


default search action
15th LISA 2001: San Diego, California, USA
- Mark Burgess:

Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001. USENIX 2001, ISBN 1-880446-05-7
Opening Remarks, Awards, and Keynote
- Greg Bear:

Keynote Address: Slime vs. Silicon. LISA 2001 - Ernest Prabhakar:

Keynote: Rebuilding the Digital Enterprise Around Internet Standards. LISA 2001 - William LeFebvre:

CNN.com: Facing a World Crisis. LISA 2001
Stirring the Matrix: Organizational System Administration
- Mark D. Roth:

Defining the Role of Service Manager: Sanity Through Organizational Evolution. 1-6 - Dejan Diklic, Venkatesh Velayutham, Steve Welch, Roger Williams:

Remote Outsourcing Services for Multiple Branch Offices and Small Businesses via the Internet. 7-14
Technologies Indistinguishable from Magic: Analytical System Administration
- Robert Apthorpe:

A Probabilistic Approach to Estimating Computer System Reliability (Awarded Best Theory Paper!). 31-46 - Frode Eika Sandnes:

Scheduling Partially Ordered Events in a Randomised Framework: Empirical Results and Implications for Automatic Configuration Management. 47-62 - Alva L. Couch, Noah M. Daniels:

The Maelstrom: Network Service Debugging via "Ineffective Procedures". 63-78
Monte LISA Overdrive: Empirical System Administration
- Patrick O'Rourke, Mike Keefe:

Performance Evaluation of Linux Virtual Server. 79-92 - Larry Lancaster, Alan Rowe:

Measuring Real-World Data Availability. 93-100 - Hårek Haugerud, Sigmund Straumsnes:

Simulation of User-Driven Computer Behaviour. 101-108
Seeing How the LAN Lies: Network Monitoring
- Jürgen Schönwälder:

Specific Simple Network Management Tools. 109-120 - Victor Götsch, Albert Wuersch, Tobias Oetiker:

Gossips: System and Service Monitor. 121-132 - David Moore, Ken Keys, Ryan Koga, Edouard Lagache, Kimberly C. Claffy:

The CoralReef Software Suite as a Tool for System and Network Administrators. 133-144
Level 1 Diagnostics: Short Topics on Host Management
- Yizhan Sun, Alva L. Couch:

Global Impact Analysis of Dynamic Library Dependencies. 145-150 - Serge E. Hallyn, Phil Kearns:

Tools to Administer Domain and Type Enforcement. 151-156 - Lee "Leonardo" Amatangelo, W. Curtis Preston:

Solaris Bare-Metal Recovery from a Specialized CD and Your Enterprise Backup Solution. 157-162 - Willem A. Schreüder:

Accessing Files on Unmounted Filesystems. 163-168
To Your Scattered PCs Go! Distributed Configuration Management
- Todd Poynor:

Automating Infrastructure Composition for Internet Services. 169-178 - Tobias Oetiker:

TemplateTree II: The Post-Installation Setup Tool. 179-186 - Matt Holgate, Will Partain:

The Arusha Project: A Framework for Collaborative UNIX System Administration. 187-198
Human Interface: Timely Solutions
- Mike Wyer, Susan Eisenbach:

LEXIS: An EXam Invigilation System (Awarded Best Applied Paper!). 199-210 - Ellen Spertus, Robin Jeffries, Kiem Sie:

Dynamic Sublists: Scaling Unmoderated Mailing Lists. 211-218 - Stephen J. Okay, Gale E. Pedowitz:

GEORDI: A Handheld Tool for Remote System Administration. 219-230
Adapting the Collective: Short Topics on Configuration Management
- Robin Garner:

Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management. 257-267 - R. P. Channing Rodgers, Ziying Sherwin:

A Management System for Network-Shareable Locally Installed Software: Merging RPM and the Depot Scheme Under Solaris. 267-273 - Andrew Mayhew:

File Distribution Efficiencies: cfengine Versus rsync. 273-276 - Charles Beadnall, Andrew Mayhew:

CfAdmin: A User Interface for cfengine. 277-281
Work-in-Progress Reports
Invited Talks
- Aviel D. Rubin:

Security for E-Voting in Public Elections. LISA 2001 - Peter H. Salus:

2001: A Communications Anniversary. LISA 2001 - Kimberly C. Claffy:

Internet Measurement: Myths About Internet Data. LISA 2001 - Daniel V. Klein:

150/5, 000 Years of (E-)Commerce: History Repeats Itself Again. LISA 2001 - Steve Simmons, Elizabeth D. Zwicky:

Rules of Thumb of System Administration. LISA 2001 - Lee Tien:

What Sysadmins Need to Know About the New Intellectual Property Laws. LISA 2001 - Jim Waldo:

JINI Networking Technology and Ad-Hoc Networks. LISA 2001 - Ruth Milner:

Reducing System Complexity: A Case Study in Converging Environments. LISA 2001 - W. Curtis Preston:

SANs and NAS. LISA 2001 - Michel Pelletier:

Zope. LISA 2001 - David N. Blank-Edelman:

If I Could Talk to the Animals--What Sysadmins Can Learn About Diagnostic Skills from Another Profession. LISA 2001 - Geoff Halprin:

The Problem with Developers. LISA 2001 - Shane Caraveo:

PHP for System Administration. LISA 2001 - Phil Cox:

Hardening Windows 2000. LISA 2001
To Teraflops and Beyond!
- Esther Filderman, Kevin Sullivan, Victor Hazlewood:

Panel: An Overview of Terascale Computing. LISA 2001 - Victor Hazlewood:

Invited Talk: San Diego Supercomputer Center's Blue Horizon. LISA 2001 - Esther Filderman, Kevin Sullivan:

Managing the Terascale: Lessons from a 750-Node Supercomputer. LISA 2001 - Esther Filderman, Kevin Sullivan, Victor Hazlewood:

Wrap-Up and Q & A. LISA 2001 - Panel: Written Any Good Books Lately? LISA 2001

- Panel: Scripting Languages Bake-Off. LISA 2001

Network/Security
Illuminating the Dark Side: Short Topics on Security Issues (1 Talk, 3 Papers)
- Gregory G. Rose:

Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk. - Peter D. Gray:

SUS, an Object Reference Model for Distributing UNIX Super User Privileges. 15-18 - Reiner Sailer, Arup Acharya, Mandis Beigi, Raymond B. Jennings III, Dinesh C. Verma:

IPSECvalidate: A Tool to Validate IPSEC Configurations. 19-24 - Niels Provos, Peter Honeyman:

ScanSSH: Scanning the Internet for SSH Servers. 25-30 - Gordon Cook:

Whither End-to-End: Placing Bandwidth and Trust at the Edge. LISA 2001 - Steve Burnett:

Crypto Blunders. LISA 2001
Control Central: Three Talks on New Approaches to Security Management
- Mark Epstein:

A Non-Traditional Approach to Network Security Control. LISA 2001 - Æleen Frisch:

Beyond File Permissions: Controlling User Actions. - Hal Pomeranz:

Are Baseline Computer Security Standards the Answer? LISA 2001
The Packet Crackdown: Talks on TCP Performance Tuning and Packet Capture
- Thomas J. Hacker:

TCP Performance Tuning. LISA 2001 - Michael T. Stolarchuk:

BPF Meets UVM. - Avishai Wool:

How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001
The Network from Orbit: A Global Perspective
- Marina Fomenkov, Kimberly C. Claffy, Bradley Huffaker, David Moore:

Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers. 231-240 - Nevil Brownlee, Kimberly C. Claffy, Evi Nemeth:

DNS Root/g TLD Server Measurements. 241-256 - John S. Flowers:

Inspection, Detection & Deflection: Armoring the Next Wave of Security Technology. LISA 2001 - Panel: The Future of Computer Security. LISA 2001

Guru Sessions
- Gerald Carter:

LDAP. LISA 2001 - Esther Filderman, Garry Zacheiss:

AFS. LISA 2001 - Steve Traugott:

Infrastructure Architecture. LISA 2001 - Gregory G. Rose:

PKI/Cryptography. LISA 2001 - Thomas A. Limoncelli:

Writing Papers for Usenix Refereed Track. LISA 2001 - W. Curtis Preston:

Backups. LISA 2001 - Bill Labrie:

Sysadmin for Suits. LISA 2001 - Eric Allman:

Email MTAs. LISA 2001 - Adam Moskowitz:

Computer Room Design/Layout. LISA 2001

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














