Path: gmd.de!xlink.net!howland.reston.ans.net!pipex!uunet!not-for-mail
From: t...@usenix.UUCP (Toni Veglia)
Newsgroups: comp.org.usenix,comp.org.sug,comp.unix.admin,comp.unix.large,
comp.sys.sun.announce,comp.os.misc
Subject: 7th USENIX Systems Administration Conference (LISA VII)
Date: 8 Oct 1993 17:28:10 -0400
Organization: USENIX Association, Berkeley, CA
Lines: 1059
Sender: z...@ftp.UU.NET
Approved: z...@uunet.UU.NET
Distribution: world
Message-ID: <294m1aINNmdk@ftp.UU.NET>
Reply-To: usenix!t...@uunet.UU.NET ()
NNTP-Posting-Host: ftp.uu.net

ATTENTION: Please note that the Monterey Marriott Hotel is booked.
Read the "Hotel" section of this posting for more information.

           7th USENIX SYSTEM ADMINISTRATION CONFERENCE
          Sponsored by the USENIX Association and SAGE
                      November 1 - 5, 1993
                       Monterey, California

The USENIX Association and its special technical group, SAGE, in-
vite  you  to participate in the 7th annual System Administration
Conference.  This conference provides  a  forum  exclusively  for
System  Administrators,  System  Managers and Network Managers to
meet and share new ideas and experiences.  Its scope will include
system and network administration for sites of all sizes and con-
figurations.

This technical conference will consist of  a  two-day,  intensive
and  practical  tutorial  program designed for novice through ex-
perienced system  administrators  -   followed  by  a  three-day,
triple-track,  solution-oriented  technical sessions program.  An
informal table-top vendor display will also be held demonstrating
products  and  services  useful to system and network administra-
tors.

IMPORTANT DATES TO REMEMBER

PRE-REGISTRATION DEADLINE:  October 13, 1993
HOTEL RESERVATION DEADLINE:   October  11, 1993


Day-time meetings will be held at the Monterey Conference Center
All evening activities will be held at the Monterey Marriott

SUNDAY, OCTOBER 31
6:00pm -  9:00pm        Conference Registration and Opening Reception

MONDAY, NOVEMBER 1

9:00am -  5:00pm       Triple-Track System Administration
		       Tutorial Program
TUESDAY, NOVEMBER 2
9:00am -  5:00pm        Triple-Track Systems Administration
			Tutorial Program
6:00pm - 10:00pm        Birds-of-a-Feather Sessions

WEDNESDAY, NOVEMBER 3
8:30am -   5:00pm       Triple -Track Technical Sessions
6:00pm - 10:00pm        Birds-of-a-Feather Sessions
5:00pm - 10:00pm        Table Top Vendor Display

THURSDAY, NOVEMBER 4
8:30am -  5:00pm        Triple -Track Technical Sessions
6:00pm -  8:00pm        Birds-of-a-Feather Sessions
8:00pm - 10:00pm        Conference Reception -Monterey Aquarium

FRIDAY, NOVEMBER 5
8:30am - 5:00pm Triple -Track Technical Sessions

TERMINAL ROOM

Once again this year a Terminal Room will be available to  atten-
dees  of the System Administration Conference.  The Terminal Room
will be located in the Santa Monica/San Diego rooms at  the  Mon-
terey Marriott.  Services available at the Terminal Room will in-
clude Internet Access, Dial-Out  Access,  facilities  for  making
copies  of  miscellaneous GNU and public domain software, and the
ever popular FaceSaver.  Conference Attendee Message  Service  We
will  also  be  providing  electronic  mail  messaging service to
conference attendees from Monday, November 1 through noon Friday,
November  5.   Electronic  mail  messages to conference attendees
should be addressed: first_lastn...@conference.usenix.org.

BIRDS-OF-FEATHER SESSIONS

Birds-of-a-Feather Sessions (BOFs) allow attendees  to  meet  and
discuss topics of interest to them.  BOF Sessions are intended to
be highly interactive and much less  formal  than  the  Technical
Sessions.   Birds-Of-A-Feather  sessions  will  be  held Tuesday,
Wednesday and Thursday evenings in the Marriott Hotel.  We  would
particularly like to encourage Birds of a Feather sessions on to-
pics which would not normally be discussed during typical  USENIX
technical presentations (for instance, discussions on profession-
al and technical issues,  non-professional  interests  common  to
Systems  Administrators, etc.).  To schedule a BOF Session, or to
request more information, please telephone the USENIX  Conference
Office  at  (714)  588-8649  or  e-mail to confere...@usenix.org.
BOFs may also be scheduled on-site at the conference registration
desk.

VENDOR DISPLAY

Wednesday, November 3 - 5:00pm - 10:00pm - Marriott Hotel
An informal table-top vendor display will feature well-informed vendor
representatives demonstrating products  and  services  useful  to
system  administration and network management.  Among the 30 com-
panies showing their products and services, you will find:
        - AIM Technology                 - ANDATACO
        - Auspex Systems                 - Breakaway Software
        - CD Publishing Corp.            - ClariNet Communications Corp.
        - Comtec Automated Solutions     - Delta Microsystems
        - DEC Athena Engineering         - Network Appliance
        -  Network Computing Devices     - Network Wizards
	- O'Reilly & Associates, Inc.    - OPENService SJI Inc.
        - Patrol Software		 - Prentice Hall
	- Qualix Group                   - /sys/admin, inc
        - Tivoli Systems.                - Workstation Solutions

If you would like free admission to the Vendor Display, please contact:
Cynthia Deno, Exhibit Coordinator
Telephone (408) 335-9445
FAX (408) 335-2163
Email:  cynt...@usenix.org

CONFERENCE PROCEEDINGS:   One copy of the proceedings is included
with your technical sessions registration fee.  Additional copies
may be purchased at the Conference or ordered from the USENIX As-
sociation  Executive  Office  - Telephone  (510) 528-8649, email:
off...@usenix.org.

CONFERENCE RECEPTION - Thursday, November 4, 1993 (8 - 10pm) 
Monterey Bay Aquarium  -  All the  wonders  of  a  hidden world
come to light at the internationally acclaimed Monterey Bay
Aquarium.  You'll get a fish-eye view of Monterey  Bay  and  meet
more  than  6,000 of its most colorful inhabitants.  Desserts and
beverages will be served.  Your invitation to this  reception  is
included  in the technical sessions registration fee.  Additional
reception tickets will be available for purchase at  the  confer-
ence.

THE GURU IS IN
Have a question that's been bothering you?   Can't find  the 
answer?   Try  asking a USENIX guru!  Experts from the USENIX
community will be available to answer your questions, each
in  their  own  areas  of expertise.  The schedule, including the
names of the volunteer gurus and their areas of  expertise,  will
be  posted  at  the conference.  Email suggestions for this track
should be directed to:  b...@sysadmin.com.

HOTEL INFORMATION: The Monterey Marriott will be the  headquarters
for the Conference. The hotel is conveniently connected by a foot
bridge to the Monterey Conference Center which will be the  loca-
tion of all day-time meetings.   Enjoy the picturesque waterfront
atmosphere of the Monterey Peninsula.  The hotel is within  walk-
ing distance of the Monterey Aquarium, Fisherman's Wharf, Cannery
Row and many fine restaurants.

************************************
!!!!!!ATTENTION LISA ATTENDEES!!!!!!
************************************

We are SOLD OUT at the Monterey Marriott.  We have contracted
additional rooms at the Doubletree at Fisherman's Wharf.  This
hotel is actually attached to the Monterey Conference Center and
is a very nice property.  Our hotel rates at the Doubletree will be 
be the same as Marriott offered.

Just telephone the Doubletree and ask for reservations.  Be sure to
tell reservations that you will be attending the USENIX meeting to
receive the discounted hotel rate.  A major credit card will be
required to guarantee your hotel room.

HOTEL ADDRESS:
	Doubletree at Fisherman's Wharf
	Two Portola Plaza
	Monterey, CA
	Telephone # 408-649-4511

RATES:  $95/night for a Single or Double Room

***************************************

GETTING TO MONTEREY: Special airline discounts will  be  available
for  attendees traveling by United Airlines to the USENIX Confer-
ence.  It is suggested that you fly into  either  the  San  Fran-
cisco,  San  Jose  or Oakland airports, then transfer to a flight
into the  Monterey  Peninsula  Airport. 

			Using  United  Airlines:

         5%  off any applicable fare (including Supersavers)*
				or
        10% off the unrestricted full coach fare

*To qualify for the very lowest Supersaver fare, a Saturday night
stay is required in Monterey.

These airfare discounts are  available  only  through  JNR,  Inc.
Telephone:  1 (714) 476-2788        
Tollfree:   1 (800) 343-4546 (USA)

The Monterey Peninsula Airport is located just  four  miles  from
the  Marriott.   Taxi service is available at an approximate cost
of $8 - 9 one way.

POINTS OF INTEREST:
- Maritime Museum of Monterey and Stanton Center:  Located adjacent to
Fisherman's Wharf, the museum features priceless maritime and related
artifacts that provide a fascinating look into Monterey's long
relationship with the sea.  The focal point of the Museum is the
16 foot tall, intricately crafted First Order Fresnel Lens that
once sat atop the Point Sur Lighthouse.

- Monterey Bay Aquarium:   A must see!  This internationally acclaimed
aquarium is located in the old Hovden Cannery Row.  The towering
three-story kelp forest is the only one of its kind in an indoor
aquarium.  Other exhibits such as the Great Tide Pool, and the Sandy
Shore Aviary also highlight the vital role Monterey Bay plays in the
ecological scheme.  In addition, the popular sea otter exhibit is back
after renovations, sporting a larger area and a new look.  Enjoy two
levels of viewing windows that will put you nose-to-nose with the
Otters - above and below the surface.

- Pebble Beach Famous 17-Mile Drive:  This loop between Carmel,
Monterey and Pacific Grove combines the elegance of resorts and private
homes with the austere beauty of the Del Monte Forest, mountains and
untamed sea.  Pay a small gate fee to see Lone Cypress, Pebble Beach
Golf Links, and the Restless Sea.

- Fisherman's Wharf and Cannery Row:  Fisherman's Wharf is home to
eleven excellent restaurants, a fresh fish market, and fine arts and
gifts shops.  Cannary row is home to approximately fourteen fine
restaurants and is often referred to as Restaurant Row.  The American
Tin Cannery Outlet center has over 40 factory stores.

- Point Lobos State Park:  The Point Lobos landscape, a mosaic of bold
headlands, irregular coves and rolling meadows, was produced over
millions of years through interaction between land and sea.  An
ecological reserve, the natural processes occurring are left untouched.
The beauty of this tree-clad headland is unequaled.

PROGRAM COMMITTEE

Bjorn Satdeva, Program Chair, /sys/admin, inc.

Brent Chapman           Great Circle Associates
Lee Damon               Castle PAUS
Tina M. Darmohray       Lawrence Livermore National Labs
Janet Frazer            UNIX System Laboratories, Inc.
Helen Harrison          SAS Institute
Dinah McNutt            Tivoli Systems
Bryan McDonald          SRI International
Arch Mott               cisco Systems, Inc.
Paul Moriarty           cisco Systems, Inc.
Jeff Polk               Berkeley Software Design, Inc.
Greg Rose               Australian Computing and Communications
			Institute
Peg Schafer             Bolt, Beranek & Newman, Inc.
Steve Simmons           Inland Sea
Liza Y. Weissler        RAND Corporation
Pat Wilson              Dartmouth College
Elizabeth Zwicky        SRI International

			*********************
			LISA TUTORIAL PROGRAM
			*********************

The USENIX Association's well-respected tutorial program offers
you introductory as well as advanced, intensive yet practical
tutorials.  Courses are presented by skilled teachers who are
hands-on experts in their topic areas.  The USENIX System
Administration tutorial program has been developed to meet the needs
of an audience  of novice through experienced computer professionals.

Tutorial Program, Monday and Tuesday, November 1 and 2 1993

Attend the tutorials at Monterey and benefit from this opportunity
for in-depth exploration and skill development in essential UNIX system
administration topics.  Combining the two-day tutorial program with the
three days of technical sessions means you have an opportunity to learn
from experts at a convenient time and at a reasonable cost.

The tutorial program at Monterey is divided into three tracks with a
total of six half-day tutorials on each day.  Attendees will receive
all class notes for the day(s) that they select.  Each day, attendees
will be permitted to change tracks if they feel that they would be
better served with a different selection.  However, to ensure adequate
seating, and as a courtesy to your fellow students, we request that
these mid-session changes be kept  to a minimum.  Please note that
although some prior knowledge is required for the advanced tutorials,
each tutorial is presented as a stand-alone class (for example, a
student may take "Introduction to Sendmail Administration" without
taking "Introduction to Sendmail Configuration", if their knowledge or
experience level permits).

The USENIX tutorial program continues to enjoy a very high demand
for its offerings.  Several tutorials sell out before registration
closes.  Attendance is limited, and pre-registration is strongly
recommended.  On-site registration is possible ONLY if space permits.

Monday Tutorials
ROOM 1	ROOM 2	ROOM 3
9am to 12:30pm	Administering Heterogeneous Systems: BSD vs. SVR4
	        Hein &  Nemeth

                Internet Firewalls
                Darmohray

                Introduction to Perl
                Christiansen

1:30pm to 5pm	Topics in System Administration P 1
                Dyker

		Writing Safe SUID Code
		Christiansen

		Introduction to Sendmail Configuration
		Allman

Administering Heterogeneous Systems: BSD vs. SVR4	NEW

Are we moving towards a more unified UNIX?  While many standards
committees and vendors advertise their operating system as "the one
for the future," as System Administrators we continue to see
significant differences from platform to platform.  This section will
provide hints and pointers to help frustrated System Administrators
move software between BSD-based and SVR4-based systems.  We will also
outline the differences in file naming, formats and locations for
various utilities and subsystems (such as fstab, rc vs. inittab,
lp vs. lpr, /dev conventions, etc.)  Special emphasis will be made
on the transition to Solaris 2.2.

Topics in System Administration P 1	NEW

Integrating non-UNIX Systems P Integrating a plethora of different
versions of UNIX is far from a solved problem.  But what about
Macintoshes?  This section will primarily discuss the details of
integrating Macintosh computers into a UNIX environment, both on your
local network and remotely.  We will cover file sharing, networking,
as well as sharing printers between dissimilar operating systems.
We will also deal with some "political" as well as technical issues.

Help-desk Management 

Just having a good technical staff isn't all it takes to keep
users happy P or is it?  We will discuss ideas to improve your
technical support service operation, including trouble reports,
tracking, problem resolution, and other human-factors issues.

Network Security:  Constructing Firewalls	NEW

Often, the success of an enterprise depends heavily on digital
communications.  Until now, the techniques and tools required to
secure a functional TCP/IP network have been an art P acquired only
through trial and error.  This tutorial presents issues and solutions
surrounding the securing of functional internetwork connections and
construction of an Internet Firewall.  This tutorial requires as its
prerequisite strong knowledge of DNS and Sendmail.  Topics include
securing routers, gateway hosts, proxy users, DNS, and mail behind
the firewall.

Writing Safe SUID Code				NEW

This course is designed for the system administrator who needs to
create privileged programs securely, or who has to use such programs
derived from an outside source and wishes to analyze them for potential
security risks.  Most examples given will be in the C programming
language, although the suitability of shell and Perl programs for
secure tasks will also be discussed.

Topics of this tutorial include how the set user and set group
mechanisms in UNIX work, how and when to access the real and effective
user and group ids from within a program, employing the principle of
least privilege, pitfalls in privileged programs commonly exploited by
crackers, running a subprocess in a different privilege mode, using the
syslog library for security logging, using RFC-931 based authentication
mechanisms, the perils of running arbitrary programs as super user
including those executed out of at, cron, and rc execution), why setuid
shell scripts compromise system security, writing safe setuid Perl
programs using taintperl, the perils of xargs usage and newlines in
filenames, using the sudo program for delegating limited super user
access, network daemons as a security hazard, and configuring, running,
and extending COPS for security audits of your system.

Introduction to Perl

Perl is a publicly available and highly portable interpreted programming
language occupying the large niche between shell and C programming.
Perl's syntax and features resemble C, in combination with the best
parts of sh, sed, awk, and several other powerful UNIX tools.  Perl
programs are often clearer and cleaner than equivalent shell scripts,
and are usually significantly more efficient.  As such it is excellent
for system management tasks, an area in which Perl has become the
programming language of choice for many system administrators.

This course is suitable for individuals who have never looked at Perl
before or have only just begun to use it.  Students need to have a
strong background in UNIX shell programming, with a good working
knowledge of regular expressions.  Some background in sed, awk, and
some C programming are useful but not essential.

Topics of this tutorial include detailed descriptions and examples
of the syntax and semantics of the language, its data types, operators,
control flow, regular expressions, and I/O facilities, and using the
Perl debugger.

Introduction To Sendmail Configuration	NEW

Sendmail is arguably the most successful UNIX-based mail transfer agent
in the world today.  Originally distributed with the Berkeley Software
Distribution, sendmail is now used by most UNIX vendors.  However,
it has a reputation for being difficult to configure and manage.
This tutorial focuses on these areas.

After introducing a bit of the philosophy and history underlying
sendmail, this tutorial will cover:

- The syntactic elements of the configuration file: mailers, options,
  macros, classes, headers, precedences and priorities, trusted users,
  key file definitions, and rewriting rules and rulesets.

- The flow and semantics of rulesets, including hints about debugging.
- An introduction to SMTP, how sendmail operates in an SMTP environment,
  and SMTP interactions with UUCP.

This will be an intense, fast paced tutorial, and will use the latest
release of sendmail from Berkeley, version 8, for examples.  Version 8
includes many of the popular features of IDA sendmail.  Other versions
of sendmail will be discussed briefly.  This talk will not cover mail
front ends beyond their interface to sendmail.

Tuesday Tutorials

ROOM 1	ROOM 2	ROOM 3
9am to 12:30pm	Topics in System Administration P 2
                Hein & Nemeth

		Ethics & Policies
		Kolstad

		Network Programming in Perl
		Christiansen

1:30pm to 5pm	Topics in System Administration P 3
		Hein & Nemeth

		Internal Security
		Kolstad

		Introduction to Sendmail Administration
		Allman

Topics in System Administration P 2	NEW

SLIP/PPP P Full IP connectivity is now possible for machines at remote
sites (including your house) across dial-up modems via SLIP.  This
discussion covers the SLIP problem space, how SLIP works, how to
install and test it, and what equipment is needed to run it efficiently.
Brief mention is made of the new PPP protocol.

Network Performance: Trying to squeeze some extra speed out of your
network?  This introduction to network performance will cover the
basics of monitoring and maintaining decent response on your
Ethernet-based LAN.  You'll also learn how to use a number of public
domain network performance analysis tools.

USENET News in the 90s P With over a million people now reading and
posting to USENET news, managing a news hub has become a complicated
and time consuming system administration chore.  This section will
present a comprehensive overview of news hub management, including
installation, maintenance, and troubleshooting of both C-News/NNTP
and INN (the new guy on the block).

Topics in System Administration P 3	NEW

Routing P This section provides background material on routing both
in a local area network and in the global Internet, in preparation for
learning about configuring dedicated routers.  The section covers the
use and setup of routed and gated for medium sized networks and
debugging using ping, traceroute, and tcpdump.

Introduction to Cisco IP Routing P You've probably seen the router box.
And you've probably sent packets through it.  But you've always
wondered how to configure this essential part of your network.  We'll
talk specifics about configuring Cisco routers in the TCP/IP
environment, including various routing protocols and access controls
lists.

Administering DOS-based PCs in a TCP/IP environment: Are you faced with
integrating DOS PCs into your network environment?  This section covers
available options and configuration specifics of setting up and
administering PCs using both FTP's PCTCP and Sun's PCNFS products to do
email, printing, file sharing, and more.  PCs under TCP/IP can be your
friend, if you know how to keep them happy.

Ethics & Security Policies UPDATED

As institutions continue to expand their use of networks and data
storage, administrators must keep pace with various sticky situations
that should be carefully considered before they arise.  This highly
interactive tutorial will discuss several points of view in a number
of ethical situations and analyze the behavior and consequences of a
variety of different case studies.  The first section will conclude
that policy statements must be put in place in order to protect a wide
variety of users at your site.  The second section of the tutorial
discusses and analyzes various security and site policies that can be
modified for use at your site.

Internal Security	NEW

UNIX has a reputation for being relatively insecure and easy to
compromise.  This half day discusses a wide gamut of security problems
and solutions for your shop.  It concentrates mostly on security inside
your domain (on your side of the firewall).  It covers physical
security, ways to break into systems, schemes to debilitate systems,
passwords, account security, monitoring, user education, filesystem
protection, COPS, TripWire, and dozens of other short topics.

Network Programming in Perl	NEW

This course is designed for programmers already experienced with Perl
who would like to expand their Perl expertise into UNIX networking.
Students with a firm background in both Perl and UNIX C programming
will benefit most from this course.  Some previous knowledge of UNIX
networking will prove beneficial.

This tutorial emphasizes using Perl for client and server TCP and UDP
socket programming and (Sun) RPC programming, as well as the tools
and techniques necessary for accessing these facilities, such as
conversion between C and Perl data structures, using h2ph and c2ph
on system include files for portable code, the bit vector data type
used for the select system call for managing multiple socket
connections, the ioctl and fcntl system calls, and handling
exceptional conditions.

Introduction To Sendmail Administration	NEW

This tutorial is designed for systems administrators who have
day-to-day responsibility for installation and operation of sendmail.
It gets into the nuts and bolts of running sendmail at your site.
The tutorial "Introduction to Sendmail Configuration" or equivalent
knowledge are prerequisite for this tutorial.  Topics covered include:

- Day-to-day management issues, including alias and forward files,
  "special" recipients (files, programs, and include files), mailing
  lists, command line flags, tuning, and security.
- How sendmail interacts with the Domain Name Server.
- Interfacing sendmail to new mail agents.

The emphasis is on practical problem-solving.  This talk will use
the latest release of sendmail from Berkeley, version 8, for examples.
Version 8 includes many of the popular features of IDA sendmail. 
Other versions of sendmail will be discussed briefly.

ABOUT THE INSTRUCTORS

Eric Allman is the original author of sendmail, as well as several
other perennial favorites including syslog, the Pme macros, and trek,
as well as a major contributor to INGRES.  He received his MS in
Computer Science from U.C. Berkeley in 1980.  He is currently the Lead
Programmer on the Mammoth Project at U. C. Berkeley, where his duties
include most everything that needs doing.

Tom Christiansen earned undergraduate degrees in Computer Science and
Spanish in addition to an MS degree in Computer Science from the
University of Wisconsin at Madison.  In 1987, he joined CONVEX
Computer Corporation where his duties included customer support,
training, systems administration, UNIX utilities and kernel development,
C2 security, and creation of software tools.  Tom is now self-employed
as a software consultant.  Tom is on the Board of Directors for the
USENIX Association, and is well-known around the world for his courses
in Perl programming.

Tina Darmohray is the Lead for the UNIX System Administration Team at
LLNL, where her group has responsibility for over 1,000 machines.
In 1990, she installed the first firewall at LLNL and has since
consulted with a number of sites in the Bay Area.  Previously, she
worked for Sun Microsystems.  She over a decade of experience as
a UNIX system administrator.  She received her MS at the University
of California at Berkeley.

Barbara Dyker has been administering computer systems and networks of
many flavors for 7 years.  She is currently the Computing Operations
Manager for the University of Colorado Dept. of Computer Science at
Boulder.  She is also an instructor for Technology Exchange Company
and certified for NeXT System Administration training.  Most recently
Barb saved many faces in Cincinnati and hopes to save yours in Monterey.

Trent Hein grew up in the UNIX system administration trenches at the
University of Colorado at Boulder. He spent Summer 1990 at Berkeley
working on the 4.4BSD port to the MIPS architecture, and has taught
numerous tutorials at past USENIX conferences.  He currently works
as a consultant for XOR Network Engineering in Colorado.

Dr. Rob Kolstad is Program Manager at Berkeley Software Design, Inc., 
where he manages a handful of engineers scattered across the USA.
He teaches system administration in a wide variety of venues in
addition to editing the USENIX Association's newsletter, ;login:.
Rob served six years on the USENIX board of directors and was
instrumental in establishing the popular USENIX Large Installation
System Administration (LISA) Conferences.  He chaired the recent
Winter U93 USENIX conference.

Evi Nemeth, a faculty member in Computer Science at the University
of Colorado, has managed UNIX systems for the past 15 years, both
from the front lines and from the ivory tower.  She is co-author
of the best-selling UNIX System Administration Handbook (Prentice-Hall).

FOR FURTHER SYMPOSIUM INFORMATION, PLEASE CONTACT:

USENIX Conference  Office 
22672  Lambert  St.,  Suite  613 
Lake Forest,  CA  92630
Telephone (714) 588-8649
FAX Number (714) 588- 9706
Electronic Mail Address: confere...@usenix.org
Office Hours: 8:30am - 5:00pm Pacific Time

             **************************************
             LISA VII PRELIMINARY TECHNICAL PROGRAM
	     **************************************

WEDNESDAY,  NOVEMBER 3

8:30 - 10:00	KEYNOTE ADDRESS                    TRACK I
A Management View of
Systems Administration
John Black, Oracle

John Black is now Senior VP of Telecommunication at Oracle, where
he manages Corporate Alliances to deliver any service using any
multi-media to anyone, anywhere, over any network and any device...
The Oracle Multi-Media Server.  Previously, he was Systems Architect
for US West NewVector Group.  NewVector operates a 14 state cellular
telephone network, using 17 Sequent UNIX Computers.  Mr. Black is also
the founder of MOSES (Massive Open Systems Environment Standard). 
MOSES is an international group of six companies who are raising
the bar of commonality among UNIX shops by drafting common tool
requirement policies and procedures.  Prior to US West, he worked
for American Airlines, developing and deploying PC Home Banking
trials and Bank By Phone services on DEC UNIX machines. 

10:00 - 10:30	BREAK

10:30 - 12:00	VIS  `A VIS				TRACK I

Collaborative Networked Communications:  MUDs as Systems Tools
Remy Evard, Northeastern University

Horses and Barn Doors:  Evolution of Corporate Guidelines for Internet 		Usage
Sally Hambridge, Jeffrey C. Sedayao, Intel Corporation

Our Users Have Root!
Laura Kirk de Leon, Mike Rodriquez, Brent Thompson, Hewlett Packard

PANEL:  Security in a Heterogeneous Environment		TRACK II
Moderator:  John Stewart, NASA Ames Research Center
Panelists:  Dan Farmer, Sun Corp.; Michele Crabb, NASA
Ames Research Center; Dave Henry, Dave Henry Associates 

OPEN SESSION						TRACK III 
(This session to be assigned during the Conference)  

12:00 -  1:30	LUNCH ON YOUR OWN

 1:30 -  3:00	SOFTWARE INSTALLATION AND CUSTOMIZATION    TRACK I

LUDE:  A Distributed Software Library
Michel Dagenais, Ecole Polytechnique de Montreal; Stephane Boucher,
Bell Northern Research; Robert Gerin-Lajoie, Universite de Montreal;
Pierre Laplante, Centre de Recherche Informatique de Montreal; Pierre
Mailhot, Universite de Montreal

The Corporate Software Bank
Steve Lodin, Delco Electronics

Customization in a UNIX Computing Environment
Craig E. Wills, Kirstin Cadwell, William Marrs, Worchester Polytechnic
Institute

MANAGING YOUR BOSS					TRACK II

William E. Howell, University of North Carolina - Chapel Hill

PANEL:  THINGS THAT DON'T SCALE				TRACK III
Moderator:  Helen Harrison, SAS Institute 

 3:00 -  3:30	BREAK

 3:30 -  5:00	SOURCE CONTROL				TRACK I
Local Disk Depot - Customizing the Software Environment
Walter C. Wong, Carnegie Mellon University

Methods for Maintaining One Source Tree in a Heterogeneous Environment
Bjorn Satdeva, /sys/admin, inc

Towards a POSIX Standard for Software Administration
Barrie Archer, ICL

ISDN:  INTERNET TO THE HOME				TRACK II
Stan Kluz, Lawrence Livermore National Laboratory

MANAGING USER ACCOUNTS					TRACK III
Managing 1000's of Users
John Miller, Lewis & Clark College

THURSDAY, NOVEMBER 4

8:30 - 10:00	GETTING DOWN TO BUSINESS		TRACK I

Managing the Mission Critical Environment
E. Scott Menter, Enterprise Systems Management Corp.

Open Systems Format Evaluation Process
Brian Keves, Systems and Network Management, Inc.

A Case Study on Moves and Mergers 
John Schimmel, Silicon Graphics, Inc.

SINGLE PERSON ADMINISTRATION				TRACK II
Paul Evans, SRI International; 
Shoshana Abrass, Pacific Data Image

GETTING TO '@' - CONNECTING TO THE INTERNET 		TRACK III
Smoot Carl-Mitchell, Texas Internet Consulting

10:00 - 10:30	BREAK

10:30 - 12:00	SYSTEM ADMINISTRATION BY DELEGATION	TRACK I
Guerrilla System Administration: Scaling Small Group Systems
Administration to a Larger Installed Base
Tim Hunter, Scott Watanabe, University of Colorado, Boulder

Role-based System Administration or Who, What, Where and How
Dinah McNutt, Tivoli Systems

Uniformity in Heterogeneous Distributed Administration
Jean-Charles Gregoire, INRS-Telecommunications

What's Out There? - A Guide TO Internet Resources  	TRACK  II
Jeff Kellem, Beyond Dreams

OPEN SESSION						TRACK III
(This session to be assigned during the Conference)			

12:00 -  1:30	LUNCH ON YOUR OWN

 1:30 -  3:00	SYSTEM ADMINISTRATION TOOLS		TRACK I
satool - A System Administrators Cockpit
Todd Miller, Christopher Stirlen, Evi Nemeth, University of Colorado,
Boulder

Sysctl: A Distributed System Control Package
Salvatore DeSimone, Christine Lombardi, Project Agora,
IBM T.J. Watson Research Center

Automated System Monitoring and Notification With Swatch
Stephen E. Hansen, E. Todd Atkins, Stanford University

A GUIDED TOUR OF THE UNIX MAN PAGES			TRACK II
Tom Christiansen, Consultant

OPEN Session						TRACK III
(This session to be assigned during the Conference)

 3:00 -  3:30	BREAK

 3:30 -  5:00	DISK MANAGEMENT				TRACK I
Where Did All the Bytes Go?
Dinah McNutt, Tivoli Systems; Michael Pearlman, Rice University 

A Practical Approach to NFS Response Time Monitoring
Gary L. Schaps, Peter Bishop, Cirrus Logic, Inc.

The Amanda Network Backup Manager
James da Silva, Olafur Gudmundsson, Department of Computer Science,
University of Maryland

THE MYERS-BRIGGS TYPE INDICATOR: AN INTERPERSONAL TOOL
FOR SYSTEMS ADMINISTRATORS				TRACK II
Nancy Shoemaker, Consultant; Betty Jacob, PRC. Inc.

PANEL:  HELP ME- QUESTIONS AND ANSWERS			TRACK III
Moderator:  Rob Kolstad, Berkeley Software Design, Inc.

FRIDAY, NOVEMBER 5

 8:30 - 10:00 INFORMATION TOOLS				TRACK I
PLOD:  Keep Track of What You're Doing
Hal Pomeranz, QMS Inc.

How to Keep Track of Your Network Configuration
Juergen Schoenwaelder, H. Langendorfer, TU Braunschweig, Germany

Forecasting Disk Resource Requirements for a Usenet Server
Karl L. Swartz, Stanford Linear Accelerator Center

WORKS-IN-PROGRESS					TRACK II
Bryan McDonald, SRI International

SPECIAL SESSION ON MANAGING VERY LARGE SITES            TRACK III	
Contact:  Helen Harrison, SAS Institute

SPECIAL SESSION ON MANAGING VERY LARGE SITES
Friday, November 5 - 8:30 - 10:00am - 			TRACK III

- Do you round the number of machines at your site to the
  nearest hundred?
- Do you round the number of users to the nearest thousand?
- Do you round your disk space to the nearest terabyte?
- Can you foresee the day when you might do any of these things?.
  ...If so, this session is for you!

This will be an interactive session designed to give administrators
who face the special challenge of supporting a very large site an
opportunity to share ideas and solutions.  We will hear short
presentations from real-life administrators followed by dicussion
of special problems of very large sites.  Topics may include software
installation and update, asset management, backups, network
management, disk space management, user account administration
and many more. 

If you would like to contribute to this session as a speaker, or
have particular topics you would like to see discussed, please
contact:  Helen Harrison, email:
h...@unx.sas.com or telephone (919) 677-8000, Ext. 6981.

10:00 -  10:30	BREAK

10:30 - 12:00 THE HUMAN BEHIND THE ROOT		TRACK I
Simplifying System Administration Tasks: THE UAMS Approach
Roland J. Stolfa, Oklahoma State University

System Administration As A User Interface - An Extended Metaphor
Wilson H. Bent, Jr., Univerity of Southern Calfornia

The System Administration Maturity Model - SAMM
Carol Kubicki, Motorola Cellular Infrastructure Group

BACKUPS - AN INTRODUCTION TO THE ART		TRACK II
Robert M. Searfus, Delta Microsystems, Inc.

SCALING UP:  THE NEXT LEVEL OF COMPLEXITY?	TRACK III
How to Upgrade 150 Workstations in One Day:  and Still Make It to Poker
Tim Irvin, Craig Manning, Industrial Light & Magic

Software Management in a Distributed Server Environment
Dan Rich, RMS Technologies, Inc. NASA Lewis Research Center

Real-World Gigabit Networking
Jeff Pack, Grumman Data Systems

12:00  -  1:30	LUNCH ON YOUR OWN

 1:30  -  3:00	POTPOURRI				TRACK I
Establishing and Administering a Public Access Internet Facility
Sheri Byrne, Jemini Learning Systems

Implementing Execution Controls in UNIX
Todd Gamble, WilTel Network Services		

HLFSD: Delivering Email to Your $HOME 
Erez Zadok, Columbia University; Alexander Dupuy, System Management ARTS 

LEAVING THE DINOSAUR - MOVING APPLICATIONS FROM THE MAINFRAME TO UNIX TRACK II
Alan Paller, Computer Associates
Alan Holezman, Sequent Computers 

OPEN SESSION						TRACK III
(This session to be assigned during the Conference)

  3:00 - 3:30	BREAK

  3:30 - 5:00	PANEL:  TOWARDS A SOLUTION		TRACK I

Moderator:  Rob Kolstad, Berkeley Software Design, Inc.
Panelists:  John Black, Oracle; Alan Paller, Computer Associates;
Richard Karaski, Octel Communication

CLOSING REMARKS
Bjorn Satdeva, /sys/admin, inc.

FOR FURTHER INFORMATION, PLEASE CONTACT:

USENIX Conference  Office 
22672  Lambert  St.,  Suite  613 
Lake Forest,  CA  92630
Telephone (714) 588-8649
FAX Number (714) 588- 9706
Electronic Mail Address: confere...@usenix.org
Office Hours: 8:30am - 5:00pm Pacific Time

           ***************************************
           LISA7 REGISTRATION INFORMATION AND FEES
	   ***************************************

TUTORIAL REGISTRATION FEE SCHEDULE   (November 1 -2)
The tutorial registration fee includes bound tutorial notes,  pa-
per,  pen  and  a  box lunch on the day of your tutorial session.
Pre-registration deadline is October 13, 1993. On-site fees apply
after that date.
                            Pre-Registration Fee        On-Site Fee
One full-day triple track tutorial      $290                 $340
Two full-day triple track tutorials     $530                 $580

TECHNICAL SESSIONS REGISTRATION FEE   (November 3 -5)
Pre-registration deadline is October 13, 1993.
On-site fees apply after that date.

                                Pre-Registration Fee    On-Site Fee
Member Fee                              $295                 $345

The member fee applies to current individual members of the
USENIX, SAGE, Sun User Group, EurOpen or AUUG.

 *Non-Member or Renewing Member Fee     $385                 $435

Full-Time Student                      $  75                 $ 75
(Must provide copy of current  student  I.D. card )

Full-time students please note:  A limited number of scholarships
are available for full-time students.  Contact the Conference Of-
fice for details.

*To Join or renew your membership to USENIX/SAGE when registering
for the conference technical sessions, pay the non-member techni-
cal sessions registration fee and check the USENIX membership box
on  the  Registration  Form. $90 of your registration fee will be
designated as dues in full for a one-year individual USENIX Asso-
ciation membership.

Current USENIX Members that wish to join SAGE -    You  may  join
SAGE at the USENIX/SAGE Membership booth during the Conference.

REGISTER EARLY TO SAVE!  TUTORIAL AND TECHNICAL SESSIONS FEES IN-
CREASE $50 EACH AFTER OCTOBER 13, 1993

PAYMENT
- Fees are payable to USENIX Conference  by check, VISA, MasterCard,
     American Express or Diner's Club International.
- To be processed, payment must accompany your completed
  Registration Form.
- Registration by telephone is not permitted.
- Purchase orders and vouchers CANNOT be accepted.
- You may fax your Registration if payment is by credit card.

To avoid duplicate billing when faxing your registration, do  not
mail an additional copy.  You may telephone the Conference Office
to confirm receipt of your fax.

REFUND CANCELLATION POLICY:  If you must cancel  all  refund  re-
quests  must  be  in writing and postmarked no later than October
25, 1993.  Direct your letter to the USENIX Conference Office.

************************************************************************
              LISA7 REGISTRATION INFORMATION and FORM
************************************************************************
Please complete the form below and return to the USENIX Conference
office (address below).

NAME _________________________________________________________________ 
	(first)					(last)

FIRST NAME FOR BADGE ___________________________

COMPANY OR INSTITUTION:_________________________________________________

MAILING ADDRESS ________________________________________________________

CITY _________________________STATE_____COUNTRY________ZIP____________

TELEPHONE NO:____________________ FAX NO. ____________________________

NETWORK ADDRESS_________________________________________________
				(Please write legibly)

If you do NOT want to appear in the attendee list, check here: ___  

Is this your first USENIX Conference?   ___Yes  ___No  
What is your affiliation?  ___ Academic ___ Commercial ___ Gov't
Are you a current member of the USENIX Association?   ___ Yes  ___No  
(If you wish to join USENIX see below.*)
Are you a current member of SAGE (System Administrators Guild)?___Y___No
______________________________________________________________________
TUTORIAL PROGRAM - Monday & Tuesday, November 1-2, 1993
If you wish to participate in the tutorial program, please check one
or both boxes.
 _
|_|  MONDAY Full-Day Triple-Track System Administration Tutorial 
     Please indicate which AM and PM topic you most likely will attend:

AM Topic _____________________________________________

PM Topic _____________________________________________
 _
|_|  TUESDAY Full-Day Triple-Track System Administration Tutorial 
     Please indicate which AM and PM topic you most likely will attend:

AM Topic _____________________________________________

PM Topic _____________________________________________

NOTE: Half day tutorial registration fees are not available.

FEE SCHEDULE for TUTORIALS and TECHNICAL CONFERENCES

Tutorial fees - Monday & Tuesday, November 1-2, 1993
	One Full-Day Tutorial selected .................$290.00 _____
	Two Full-Day Tutorials selected.................$530.00 _____
Late fee applies if postmarked after October 13      Add$ 50.00 _____

TECHNICAL  SESSIONS  REGISTRATION  FEES 
Wednesday, Thursday, Friday, November 3-5, 1993 

*Member Fee..............................................$295.00 _____
Non-member Fee...........................................$385.00 _____
Late fee applies if postmarked after October 13      Add$  50.00 _____

Full-time Student Fee - Pre-registered or On-Site          75.00 _____
(Students must include photocopy of current student
I.D. card with registration form.)                  

*The member rate applies to current individual members of the
USENIX Association, Sun User Group, EurOpen and AUUG.
								 _	
If you wish to join or renew USENIX/SAGE.............Check Here |_|
Please take $90.00 of my non-member conference 
registration fee to pay for a one year indiviudal
membership in USENIX/SAGE.

Full-time students please note: A limited number of  scholarships
are available for full-time students.  Contact the Conference Office
for details.

Payments must accompany registration form.  Purchase orders and
Vouchers not accepted.

Payment Enclosed (U.S. Dollars).
Make check payable to USENIX CONFERENCE.

CHARGE TO MY:  ___VISA ___MASTERCARD ___AMERICAN EXPRESS ___DINERS CLUB

ACCOUNT NO._____________________________EXPIRATION DATE_______________

__________________________________/______________________________
Print Cardholder's Name			Cardholder's Signature

You may FAX your registration form if paying by credit card to
USENIX CONFERENCE OFFICE, FAX # (714) 588-9706.  (If you FAX
registration, to avoid duplicate billing, do not mail additional copy.
You may telephone our office to confirm receipt of your fax.)

REFUND CANCELLATION POLICY:  If you must CANCEL, all refund requests
must be in writing and postmarked no later than OCTOBER 25, 1993.
Direct your letter to the USENIX Conference Office.

*********************************************************************
            PAYMENT MUST ACCOMPANY REGISTRATION FORM.
             REGISTRATION VIA EMAIL IS NOT ACCEPTED.
*********************************************************************

PLEASE COMPLETE REGISTRATION FORM AND RETURN IT ALONG WITH YOUR
FULL PAYMENT TO:

USENIX Conference Office
22672 Lambert St., Suite 613 
Lake Forest, CA 92630
Telephone (714) 588-8649   
FAX (714) 588-9706
Electronic Mail Address: confere...@usenix.org
Office Hours: 8:30am - 5:00pm Pacific Time

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.