
12:00 - 1:30 Lunch
1:30 - 2:30 PANEL DISCUSSION: What is System Administration?
2:30 - 3:00 Break
3:00 - 4:30 MAIL AND RESOURCE ACCOUNTING
The Design and Implementation of a Multihub Electronic
Mail Environment
Nichlos H. Cuccia, Computer Sciences Corporation
A sendmail.cf Scheme for a Large Network
Tina M. Darmohray, Lawrence Livermore National
Laboratory
Share II; A User Administration and Resource Control
System for UNIX
Andrew Bettison, Neil Russell, Chris Maltby, Softway
Pty Ltd.
System Resource Usage Accounting on UNIX Systems at
University of Rochester
John Simonson, University of Rochester
WEDNESDAY, OCTOBER 2
9:00 - 10:30 BACKUPS I
Sequencing Site-Wide Backups
Rob Kolstad, Sun Microsystems
Issues in On-line Backup
Steve Shumway, SunSoft
A Database for UNIX Backup
Jim Engquist, Sunsoft
A Distributed Operator Interaction System
Steve Shumway, SunSoft
10:30 - 11:00 Break
11:00 - 12:00 PANEL DISCUSSION: The IEEE POSIX 1003.7 System
Administration Standard
12:00 - 1:30 Lunch
1:30 - 3:00 TOOLS
A Flexible File System Cleanup Utility
J Greely, The Ohio State University
Fdist: A Domain-Based File Distribution System for
Heterogeneous Environment
Bjorn Satdeva, /sys/admin, inc., Paul M. Moriarty, MIPS
Computer Systems
Link Globally, Act Locally
Arch Mott, MIPS Computer Systems
Fair Share Scheduling on a Compute Power Server Cluster
Carla Moruzzi, Greg Rose, IBM
Reporter: New Capabilities for the On-line Manual
System
Carl Shipley, Jet Propulsion Laboratory
3:00 - 3:30 Break
3:30 - 5:00 DEALING WITH USERS
Modules: Providing a Flexible User Environment
John L. Furlani, Sun Microsystems
Configurable User Documentation, or How I Came to Write
a Language with a Future Conditional
Mark A. Verber, The Ohio State University
Elizabeth D. Zwicky, SRI International
We Have Met the Enemy; An Informal Survey of Policy
Practices in the Internetworked Community
Bud Hovell, MTEK International
Bjorn Satdeva, /sys/admin, inc.
Enhancing Your Apparent Psychic Abilities Through
Software
Elizabeth D. Zwicky, SRI International
THURSDAY, OCTOBER 3
9:00 - 10:30 WORKS IN PROGRESS
10:30 - 11:00 Break
11:00 - 12:00 BACKUPS II
Engineering a Commercial Backup Program
Jeff Polk and Rob Kolstad, Sun Microsystems
Torture-testing Backup Programs
Elizabeth D. Zwicky, SRI International
Backups Without Tapes
Liza Y. Weissler, The RAND Corporation
12:00 - 1:30 Lunch
1:30 - 3:00 KEEPING TRACK
Automatic File System Auditing
Edward R. Arnold, National Center for Atmospheric
Research
Hobgoblin: A File System Consistency Checker
Scott Leadley, Kenneth Rich, Mark Sirota, University
of Rochester
Monitoring Activity on a Large UNIX Network with
Perl and syslogd
Carl Shipley, Chingyow Wang, Jet Propulsion Laboratory
SCRAPE - System Configuration, Resource and Process
Exception Monitor
Rich Kint, University of Washington
3:00 - 3:30 Break
3:30 - 5:00 MISCELLANEOUS
Packet Filtering in an IP Router
Bruce Corbridge, Robert Henig, Charles Slater, Telebit
Corporation
Cloning Custom Hosts
George M. Jones and Steven M. Romig, The Ohio Stat
University
Staying Small in a Large Installation
Edward Wang, University of California, Berkeley
Some Useful Changes for RC Files
Steven M. Romig, The Ohio State University
Host Aliases and Symbolic Links, or How to Hide the
Servers' Real Names
John F. Detke, Octel
Redundant Printer Configuration
Steven C. Simmons, Industrial Technology Institute
OTHER ATTRACTIONS:
There will be a horror story contest; bring your horror
stories with you, or mail them to the program chair (zwi...@erg.sri.com)
The contest results will be announced at the reception.
There will be an alternate track concurrent with the technical sessions,
which will include discussion groups on various topics, and other
interactive sessions. Topics of the discussion groups will include
user training, central archive systems for very large amounts of data,
talking to management, and more. Tom Christiansen will be hosting a
workshop where old scripts are rewritten in Perl on the spot; be sure
to bring one with you.
CONFERENCE REGISTRATION INFORMATION
Register in advance to receive the lowest registration rates.
Attendance is limited in the Tutorial program and pre-registration is
strongly recommended. You may register for only the tutorial program,
only the three-day technical sessions program or both programs.
TUTORIAL REGISTRATION FEE
(All-day tutorial - September 30) - Box lunch included $245.00
TECHNICAL SESSIONS REGISTRATION FEE (October 1 - 3)
Current USENIX Association Member Fee $225.00
Non-member Fee* $275.00
Student Fee - (Must provide copy of Student I.D.)$75.00
*You may designate $50 of your non-member fee to be applied as dues
in full for a one-year individual membership in the USENIX Association.
REGISTRATION FEES AT THE CONFERENCE WILL BE $50 HIGHER!
Full-time students please note: A limited number of scholarships are
available for full-time students. Contact the Conference Office for
details.
Please complete and return the enclosed registration form with your
payment. You may pay by check (MAKE CHECK PAYABLE TO USENIX
CONFERENCE), or use your VISA, MasterCard or American Express charge
card. PAYMENT MUST accompany registration form. Purchase orders and
vouchers are not accepted. Note: You may FAX your registration if
paying by VISA, MasterCard or American Express!
REFUND CANCELLATION POLICY: If you must cancel all refund requests
must be in writing and postmarked no later than September 23, 1991.
Direct your letter to the USENIX Conference Office.
CONFERENCE PROCEEDINGS: One copy of the proceedings is included
with your technical sessions registration fee. Additional copies may
be purchased at the Conference or ordered from the USENIX Association
Executive Office - Telephone (415) 528-8649.
HOTEL INFORMATION
The Conference will be held at:
San Diego Hilton Beach & Tennis Resort ROOM RATES
1775 East Mission Bay Drive $98 Single or Double Occupancy
San Diego, California 92109 (Plus State & local taxes,
Telephone (619) 276-4010 currently 9%)
The San Diego Hilton Beach & Tennis Resort is situated on the bay in
Mission Bay Park. The hotel has a health & tennis club, offers
sailboat, catamaran, wind-surfboard, Aqua Cycle and bicycle rentals.
TO MAKE YOUR HOTEL RESERVATION....
Call the hotel directly and ask for the Reservation Desk. To take
advantage of our group rate, tell reservations that you are a USENIX
Conference attendee.
IMPORTANT! Room reservation deadline WAS September 4, 1991.
Requests for reservations received after the deadline will be
handled on a space available basis.
POINTS OF INTEREST:
The Mission Bay area of San Diego includes 4,600 acres of beaches and
islands, with 32 miles of shoreline. Just a few of the many
attractions that San Diego has to offer include: The San Diego Zoo,
Balboa Park with 1,400 acres of park and museums, tours of bays and
naval ships, Old Town Historical Park and Sea World. In addition, San
Diego borders Mexico at Tijuana.
AIRPORT TO HOTEL TRANSPORTATION
Lindbergh Field (International Airport) is located 15 minutes from the
hotel. Free Hotel shuttle service is available. Just go to the
baggage claim area, pick up the telephone at the Hotel Information
Board and dial the designated number for the San Diego Hilton Beach &
Tennis Resort. Taxi service is available at an approximate cost of
$10.00 one way.
FOR FURTHER CONFERENCE INFORMATION, PLEASE CONTACT:
USENIX Conference Office
22672 Lambert St.
Suite 613
El Toro, CA 92630
Telephone (714) 588-8649
FAX (714) 588-9706
Electronic Mail Address: j...@usenix.org
Office Hours: 8:30am - 5:00pm Pacific Time
Path: gmdzi!unido!mcsun!uunet!usenix!toni
From: t...@usenix.ORG (Toni Veglia)
Newsgroups: comp.org.usenix
Subject: LISA V Conference Proceedings Now Available
Message-ID: <906@usenix.ORG>
Date: 4 Oct 91 19:24:56 GMT
Reply-To: t...@usenix.UUCP (Toni Veglia)
Organization: USENIX Association, Berkeley, CA
Lines: 178
If you couldn't join us in San Diego, the proceedings from the
Fifth Large Installation Systems Administration Conference are now
available for $20 for USENIX members, and $23 for non-members. This
price includes postage for domestic and Canadian orders; please add
$11 for overseas postage (air printed matter).
You can order the proceedings by phone or email by using a VISA
or Mastercard (please include the expiration date), or you can mail
a check or company purchase order to our office.
USENIX Association
2560 Ninth Street, Suite 215
Berkeley, CA 94710
phone 510/528-8649
fax 510/548-5738
off...@usenix.org
The USENIX Association Staff
*********************************************************************
The Fifth Annual
Large Installation Systems Administration Conference
September 30 - October 3, 1991
San Diego, California
TABLE OF CONTENTS
SIMILAR BUT DIFFERENT
Managing Program Binaries In a Heterogeneous UNIX Network
Paul Anderson, University of Edinburgh
If You've Seen One UNIX, You've Seen Them All
Bob Arnold, ASK/Ingres Product Division
Software Maintenance in a Campus Environment: The Xhier Approach
John Sellens, Math Faculty Computing Facility, University of
Waterloo
Integrating UNIX Within a Microcomputer-Oriented Development
Environment
Peter Bumbulis, Donald Cowan, Eric Gigure, Terry Stepien,
University of Waterloo
MAIL AND RESOURCE ACCOUNTING
The Design and Implementation of a Multihub Electronic Mail
Environment
Nichlos H. Cuccia, Computer Sciences Corporation
A sendmail.cf Scheme for a Large Network
Tina M. Darmohray, Lawrence Livermore National Laboratory
SHARE II - A User Administration and Resource Control System for
UNIX
Andrew Bettison, Andrew Gollan, Chris Maltby, Neil Russell,
Softway Pty Ltd
System Resource Accounting on UNIX Systems
John Simonson, University of Rochester Computing Center
BACKUPS, I
A Next Step in Backup and Restore Technology
Rob Kolstad, SunSoft, Inc.
Issues in On-line Backup
Steve Shumway, SunSoft, Inc.
A Database for UNIX Backup
Jim Engquist, SunSoft, Inc.
A Distributed Operator Interaction System
Steve Shumway, SunSoft, Inc.
TOOLS
A Flexible File System Cleanup Utility
J Greely, The Ohio State University
Fdist: A Domain Based File Distribution System for a Heterogeneous
Environment
Bjorn Satdeva, /sys/admin, inc.; Paul M. Moriarty, MIPS
Computer Systems, Inc.
Link Globally, Act Locally: A Centrally Maintained Database of
Symlinks
Arch Mott, MIPS Computer Systems, Inc.
Watson Share Scheduler
Carla Moruzzi & Greg Rose, IBM T. J. Watson Research Center
Adding Additional Database Features to the Man System
Carl Shipley, Jet Propulsion Laboratory, California Institute
of Technology
DEALING WITH USERS
Modules: Providing a Flexible User Environment
John L. Furlani, Sun Microsystems, Inc.
Configurable User Documentation -or- How I Came to Write a Language
with a Future Conditional
Mark A. Verber, The Ohio State University; Elizabeth D. Zwicky,
SRI International
We Have Met the Enemy, An Informal Survey of Policy Practices in the
Internetworked Community
Bud Howell, MTEK International, Inc.; Bjorn Satdeva,
/sys/admin, inc.
Enhancing Your Apparent Psychic Abilities Through Software
Elizabeth D. Zwicky, SRI International
BACKUPS, II
Engineering a Commercial Backup Program
Jeff Polk & Rob Kolstad, SunSoft, Inc.
Torture-testing Backup and Archive Programs: Things You Ought to
Know But Probably Would Rather Not
Elizabeth D. Zwicky, SRI International
Backups Without Tapes
Liza Y. Weissler, The RAND Corporation
KEEPING TRACK
Configuration Control and Management
Ed Arnold & Craig Ruff, National Center for Atmospheric
Research
hobgoblin: A File and Directory Auditor
Kenneth Rich & Scott Leadley, University of Rochester
Monitoring Activity on a Large Unix Network with perl and Syslogd
Carl Shipley & Chingyow Wang, Jet Propulsion Laboratory,
California Institute of Technology
SCRAPE (System Configuration, Resource And Process Exception)
Monitor
Richard W. Kint, College of Engineering, University of
Washington
MISCELLANEOUS
Packet Filtering in an IP Router
Bruce Corbridge, Robert Henig, Charles Slater, Telebit
Corporation
Cloning Customized Hosts (or Customizing Cloned Hosts)
George M. Jones & Steven M. Romig, The Ohio State University
Staying Small in a Large Installation: Autonomy and Reliability
(And a Cute Hack)
Edward Wang, University of California, Berkeley
Some Useful Changes for Boot RC Files
Steven M. Romig, The Ohio State University
Host Aliases and Symbolic Links -or- How to Hide the Servers' Real
Name
John F. Detke, Octel Communications Corporation
Redundant Printer Configuration
Steven C. Simmons, Industrial Technology Institute
|