Newsgroups: comp.org.usenix,comp.org.sug,comp.org.uniforum,comp.unix.large,
comp.os.misc,comp.misc,comp.unix.admin
Path: bga.com!news.sprintlink.net!hookup!swrinde!gatech!nntp.msstate.edu!
olivea!uunet!usenix!toni
From: t...@usenix.org (Toni Veglia)
Subject: USENIX 8th Systems Administration Conference - LISA VIII
Message-ID: < CuLrJ0.GL8@usenix.org>
Reply-To: t...@usenix.org (Toni Veglia)
Organization: USENIX Association, Berkeley, CA
Date: Tue, 16 Aug 1994 00:47:24 GMT
Lines: 1345



USENIX 8TH SYSTEMS ADMINISTRATION CONFERENCE - LISA VIII
September 19-23, 1994, San Diego, California

Sponsored by the USENIX Association and SAGE, the System 
Administrators Guild

The 8th annual USENIX Systems Administration Conference is the largest
conference EXCLUSIVELY for system administrators.  It is here that
system administrators, system managers, and network managers meet to
share ideas and experiences.

"Automation: Managing the Computer of the 90's" is the theme of this
year's technical program.  The three-day technical program will focus
on tools to help system administrators automate administration tasks
and troubleshoot problems.

***************************************************
IMPORTANT DATES TO REMEMBER:
Hotel Discount Reservation Deadline:  August 27, 1994
Pre-Registration Savings Deadline:    August 29, 1994

This posting contains:
  Tutorial and Technical Session Descriptions
  Schedule of Events
  Hotel and General Conference Information
  Registration Form
***************************************************

TUTORIAL PROGRAM - MONDAY and TUESDAY, SEPTEMBER 19 & 20

Courses are presented by skilled teachers who are hands-on experts in
their topic areas. The USENIX System Administration tutorial program
has been developed to meet the needs of an audience of novice through
experienced computer professionals.  Please note that some prior
knowledge is required for the advanced tutorials.

The tutorial program at San Diego is divided into five tracks, 
with two full-day and six half-day tutorials on each day. You may
select any non-overlapping set of classes. Continuing in the LISA
tradition, registrants will receive class notes for ALL tutorials on
the day(s) they attend. However, to ensure adequate seating and to
reduce crowding, we are requiring that registrants pre- register for
specific classes.

The USENIX tutorial program continues to enjoy a very high demand.
Several tutorials sell out before registration closes.  Attendance is
limited, and pre-registration is strongly recommended.

CONTINUING EDUCATION UNITS
The USENIX Association now provides CEUs through the International
Association for Continuing Education and Training.  Completion of any
full day (or two half day ) USENIX tutorial(s) qualifies you for 0.6
CEUs.  We provide a certificate to each attendee taking a tutorial for
CE credit and maintain transcripts for all CE students.  You may
request CE credit by checking the appropriate box on the registration
form.

Monday, September 19, 1994 Tutorials
====================================
M1 - 9:00am-5:00pm
Topics in System Administration, Trent Hein and Evi Nemeth

M2 - 9:00am-5:00pm
Advanced Solaris Administration, Peter Galvin and Dinah McNutt

M3am - 9:00am-12:30pm
Internal Security, Rob Kolstad

M3pm - 1:30pm-5:00pm
Managing Time and Talent, Tina Darmohray and Rob Kolstad

M4am - 9:00am-12:30pm
DNS Management, Tina Darmohray

M4pm - 1:30pm- 5:00pm
Writing Safe SUID Code, Tom Christiansen

M5am - 9:00am-12:30pm
Managing a DCE Environment, Jonathan Chinitz

M5pm - 1:30pm-5:00pm
Legal Issues for System Administrators, Dan Appelman


M1: TOPICS IN SYSTEM ADMINISTRATION (Trent Hein and Evi Nemeth)

This full-day tutorial covers a collection of topics essential for
the system administrator. Topics are:

-Routing (1 hour):  This section provides background material on
routing both in a local area network and in the global Internet, in
preparation for learning about configuring dedicated routers. The
section covers the use and setup of routed and gated for medium sized
networks and debugging using ping, traceroute, and tcpdump.

-Introduction to Cisco IP Routing (1 hour):  You've probably seen 
the router box. And you probably have sent packets through it.  But
you've always wondered how to configure this essential part of your
network. We'll talk specifics about configuring Cisco routers in the
TCP/IP environment, including various routing protocols and access
controls lists.

-Introduction to Sendmail8 (1 1/2 hours):  Learn about how your 
site can be yanked kicking and screaming into to the modern world of
sendmail8.  This introduction to sendmail8 will cover the basic
differences between sendmail8, sendmail5, and IDA, and learn how the
new features can make your job easier.

-BSD vs. SVR4 (2 1/5 hours):  Are we moving towards a more unified 
UNIX? While many standards committees and vendors advertise their
operating system as the one for the future, as System Administrators we
continue to see significant differences from platform to platform. This
section will provide hints and pointers to help frustrated System
Administrators move software between BSD-based and SVR4-based systems.
Special emphasis will be made on the transition to Solaris 2.3.

M2: ADVANCED SOLARIS SYSTEM ADMINISTRATION (Peter Galvin 
and Dinah McNutt)

This full-day tutorial is designed to meet the needs of the system
administrator who has experience at managing systems, but has not had
extensive experience with Sun's new Solaris 2.x operating system. Areas
of focus include differences between Solaris 2.x and older operating
systems, and migrating from those older operating systems to Solaris.
Topics discussed include:

-Installation and Configuration of Solaris 2.x:  Including the new
naming schemes for directories and devices, the new startup file
organization and function, and the new printing and serial-I/O
configuration files.

-Managing Solaris 2.3:  Covers the new aspects of 2.3, including the
new caching file system and AutoFS, the automounter file system.

-NIS+:  Differences between NIS and NIS+ will be discussed as 
well as a brief description of how to use NIS+.

-Kernel Configuration:  How to configure new devices and changes 
from Solaris 2.1 and SunOS 4.1.x

-SCSI:  Everything the system administrator needs to know about 
how SCSI works

-Tools:  Some of the tools we have found useful for automating system
administration tasks and troubleshooting problems:  watcher, multi-rsh,
and sysinfo, to name a few!

M3am: INTERNAL SECURITY (Rob Kolstad)

UNIX has a reputation for being relatively insecure and easy to
compromise. This half-day tutorial session discusses a wide gamut of
security problems and solutions for your shop. It concentrates mostly
on security inside your domain (on your side of the firewall).

This tutorial covers:
-Physical security
-Ways that have been used to break into systems (and how to
  avoid them)
-Schemes to debilitate systems
-Passwords, account security, monitoring, and user education
-Filesystem protection
-COPS, TripWire, and dozens of other short topics.

M3pm: MANAGING TIME AND TALENT (Tina Darmohray and Rob 
Kolstad)

One of the fundamental keys to successful system administration is 
good management of time and talent. This half-day series of short
topics will introduce you to some of the frequent challenges in
effective system administration and their common solutions.

-Hiring and Managing System Administrators:  This section will help you
meet the challenges of developing a highly effective system
administration team at your site. As a manager of a probably growing
staff of system administrators, you need a sophisticated understanding
of what to look for when hiring, what is a good training program for
your site, and then, what kind of job performance you should expect,
given the complexity of system administration tasks.

We'll discuss what type of background, technical skills, and personal
qualifications to look for in hiring appropriate individuals. We'll
introduce a recently published set of system administrator job
descriptions from SAGE, the System Administrators guild. We'll discuss
how you can apply these appropriate job descriptions to aid in
personnel management.  Additionally, we'll discuss growth paths for
system administrators.  The talk will also include results of the
system administrator time expenditure survey and briefly, the salary
survey.

-Tricks & Techniques for Self-Management:  The second part of the
session will concentrate on techniques you can use to improve your
productivity and reduce stress.  They will include schemes for tracking
user's requests and your staff's responses, communicating with users,
motivating others at your site, and a number of other non-standard
techniques that have appeared recently in the literature.

M4am: DNS Management (Tina Darmohray)

Configuring and managing the Domain Name System is a necessary skill
for system administrators of Internet-connected sites. This half-day
tutorial presents an introduction to the DNS system, history and
motivation, configuration and management.

This practical tutorial provides specific details and examples of the
essential DNS files and tips on how to configure and manage them.
Various topological configuration options will be covered, including:

              Server types based on network topology, traffic, load
              Sendmail interaction and MX records
              Non-Internet-connected sites
              Hiding information (firewall support)

This tutorial will also address debugging techniques and vendor- and
platform-specific configuration issues.

M4pm: WRITING SAFE SUID CODE (Tom Christiansen)

This half-day tutorial is designed for the system administrator who
needs to create privileged programs securely, or who has to use such
programs derived from an outside source and wishes to analyze them for
potential security risks. Most examples given will be in the C
programming language, although the suitability of shell and Perl
programs for secure tasks will also be discussed.  Topics include:

-How the set user and set group mechanisms in UNIX work
-How and when to access the real and effective user and group
  ids from within a program
-Employing the principle of least privilege
-Pitfalls in privileged programs commonly exploited by crackers
-Running a subprocess in a different privilege mode
-Using the syslog library for security logging
-Using RFC-931 based authentication mechanisms
-Perils of running arbitrary programs as super user (including
  those executed out of at, cron, and rc execution)
-Why setuid shell scripts compromise system security
-Writing safe setuid Perl programs using taintperl
-Perils of xargs usage and newlines in filenames
-Using the sudo program for delegating limited super user access
-Network daemons as a security hazard
-Configuring, running, and extending COPS for security audits of
  your system.

M5am: MANAGING A DCE ENVIRONMENT (Jonathan Chinitz)

Think of DCE as a complex engine, with many moving parts.  Changing 
one setting on the engine might cause one particular component to work
well, while another might need a completely different adjustment. Once
all the tweaking is done, you have a perfectly humming engine.

This half-day session will attempt to give an overview of the
management aspects of a DCE environment, by first describing all the
"moving parts" (CDS, RPC, Security, Time and DFS). Then we describe
what the parts do, how the parts can be "tuned" and what effects they
have on the environment. The description will focus primarily on
software administration, but will also include issues related to:

        DCE Availability -- vendors and platforms
        Planning a DCE cell -- or more than one
        Migration to a DCE environment
        Installation and configuration;
        Troubleshooting a DCE installation
        Administration tools and techniques; and
        Where to go from here -- is there life after the tutorial?

M5pm: LEGAL ISSUES FOR SYSTEM ADMINISTRATORS (Dan 
Appelman)

The law as it applies to the electronic media is not always intuitive
or obvious. It is especially confusing and unpredictable as it pertains
to computer and network system administration and those who work in
that field. This half-day class will provide invaluable insight when
you, or one of your users, is confronted with issues involving the law,
or when you must deal with intruders into your system. This class will
also address your legal obligations and responsibilities as system
administrator, what your employer may ask you to do, and when you can
legally refuse to comply. We will also deal with areas where the law is
undecided, unclear, or in flux. We will examine how this uncertainty
can affect your decision-making process; and we will suggest ways to
minimize your risk of legal liability.

The class will address the following issues:
-Free speech & censorship in the electronic media
-The rights of privacy and confidentiality
-Your right to monitor and revoke user privileges
-Export law compliance and system administration
-Professionalization of System Administration; benefits and
  detriments
-Disclaimers, warnings, and notices
-Copyrights and trade secrecy in a networking environment
-Shrink-wrap licenses and license servers
-Anonymity and falsification of identity
-Break-ins, logging, evidence, and hearsay
-Legal precedents and landmark cases


Tuesday, September 20, 1994 Tutorials
=====================================
T1 - 9:00am-5:00pm
More Topics in System Administration, Trent Hein and Evi Nemeth

T2 - 9:00am-5:00pm
Joining the Internet Safely with UNIX and Firewalls, Tina 
Darmohray
T3am - 9:00am-12:30pm
Advanced Sendmail Configuration, Rob Kolstad

T3pm - 1:30pm-5:00pm
Ethics and Policies, Rob Kolstad

T4am - 9:00am-12:30pm
The Perl Toolbox -- Perl by Example, Tom Christiansen

T4pm - 1:30pm-5:00pm
NIS+, Marc Staveley

T5am - 9:00am-12:30pm
The Canons of Computer Services Management, William Howell

T5pm - 1:30pm-5:00pm
Performance Management and Help Desk Management, Barb Dijker

T1: MORE TOPICS IN SYSTEM ADMINISTRATION (Trent Hein and Evi 
Nemeth)

This full-day tutorial consists of a collection of topics essential 
for the system administrator. The topics are:

-Network Performance (1 1/2 hours):  Trying to squeeze some extra 
speed out of your network? This introduction to network performance will
cover the basics of monitoring and maintaining decent response on your
Ethernet-based LAN. You'll also learn how to use a number of public
domain network performance analysis tools.

-Network Crisis Case Studies (1 1/2 hours):  At the request of students
in previous tutorials, we've put together a set of network problem case
studies that will be dissected and corrected in front of your eyes
using many of the tools discussed in the previous section.

-Administration of World Wide Web and Other Internet Information
Services (2 1/4 hours):  The world of Internet hypertext is here today.
Learn how to set up and maintain your own WWW server, including
information about the resource requirements, fancy tricks, on-line
order/form completion and the performance that you can expect. In
addition, we'll discuss basic set up of other Internet information
services such as gopher and wais.

-Administering DOS-based PCs in a TCP/IP Environment (3/4 hour):  Are
you faced with integrating DOS PCs into your network environment? This
section covers available options and configuration specifics of setting
up and administering PCs using both FTP's PCTCP and Sun's PCNFS
products to do email, printing, filesharing, and more. PCs under TCP/IP
can be your friends, if you know how to keep them happy.

T2: JOINING THE INTERNET SAFELY USING UNIX AND FIREWALLS 
(Tina Darmohray)

Connecting to the Internet is an exciting event for every organization.
The security implications can often bring hesitation, though. This
practical full-day tutorial outlines details and examples of UNIX
network security and Internet connectivity issues. Site policies and
topologies that implement them will be covered, including
packet-filtering, application- level, and circuit-level gateways.
Overviews of current, publicly- available solutions, will be provided,
focusing on complete examples for configuring an Internet firewall.

Pre-requisites for this tutorial are a knowledge of TCP/IP, DNS, 
and sendmail. This tutorial will cover:

-Problem definition and design motivation
-Nomenclature and design variations
-Implementing firewalls
-Routers
-Purpose
-Router-based firewalls
-Packet-filtering configuration
-Gateway/Bastion host security
-Router and bastion-host-based firewalls
-Host security configuration
-Bastion host software: tcpd, smrsh, and challenge-response
  passwd software
-Proxy solutions
-Misc. public-domain proxies
-SOCKS
-TIS firewall toolkit
-Hiding information with DNS
-SOA and MX records to support the firewall
-Dual-DNS configuration
-Sendmail configuration
-Configuration to operate with a firewall topology
-Header re-writing to support the firewall

T3am: ADVANCED SENDMAIL CONFIGURATION (Rob Kolstad)

This half-day tutorial session will concentrate on modifying,
programming, and debugging sendmail configuration files. Not only will
we cover syntax and semantics, but also test and verification
techniques. The extended time will enable examination of several
exemplary pieces of configuration files and a complete explication of
testing and verifying sendmail configuration files -- including a
verification suite.

The class will discuss a scheme for client/mail distribution and will
analyze the feature and drawbacks of various mail distribution
schemes.

T3pm: ETHICS & POLICIES (Rob Kolstad)

Dealing with large user communities leads to new problems in data
collection, software licensing, security, and ethics. The first half of
this session will discuss scenarios and techniques that can be applied
to insure happy, healthy, ethical user communities. This section
includes case studies, large group discussion, and real-world examples
of various ethical problems encountered in the workplace. Of course,
the answers to ethical issues are always slippery and difficult to
ascertain. Discussions in this part of the class will demonstrate just
how tricky they can be.

The second half of this session provides an approach to creating a
site-wide policy for computer use in your environment. It discusses the
pros and cons of dozens of various issues ranging from e-mail privacy
to use of copyrighted software.  Model policies are exhibited and
critiqued.

T4am: THE PERL TOOLBOX -- PERL BY EXAMPLE (Tom Christiansen)

This half-day tutorial highlights numerous useful tools related to
system administration written in Perl. First, each tool is fully
explained and demonstrated. Then the internal coding strategies used by
each are spelled out, giving administrators with similar but not
identical tasks a good idea of how to go about devising similar tools
on their own. Those Perl libraries most relevant to system
administrators are detailed. Finally, you'll be shown how to place an
attractive and convenient GUI on your new tools using the Tk extensions
to Perl.

This class is suitable for system administrators whose jobs involve
some amount of programming. A rudimentary understanding of the
fundamentals of Perl programming are assumed, although seasoned UNIX
programmers with a strong background in shell and C programming will
also do fine. Tools and libraries covered will include those useful for
maintenance and analysis of log files, disk space maintenance, process
tree inspection, security checks, and recursive file tree walking.

T4pm: NIS+ (Marc Staveley)

In this half-day tutorial, we will examine the why's and how's of
setting up and administering a NIS+ network. We will also give an
overview of what NIS+ is, and how it differs from NIS.
 We will cover the benefits of NIS+: its integration with DNS, enhanced
security, cross-domain and cross-subnet operability, distributed
network information, and dynamic binding. Basic concepts such as NIS+
tables (what they are and how they are used), the namespace, and basic
terms (e.g., replica, root, master, and client) will be explained.

Topics in setting up the network will include: the nsswitch.conf file,
setting security levels, bulk loading of data, using admintool, and
integrating with DNS. We will also address administering NIS+,
including an overview of NIS+ commands, grafting subnets, merging root
masters, redesignating the master for a domain and troubleshooting. At
the end of this tutorial, students will know how to administer a NIS+
domain of any size.

T5am: THE CANONS OF COMPUTER SERVICES MANAGEMENT (William 
E. Howell)

This half-day tutorial presents some of the canons for how to manage
computing environments. These key principles will help you be an
effective and efficient manager.

All forms of management are surrounded in their job by their sphere of
influence. In that sphere are individuals, groups, and equipment that
they are capable of influencing.  This tutorial touches on the nine
segments in the sphere of influence of the manager of computer
systems.  The nine segments are: Personal, Peer, Management, Board,
System, Vendor, Employee, Project, and User Management. By learning how
to manage each of these to gain your objectives, you will oversee a
first class computing environment and excel at your job.

This tutorial is intended for the budding manager who will learn
invaluable lessons which will help them avoid the costly mistakes of
learning on the job and what the school of hard knocks has to offer.
The existing manager will find confirmation of approaches and styles,
and will learn new ideas and views that will improve their
effectiveness.

T5pm: PERFORMANCE MANAGEMENT AND HELP DESK MANAGEMENT 
(Barb Dijker)

This half-day tutorial addresses the parallel issues of getting the
most out of your hardware and providing the best user level support to
your user community. This tutorial will cover:

-Performance Management:  So you thought a new 100+ MIPS computer would
solve all your performance problems and it didn't. The problem is that
more horsepower does not necessarily or easily support more users,
faster graphics, or greater throughput -- the issues affecting these
factors can be complex and often confusing. Subtle interrelations can
have profound effects on final system performance.

We'll introduce the limiting factors of UNIX system performance and how
to monitor your system's performance, determine the performance
bottlenecks, and implement remedies for improving performance.

-Help Desk Management:  Addressing users' needs and questions quickly
and efficiently is of paramount importance if you want to have a happy
user community. Unfortunately, an overworked and harried support staff
is neither quick nor efficient. How can you improve services and
increase responsiveness without sacrificing the support staff?

This portion provides an overview of strategies for establishing or
improving your internal support organization. It covers topics such as
defining services, tracking, hiring, training, tools, and
documentation.

ABOUT THE INSTRUCTORS

Dan Appelman is a lawyer practicing computer and telecommunications law
in Palo Alto, California. In addition to his law degree, Dan earned a
Ph.D. in telecommunications policy.  He has been active for many years
with the legal issues pertaining to the computer and networking
industries, representing such clients as UUNET Technologies, O'Reilly &
Associates, Cygnus Support, Z-Code and Xinet and teaching computer and
telecommunications law. He frequently lectures and writes about these
matters and about the business, legal and policy implications of the
burgeoning use of computers and computer systems in daily life.
Jonathan Chinitz is President of IntelliSoft Corp., a software
engineering firm specializing in distributed computing solutions. In
the last 3 years, Jonathan has conducted DCE training and consulting
worldwide on DCE application development, internals architecture and
system administration. Jonathan has also developed a number of DCE
training courses, the latest focusing on using DCE security in
distributed applications. In his spare time, Jonathan is co- authoring
a book on DCE System Administration for O'Reilly & Associates.

Tom Christiansen earned undergraduate degrees in Computer Science and
Spanish in addition to an MS degree in Computer Science from the
University of Wisconsin at Madison. In 1987, he joined CONVEX Computer
Corporation where his duties included customer support, training,
systems administration, UNIX utilities and kernel development, C2
security, and creation of software tools. Tom is now self-employed as a
software consultant specializing in Perl applications, optimizations,
and training. Tom is on the Board of Directors for the USENIX
Association, and is well-known around the world for his courses in Perl
programming.

Tina Darmohray is the Lead for the UNIX System Administration Team at
LLNL, where her group has responsibility for over 1,000 machines. In
1990, she installed the first firewall at LLNL and has since consulted
with a number of sites in the Bay Area.  Previously, she worked for Sun
Microsystems. She has over a decade of experience as a UNIX system
administrator. She received her MS at the University of California at
Berkeley.

Barb Dijker is a UNIX system and network management consultant. She
teaches courses regularly for Addison-Wesley Technology Exchange
Company, Digital Equipment Corp., and NeXT.  Barb is also the current
saver of USENIX faces and is the President of the Colorado Internet
Cooperative Association. She was the Computer Science Department
Operations Manager for 4 1/2 years at the University of Colorado,
Boulder. She paid the rest of her 9 - 5 dues at Martin Marietta, and
Computer Sciences Corporation.

Peter Galvin is currently the Systems Manager for Brown University's
Computer Science Department, where he provides technical management of
an installation of nearly 200 Sun SPARCstations and servers. He is also
a current member of the Board of Directors of the Sun User Group. He
has used, programmed, and managed computer systems for 15 years,
including 8 years with Sun equipment. He is a columnist for the
Superuser newsletter, and co-author of Operating Systems Concepts by
Silberschatz and Galvin.

Trent Hein is Chief Network Architect at XOR Network Engineering in
Boulder, Colorado. In this position, he deals with sticky system and
network administration problems on an hourly basis. In a past life,
Trent worked on the 4.4 BSD port to the MIPS architecture at Berkeley,
and he is currently working as an author on the 2nd Edition of the
best-selling UNIX System Administration Handbook (Nemeth, et. al. by
Prentice Hall PTR).  Trent has a BS in Computer Science from the
University of Colorado.

William (Bill) Howell is Department Head, Communications and Technical
Support, for Glaxo, Inc., the world's second largest pharmaceutical
company. Bill is responsible for all computing systems other than PCs
and Macs at Glaxo's U.S. facilities in Research Triangle Park, North
Carolina. Bill writes, lectures, and consults on the management of
computer service organizations, the management of projects, and
computer security. His research interests are in the management of
technology and the people and organizations that support and use that
technology. Bill is currently writing a text, tentatively titled,
"Canons of Computer Services Management," which discusses the results
of his research and actual experiences.

Dr. Rob Kolstad is President of Berkeley Software Design, Inc., where
he manages engineers scattered across the USA. He teaches system
administration in a wide variety of venues in addition to editing the
USENIX Association's newsletter, ;login:.  Rob served six years on the
USENIX board of directors and was instrumental in establishing the
popular USENIX Large Installation System Administration (LISA)
Conferences. He chaired the recent Winter '93 USENIX conference.

Dinah McNutt is a freelance writer and consultant. She is also one of
the founders of Zilker Internet Park which provides Internet access and
consulting in Austin, Texas. She has been doing system administration
for over 9 years and has written technical articles on the subject for
SunExpert Magazine, RS/Magazine, and the X Resource Journal. Ms. McNutt
currently writes the "Daemons and Dragons" column for UNIX Review
magazine, and is the originator of the "System Administration" column
for SunExpert magazine.

Evi Nemeth, a faculty member in Computer Science at the University of
Colorado, Boulder, Evi has managed UNIX systems for the past 17 years,
both from the front lines and from the ivory tower. She is co-author of
the best-selling UNIX System Administration Handbook (Prentice-Hall).

Marc Staveley has 12 years of experience in UNIX application 
development and administration. For the last 3 years Marc has 
been an independent consultant; previously he held positions at 
NCR Corporation, Princeton University, and the University of 
Waterloo. Among his current projects, Marc is working with the 
Sun Microsystems Solaris Migration Support Centre assisting 
their customers in porting applications from SunOS to Solaris.
==========================================================

PRELIMINARY TECHNICAL PROGRAM
WEDNESDAY-FRIDAY, SEPTEMBER 21- 23, 1994
****************************************

WEDNESDAY, SEPTEMBER 21
=======================
KEYNOTE ADDRESS - 9:00am-10:30am

Jack Stanley, Houston Chronicle
The Road To UNIX: A Report from the Fourth Estate

Mr. Jack Stanley is Vice President of Operations for the Houston
Chronicle and the architect of their transition from a mainframe system
to a UNIX-based network that supports over 500 users at any given time
in offices located in Texas and Washington.  He has over 30 years
experience in systems programming and applications development.

REFEREED TRACK - SYSTEM CONFIGURATION -11:00am-12:30pm
Session Chair: Mark Verber, Xerox PARC

Central System Administration in a Heterogeneous Unix 
Environment:  GeNUAdmin
   Dr. Magnus Harlander, GeNUA mbH
Config:  A Mechanism for Installing and Tracking System 
Configurations
   John P. Rouillard and Richard B. Martin, Dept. of Math and
   Computer Science, University of Massachusetts - Boston
Towards a High-Level Machine Configuration System
   Paul Anderson, Dept. of Computer Science University of
   Edinburgh

INVITED TALK
Purchasing a Workstation Installation
   Peter Galvin, Brown University

When purchasing a workstation installation, comparing SPECmarks is 
only one small part of the process, and a potentially misleading one at
that.  Recently, the Brown University Computer Science Department
upgraded their facilities, spending approximately one year on
evaluation, ordering and acquisition of over 170 workstations, with the
requisite servers and networking, in a very thorough process.  This
talk describes that process, and the pitfalls and benefits of the
method we used.

REFEREED TRACK - AUTOMATION - 2:00pm-3:30pm
Session Chair:  Hal Stern, Sun Microsystems

OMNICONF - Make OS Upgrade and Disk Crash Recovery Easier
   Imazu Hideyo, Matsushita Electric
Automated Upgrades in a Lab Environment
   Paul Riddle, Academic Computing Services, University of
   Maryland
Tenwen: The Reengineering of a Computing Environment
   Remy Evard, Experimental Systems Group, Northeastern
   University

INVITED TALK
Plenty of Confusion (PC) on the Network
   Craig Hunt, National Institute of Standards and Technology

This talk discusses some techniques and tools for integrating PCs 
into a TCP/IP network.  DOS and Windows-based Personal Computers are a
big headache for many UNIX network administrators.  The standard PC
operating systems have limited network capabilities and many of the
least sophisticated users on the network are PC users.  PCs require
lots of support from UNIX servers.  Server-based configuration using
RARP, BOOTP and DHCP are discussed.  The mail server protocols, POP2,
POP3 and IMAP, are discussed with examples of POP2 and POP3
configurations. Several sendmail.cf modifications that are helpful for
mail servers and that are useful for re-writing addresses to a personal
name format are also covered.

REFEREED TRACK - THE TOOLBOX - 4:00pm-5:30pm
Session Chair:  Pat Parseghian, AT&T Bell Laboratories

Kernel Mucking in Top
   William LeFebvre, Argonne National Laboratory
Handling Passwords with Security and Reliability in Background 
Processes
   Don Libes, National Institute of Standards and Technology

INVITED TALK
DCE's Impact on System Administrators
   Rich Salz, Open Software Foundation

A primary goal of the OSF DCE is to provide authenticated RPC.  In
order to meet this seemingly simple goal it was necessary to build a
moderate-sized infrastructure consisting of a handful of "core"
services.  In this talk, I will explain the DCE structure, give an
overview of the services, and describe how a DCE will affect a system
administrator's duties, covering both the current release and the DCE
1.1, which will be available from the OSF in November.

THURSDAY, SEPTEMBER 22
======================
ENCORE PRESENTATION - 9:00am-10:30am
Breaking into Banks: Security Lessons Learned from Financial 
Services
   Dan Geer, OpenVision Technologies

Everybody from Willie Sutton ("Why do I rob banks? 'Cause that's where
the money is.") to Perry Mason ("He had motive and opportunity.") has
an instinctive appreciation that a world of electronic money draws
electronic attacks.  But sometimes, that world's impatience and drive
is its own worst enemy, or almost.  This talk uses real-life anecdotes
to illustrate that security technology is enabling technology, not
merely insurance and/or perimeter control.  It may just be banks today,
but electronic commerce won't happen unless we learn from the bankers'
bleeding-edge experiences.

REFEREED TRACK - SOFTWARE CONFIGURATION - 11:00am-12:30pm
Session Chair:  Paul Evans, Synopsys, Inc.

Soft:  A Software Environment Abstraction Mechanism
   Remy Evard and Robert Leslie, Experimental Systems Group,
   Northeastern University
Beam:  A Tool for Flexible Software Update
   Thomas Eirich, University of Erlangen- Nurnberg - IMMD IV
Depot-Lite:  A Mechanism for Managing Software
   John P. Rouillard and Richard B. Martin, Dept. of Math and
   Computer Science, University of Massachusetts - Boston

INVITED TALK
Network Security Fun
   Bill Cheswick, AT&T Bell Laboratories

The Internet offers an endless source of diversions.  From the privacy
of one's own home one can read (or talk) endlessly through netnews,
consult the requirements and features of obscure departments in distant
colleges, or explore the limits of pornography .  For the truly active
fun-seeker, the net offers hands-on experiments in breaking, entering,
vandalism, voyeurism and, for the tireless few, an opportunity to
create automata that can exhibit exponential growth.  I will explore
some of the current problems and possibilities of network security.
With a little luck, we won't go exponential.

WORKS - IN - PROGRESS REPORTS - 2:00pm-3:30pm
To reserve your presentation slot, direct your e-mail to Bryan 
MacDonald at big...@usenix.org.

INVITED TALK
Performance Monitoring and Tuning
   Mark Staveley, Consultant

The demands of our "users" often cause us to make changes in the hopes
of improving performance.  Making a change is all well and good, but
then the question becomes am I getting the effect I want?  The way to
answer this question is to monitor continuously how the machines, and
the network, are doing.

I will talk about discovering performance problems (hopefully before
your users do), by setting up performance monitoring in your network
and analyzing the data using standard UNIX tools.  We will discuss how
to determine where the performance problems lie, and perhaps most
importantly, whether the solution you implement has had the desired
effect.

REFEREED TRACK - AUTOMATION, THE SEQUEL - 4:00pm-5:30pm
Session Chair:  Neil Todd, Swiss Bank Corp.

SENDS, a Tool for Managing Domain Naming and Electronic Mail in 
a Large Organization
   Jerry Scharf, Sony Corp., and Paul Vixie, Vixie Enterprises.
Getting More Work Out Of Work Tracking Systems
   Elizabeth D. Zwicky, Silicon Graphics Inc.
Managing the Ever-Growing To Do List
   Remy Evard, Experimental Systems Group, Northeastern
   University

INVITED TALK
A Practical Introduction to SNMPv1
   Phil Draughon, Northwestern University

This presentation provides a practical introduction to the Simple
Network Management Protocol.  We will cover what SNMP is, what it is
not, and where it came from.  We will discuss why SNMP is so popular,
the controversy of trap-directed polling, how to read the Management
Information Base (MIB), and how to adapt SNMP technology to other
aspects of systems administration.  We will also discuss two popular
implementations, one from CMU and HP's OpenView Network Node Manager.

FRIDAY, SEPTEMBER  23
=====================
REFEREED TRACK - THE USER ENVIRONMENT - 9:00am-10:30am
Session Chair:  Trent Hein, XOR Networking Engineering

Speeding Up UNIX Login by Caching the Initial Environment
   Carl Hauser, Xerox PARC
THE BNR/NT Standard Login (A Login Configuration Manager)
   Christopher Rath, Bell Northern Research
Exporting Home Directories on Demand to PCs
   David Clear, Alan Ibbetson, Systems Group, Computing
   Laboratory, University of Kent - Canterbury, UK and Peter
   Collinson, Hillside Systems

INVITED TALK
Building a Successful World Wide Web Server (With a Little HTML 
Thrown in for Fun...)
    Amy Kreiling, University of North Carolina

Information servers and the World Wide Web have exploded into the
mainstream. Today, if you aren't running a WWW server, a regular user
of a WWW browser, or at least able to speak the lingo, you're
considered  (to borrow from today's popular idiom) "stranded at a rest
stop on the Information SuperHighway".  This talk will provide an
introduction to setting up your own WWW server, discuss issues that
every "Web Master" should consider when building their own WWW server,
and present a brief introduction to the HyperText Markup Language.  The
talk will also include an overview of some of the more popular HTML
filters and editors.

REFEREED TRACK - PEEK A BOO - I CAN SEE YOU - 11:00am-12:30pm
Session Chair:  William LeFebvre, Argonne National Laboratory

Monitoring Usage of Workstations with a Relational Database
   Jon Finke, Rensselaer Polytechnic Institute
Adventures in the Evolution of a High-Bandwidth Network for 
Central Servers
   Karl L. Swartz, Les Cottrell, and Marty Dart, Stanford Linear
   Accelerator Center
Pong:  A Flexible Network Services Monitoring System
   Helen E. Harrison, Mike C. Mitchell and Mike E. Shaddock, SAS
   Institute, Inc.

INVITED TALK
A Sysadmin's Guide to SCSI: A Non-Engineering Perspective
         or
What the Heck is a Terminator?
   Michael Pearlman, Rice University

This talk is a mini-tutorial designed for the beginner-to-intermediate 
system administrator.  An overview of the SCSI architecture will be
presented, along with the "traps and pitfalls" of dealing SCSI
devices.  Some of the topics that will be addressed include:
  - Is my SCSI bus too long?  
  - What is a terminator and what type do I Need?  
  - How to select the correct SCSI id.  
  - What does synchronous mean?

REFEREED TRACK - THE AUTOMATION REVOLUTION - 2:00pm-3:30pm
Session Chair:  Tom Christiansen, Consultant

Automating Printing Configuration
   Jon Finke, Rensselaer Polytechnic Institute
Highly Automated Low Personnel System Administration in a Wall 
Street Environment
   Harry Von Hamhorse Kaplan, Sanwa Financial Products
The Group Administration Shell and the GASH Network Computing
Environment
   Jonathan Abbey, Computer Science Division Applied Research
   Laboratories,  University of Texas - Austin

INVITED TALK
Getting on the MBone
   Steve Casner, Information Sciences Inst., University of
   Southern California

Worldwide teleconferencing with tens of hundreds of participants is now
possible over the Internet Multicast Backbone (MBone) using audio,
video and shared whiteboard tools available for free.  The MBone is a
virtual network overlaid on portions of the physical Internet to
provide IP multicast connectivity among the participating sites.  This
talk will cover an overview of IP multicast, how it is has been used on
the MBone, and how new sites can join in this experiment.
==========================================================

SCHEDULE OF CONFERENCE EVENTS
=============================
Sunday, September 18
        Conference Registration     - 6:00pm-9:00pm
        Welcome Reception           - 6:00pm-8:00pm

Monday, September 19
        Tutorial Program            - 9:00am-5:00pm

Tuesday, September 20
        Tutorial Program            - 9:00am-5:00pm
        Birds-of-a-Feather Sessions - 6:30pm-10:30pm

Wednesday, September 21
        Technical Sessions          - 9:00am-5:30pm
        Birds-of-a-Feather Sessions - 6:30pm-10:30pm
        Vendor Display              - 3:00pm-9:00pm

Thursday, September 22
        Technical Sessions          - 9:00am-5:30pm
        Vendor Display              - 10:00am-4:00pm
        Conference Reception        - 6:00pm-8:00pm
        Birds-of-a-Feather Sessions - 8:00pm-10:30pm

Friday, September 23
        Technical Sessions          - 9:00am-3:30pm

CONFERENCE ORGANIZERS
=====================
Conference Chair:
   Dinah McNutt, Zilker Internet Park, Inc.
Conference Program Committee:
   Tom Christiansen, Consultant
   Trent Hein, XOR Network Engineering
   William (Bill) LeFebvre, Argonne National Laboratory
   Pat Parseghian, AT&T Bell Laboratories
   Hal Stern, Sun Microsystems, Inc.
   Jeff Tate, Wells Fargo Institutional Trust Company
   Mark Verber, Xerox PARC
   Neil Todd, Swiss Bank Corporation
Invited Talks Coordinator:
   Pat Parseghian, AT&T Bell Laboratories
Work-In-Progress Coordinator:
   Bryan MacDonald, SRI International, big...@usenix.org
Guru Is IN Coordinator:
   Paul Evans, Synopsys, Inc., p...@usenix.org
Terminal Room Coordinator:
   Barb Dijker, b...@usenix.org
Tutorial Program Coordinator:
   Daniel V. Klein, USENIX, d...@usenix.org
Exhibits Coordinator:
   Peter Mui, USENIX, p...@usenix.org
Meeting Planner:
   Judith DesHarnais, USENIX, j...@usenix.org

VENDOR DISPLAY
==============
Wednesday, September 20  -  3:00pm-9:00pm
Thursday, September 22   -  10:00am-4:00pm

See the latest system adminstration products and tools! An 
informal vendor display will be held with an emphasis on the 
technical aspects of the products and services being shown.  
Exhibitors will have their technically-oriented staff demonstrate 
products and services useful to system administration and 
network management.  Last year's exhibitors were:

Aim Technology                    Network Computing Devices, Inc.
ANDATACO                          Network Wizards
AT&T CommVault Systems            O'Reilly & Associates, Inc.
Auspex Systems, Inc.              OPENService SJI, Inc.
Breakaway Software                Parity Systems, Inc.
CD Publishing Corporation         Patrol Software, Inc.
ClariNet Communications Corp.     Qualix Group, Inc.
Comtec Automated Solutions        R&D Publications, Inc.
Delta Microsystems                Structured Software Solutions
Digital Equipment Corporation(DEC Athena Engineering)
Firesign Computer Co.             Tivoli Systems, Inc.
GraphOn                           UniSolutions Associates
Highland Digital                  Unison-Tymlabs
Network Appliance Corporation     Workstation Solutions, Inc.

For information on exhibiting at LISA, please contact:
            Peter Mui, Exhibit Coordinator
            Phone: +1 510 528 8649; FAX +1 510 528 5738
            email: p...@usenix.org

THE GURU IS IN
==============
Experts from the USENIX community will be available to answer 
your questions, each in their own areas of expertise.  The 
schedule, including the names of the volunteer gurus and their 
areas of expertise, will be posted at the conference.  E-mail 
suggestions for this track should be directed to Paul Evans: 
p...@erg.sri.com.

BIRDS-OF-A-FEATHER SESSIONS
===========================
Birds-of-a-Feather Sessions (BOFs) allow attendees to meet and 
discuss topics of interest to them.  BOFs are intended to be 
highly interactive and much less formal than the Technical 
Sessions. BOFs will be held Tuesday, Wednesday and Thursday 
evenings in the Town and Country Hotel.  We would particularly 
like to encourage BOFs on topics which would not normally be 
discussed during typical USENIX technical presentations (for 
instance, professional issues, non-professional interests 
common to Systems Administrators, etc.)  To schedule a BOF 
Session, or to request more information, e-mail to Lee Damon, 
n...@network.ucsd.edu.  BOFs may also be scheduled on-site at 
the Conference Registration Desk.

RECEPTION
=========
You are invited to join in the fun, mingle with old and new 
friends, and enjoy the plentiful hors d'oeuvres and beverages.  The 
USENIX Reception is Thursday, September 22, at 6:00-8:00pm.  
The Reception is included in the technical sessions registration 
fee.  Additional Reception tickets may be purchased at the 
conference.

CONFERENCE PUBLICATIONS
=======================
One copy of the Conference Proceedings, which contains all 
refereed papers, and one copy of the Invited Talks Submitted 
Notes may be picked up at the conference by all technical 
sessions registrants. Additional copies may be purchased at the 
conference.  After the conference, the Proceedings are available 
for purchase; contact the USENIX Association Executive Office, 
Telephone + 510 528 8649 or via-e-mail to off...@usenix.org.

WORK-IN-PROGRESS REPORTS
========================
Work-in Progress (WIP) Reports introduce interesting new or 
ongoing work.  If you have interesting work you would like to 
share or a cool idea that is not ready to be published, a WIP 
Report is for you!  WIPs are scheduled within the technical 
sessions program and you will enjoy the insightful feedback you 
receive to your ideas.  To reserve your presentation slot, direct 
your e-mail to Bryan MacDonald via e-mail at big...@usenix.org.

TERMINAL ROOM
=============
The Terminal Room will be available to attendees.  Services 
available at the terminal Room will include Internet Access, 
Dial-Out Access, facilities for making copies of miscellaneous 
GNU and public domain software.

CONFERENCE ATTENDEE MESSAGE SERVICE
===================================
Electronic message service will be available Monday, September 
19 through noon Friday September 23.  Address electronic 
messages as first_lastn...@conference.usenix.org.
Telephone messages may be left by telephoning the Town and 
Country Hotel at + 619 291 7131 and asking for the USENIX 
Message Center.  The Message Center will be open Sunday, 
September 18, 4:00-9:00pm, and continue to be open during 
conference hours until Friday, September 23 at 3:00pm.

CONFERENCE SPONSORS
===================
USENIX
The USENIX Association is well known for its technical 
conferences, tutorial programs, and the wide variety of 
publications it has sponsored over the years.  USENIX is the 
original (we celebrate our 20th anniversary in 1995), not-for-
profit membership organization for individuals and institutions 
with an interest in UNIX or UNIX-like systems and modern 
computing environments.

SAGE
The two-year-old System Administrators Guild, a Special 
Technical Group within the USENIX Association, is dedicated to 
the advancement of system administration as a profession.

If you have any questions about SAGE or USENIX, please contact 
the Association office at +1 510 528 8649, or send email to: 
off...@usenix.org.

REGISTER FOR THE CONFERENCE AND JOIN USENIX AND SAGE
WITH ONE FORM AND ONE PAYMENT

To join or renew your membership in USENIX and SAGE when 
registering for the conference technical sessions, pay the non-
member technical sessions registration fee and check the box on 
the Registration Form.

HOTEL INFORMATION
=================
Town & Country Hotel, (LISA VIII Conference Headquarters)
500 Hotel Circle North
San Diego, CA 92103
Telephone + 619 291 7131 - Tollfree 800 772 8527 (U.S.)

This unique hotel in the Mission Valley area of San Diego offers 
guests four restaurants, movie and cable television, four 
swimming pools, spa and nearby shopping and nightlife.  Parking 
at the Town & Country Hotel is complimentary.

Contact the Hotel directly to make your reservation.  Be sure to 
mention that you are attending the USENIX Conference to take 
advantage of our special rate. A first nights deposit is required 
to reserve your room.  NOTE:  For special room rates, hotel 
reservations must be made no later than August 27, 1994.

YOUR CHOICE OF ROOM RATES AT THE TOWN & COUNTRY HOTEL

                                                        Single/Double
* GARDEN ROOMS                                          $65/$75
These garden rooms are located in one or two-story
buildings, and are spread throughout the hotel grounds
surrounded by lush landscaping.

* EAST TOWERS ROOMS                                     $79/$89
This 8-story high-rise, offers recently renovated rooms,
its own pool, and an adjacent parking structure.

* WEST TOWER ROOMS                                      $89/$99
This 10-story deluxe tower, closest to the meeting rooms,
offers oversized rooms, with private balconies and views
of the large pool and surrounding hillsides.

If you wish to cancel your hotel reservation and receive a refund, 
you must give notice at least 48 hours in advance of your planned 
arrival date.

ROOM SHARING - Usenet facilitates room sharing.  If you wish to 
share a room, post to and check comp.org.usenix.roomshare.

DISCOUNT AIRFARES
Using American OR United Airlines...
        5% off any applicable fare (including supersavers)*
        OR
        10% off the unrestricted full coach fare
*To qualify for the very lowest supersaver fare, a Saturday night 
stay is required.

Save with these airfare discounts available only through JNR, Inc.  
JNR will help you plan your flights to and from San Diego with 
schedules and fares for all airlines, one-call changes, refunds 
and boarding passes for all flights.  Telephone JNR at 
+ 714 476 2788 or tollfree at 800 343 4546 (U.S.).

AIRPORT TO HOTEL TRANSPORTATION
Lindbergh Field, San Diego's International Airport, is located only 
15 minutes (8 miles) from the Town & Country Hotel.  Super 
Shuttle offers continuous 24 hour van service every 20-30 
minutes at a current cost of $7 one way.  Go to the baggage claim 
area, pick up the telephone at the Hotel Information Board and 
dial the number designated for Super Shuttle.  Taxi service is 
available at an approximate cost of $12-$15 one way.

REGISTRATION INFORMATION AND FEES 
=================================
TUTORIAL REGISTRATION FEE SCHEDULE 
Included in Tutorial Registration Fees:
*Admission to the tutorial(s) you select
*Printed and bound notes for all tutorial sessions held on the
  day(s) you select.
*Lunch on the  day(s) you select.
*Admission to the Vendor Display

Pre-registration deadline is August 29, 1994.  On-site fees apply 
after that date.

                                     Pre-Registration Fee   On-Site Fee

Tutorial Program for one day                $320             $370
CEU credit for one full tutorial day          15               15
Tutorial Program for two days                590              640
CEU credit for two full tutorial days         30               30

NOTE:  You can select either one full-day tutorial or two half day
tutorials on each day.  (Half-day tutorial registration fees are 
not available)

TECHNICAL SESSIONS REGISTRATION FEE SCHEDULE
============================================
Pre-registration deadline is August 29, 1994.  On-site fees apply 
after that date.

                                Pre-Registration Fee    On-Site Fee
Member fee...................................$295             $345
   The member fee applies to current individual members
   of the USENIX Association, JUS, EurOpen or AUUG.
*Non-Member or Renewing Member Fee............385              435
Full-Time Student..............................75               75
    (Must provide copy of current student I.D. Card).
Students please note: A limited number of scholarships are 
available for full-time students.  Contact the Conference office 
for details.

*To join or renew your membership to USENIX/SAGE when 
registering for the conference technical sessions, pay the non-
member technical sessions registration fee and check the USENIX 
membership box on the Registration Form.  $90 of your 
registration fee will be designated as dues in full for a one year 
individual USENIX/SAGE Association membership.

Current USENIX members may join SAGE at the USENIX/SAGE 
booth during the Conference.

PAYMENT
=======
-Fees are payable to USENIX CONFERENCE by check, VISA,
  MasterCard, American Express or Diners Club International.
-To be processed, payment MUST accompany your completed
  Registrati Form.
-Registration by telephone is not permitted.
-Purchase orders and vouchers CANNOT be accepted.
-You may fax your Registration if payment is by credit card. To
  avoid duplicate billing when faxing your registration, DO NOT
  mail an additional copy.  You may telephone the Conference
  Office to confirm receipt of your fax.

REFUND CANCELLATION POLICY
If you must cancel, all refund requests must be in writing and 
postmarked no later than September 12, 1994.  Direct your letter 
to the USENIX Conference Office.  You may telephone to substitute 
another in your place.

*****************************************************************
       REGISTRATION FORM - USENIX  LISA VIII CONFERENCE
*****************************************************************

Please complete the form below and return to the USENIX 
Conference office (address below).

NAME________________________________________________________________
         (first)                                 (last)

FIRST NAME FOR BADGE____________________________

COMPANY OR INSTITUTION______________________________________________

MAILING ADDRESS_____________________________________________________

CITY___________________________STATE_____COUNTRY________ZIP____________

TELEPHONE NO:_________________________FAX NO.___________________________

NETWORK ADDRESS______________________________________________________
                          (Please write legibly)

If you do NOT want to appear in the attendee list, check here: ___

Is this your first LISA Conference?   ___Yes  ___No
What is your affiliation?  ___ Academic ___ Commercial ___ Gov't.
Are you a current member of SAGE?   ___ Yes  ___No
(If you wish to join USENIX and SAGE see below.*)

The address you provide will be used for all future USENIX 
mailings unless you notify us in writing.
==========================================================

TUTORIAL PROGRAM - Monday & Tuesday, September 19-20, 1994

If you wish to participate in the tutorial program, choose EITHER
one full-day tutorial or an AM and PM half-day tutorial per day.
Check the box next to the tutorial you have selected.

MONDAY

[]  M1   - Topics in System Administration
[]  M2   - Advanced Solaris Administration
[]  M3am - Internal Security
[]  M3pm - Managing Time and Talent
[]  M4am - DNS Management
[]  M4pm - Writing Safe SUID Code
[]  M5am - Managing a DCE Environment
[]  M5pm - Legal Issues for System Administrators

TUESDAY

[]  T1   - More Topics in System Administration
[]  T2   - Joining the Internet Safely with UNIX and Firewalls
[]  T3am - Advanced Sendmail Configuration
[]  T3pm - Ethics and Policies
[]  T4am - The Perl Toolbox - Perl by Example
[]  T4pm - NIS+
[]  T5am - The Canons of Computer Services Management
[]  T5pm - Performance Management and Help Desk Management

NOTE: Half day tutorial registration fees are not available.
==========================================================

FEE SCHEDULE for TUTORIAL PROGRAM and TECHNICAL SESSIONS

Tutorial fees - Monday & Tuesday, September 19-20, 1994
        Tutorial program for one day .....................$320.00 _____
          CEU credit for one full tutorial day............$ 15.00 _____
        Tutorial program for two days ....................$590.00 _____
          CEU credit for two full tutorial days...........$ 30.00 _____
Late fee applies after August 29, 1994.................Add$ 50.00 _____

TECHNICAL SESSIONS REGISTRATION FEES
Wednesday, Thursday, Friday, September 21-23, 1994

MEMBER FEE................................................$295.00 _____
   The member fee applies to current individual members
   of the USENIX Association, JUS, EurOpen or AUUG.

NON-MEMBER FEE*...........................................$385.00 _____

Late fee applies after August 29, 1994.................Add$ 50.00 _____

FULL-TIME STUDENT FEE - Pre-registered/On-Site............$ 75.00 _____
(Students must include photocopy of current student I.D.
card with registration form.)

                          TOTAL ENCLOSED...................$_________

Full-time students please note: A limited number of scholarships
are available for full-time students.  Contact the Conference 
Office for details.

*IF YOU WISH TO JOIN OR RENEW USENIX/SAGE, Check Here.......... |_|
Please take $90.00 of my non-member conference registration 
fee to pay for a one year indiviudal membership in USENIX/SAGE.

Payments must accompany registration form.  Purchase orders and 
Vouchers not accepted.

Payment Enclosed (U.S. Dollars).
Make check payable to USENIX CONFERENCE.

CHARGE TO MY:  ___VISA ___MASTERCARD ___AMERICAN EXPRESS ___DINERS CLUB

ACCOUNT NO.______________________________________ EXPIRATION DATE_________

_______________________________________/___________________________
 Print Cardholder's Name                 Cardholder's Signature

You may FAX your registration form if paying by credit card to 
USENIX CONFERENCE OFFICE, FAX + 714 588 9706.  (If you FAX 
registration, to avoid duplicate billing, do not mail additional 
copy. You may telephone our office to confirm receipt of your 
fax.)

REFUND CANCELLATION POLICY:  If you must CANCEL, all refund requests must 
be in writing and postmarked no later than September 12, 1994. Direct 
your letter to the USENIX Conference Office.  
******************************************************************** 
             PAYMENT MUST ACCOMPANY REGISTRATION FORM.
             REGISTRATION VIA EMAIL IS NOT ACCEPTED.
********************************************************************

PLEASE COMPLETE REGISTRATION FORM AND RETURN IT ALONG 
WITH YOUR FULL PAYMENT TO:
USENIX Conference Office
22672 Lambert St., Suite 613
Lake Forest, CA 92630
Telephone + 714 588 8649; FAX + 714 588 9706
Internet Address: confere...@usenix.org
Office Hours: 8:30am-5:00pm Pacific Time

			  SCO's Case Against IBM

November 12, 2003 - Jed Boal from Eyewitness News KSL 5 TV provides an
overview on SCO's case against IBM. Darl McBride, SCO's president and CEO,
talks about the lawsuit's impact and attacks. Jason Holt, student and 
Linux user, talks about the benefits of code availability and the merits 
of the SCO vs IBM lawsuit. See SCO vs IBM.

Note: The materials and information included in these Web pages are not to
be used for any other purpose other than private study, research, review
or criticism.