SAGE Community Meeting	MARDI GRAS D
Tuesday, December 5, 6:00 pm-7:00 pm

SAGE Candidates Forum	MARDI GRAS D, E
Thursday, December 7, 5:30 pm-6:30 pm

Birds-of-a-Feather Sessions (BoFs)

Tuesday, December 5 	6:00-10:00PM
Wednesday, December 6 	7:00-11:00PM
Thursday, December 7	9:30-11:30PM

Work-in-Progress Reports (WiPs), MARDI GRAS D-H
Friday, December 8, 2:00-3:30 pm

LISA 2000 Exhibition
Wednesday-Thursday, December 6-7
Location: Exhibit Hall
Hours:	Wednesday, Dec. 6	Noon-7pm
		Thursday, Dec. 7	10:00am-4pm

SOCIAL ACTIVITIES

Welcome Reception	LA GALERIE 1, 2, 3
Saturday, December 2, 6:00 pm-8:00 pm

Conference Kickoff & Student Orientation	LA GALERIE 4, 5, 6
Saturday, December 2, 8:00 pm-9:00 pm

Exhibition Beer & Wine Bust		EXHIBIT HALL & LA GALERIE 1, 2, 3
Wednesday, December 6, 5:30 pm-7:00 pm

Conference Reception	GRAND BALLROOM
Thursday, December 7, 7:30 pm-9:30 pm

***************************************************************************
USENIX - LISA 2000 - Technical Sessions

WEDNESDAY, DECEMBER 6, 2000   

9:00 am - 10:30am
BISSONET/CARONDELET

Opening Remarks, Awards, and Keynote
Keynote Address:  The World-Wide Syndicate

J.D. "Illiad" Frazer, Co-founder and creator of UserFriendly

J.D. will discuss how the Internet and on-line communities have 
enabled creators
to offer their work directly to audience members without the traditional
middleman.

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

Deep Thoughts
Session Chair: Rmy Evard, Argonne National Laboratory

Theoretical System Administration
Mark Burgess, Oslo College

An Expectant Chat About Script Maturity
Alva L. Couch, Tufts University

An Improved Approach for Generating Configuration Files from a Database
Jon Finke, Rensselaer Polytechnic Institute

INVITED TALKS
	ACADIA

How Not to Get Fleeced with Employee Stock Options
Jon Rochlis, The Rochlis Group, Inc.

Having stock options can be very rewarding, but if you don't know the rules of
the game you can easily stumble across surprises that lower the value of your
options or give you large tax bills. Even many "financial advisors" can be
confused and make costly mistakes. This talk will cover the basics of employee
stock options--types of stock, stock options (qualified and non-qualified),
stock purchase plans, the IPO process, taxation, risks, strategies, valuation,
and advanced tax planning.

NETWORK TRACK
	CARONDELET

Deploying Quality
of Service Features on Your Network
Eliot Lear, Cisco Systems

A lot of trade press has been given to the phrases Quality of Service, Voice
over IP, and the like. This talk will discuss what it means to give precedence
to certain applications on your network, what sort of applications need
preferential treatment, what some of the pitfalls are, and how to know when
you've fallen into one of those pits. It will also look at the future of QoS.


12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

You, a Rock, and a Hard Place
Session Chair: Christine Hogan, Imperial College

FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a
Large-scale Samba Service
Robert Beck and Steve Holstead, University of Alberta

Designing a Data Center Instrumentation System
Robert Drzyzgula, Federal Reserve Board

Improving Availability in VERITAS Environments
Karl Larson, Tellme Networks, and Todd Stansell, Certainty Solutions

INVITED TALKS
	ACADIA

SAGE Update
Barb Dijker, SAGE President

Detailed status updates and information about the development of SAGE projects
will be presented: progress on certification, last year's salary survey results
and what's new this year, marketing SAGE to gain recognition and credibility,
student sysadmin internships, mentoring, and internationalization.

NETWORK TRACK
	CARONDELET

Analyze This!
Session Chair: William LeFebvre, CNN Internet Technologies

Wide Area Network Packet Capture and Analysis
Jon T. Meek, American Home Products Corp

Sequencing of Configuration Operations for IP Networks
P. Krishnan, ISPsoft, Inc.; T. Naik, Bell Labs; G. Ramu, CoSine 
Comm., Inc.; and R. Sequeira, ISPsoft, Inc.

ND: A Comprehensive Network Administration and Analysis Tool
Ellen L. Mitchell, Eric Nelson, and David Hess, Texas A&M University

3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

Users and Passwords and Scripts, Oh My!
Session Chair: Trey Harris, Mail.com

User-Centric Account Management with Heterogeneous Password Changing
Douglas Hughes, Auburn University

Pelendur: Steward of the Sysadmin
Matt Curtin, Interhack Corp.; Sandy Farrar, and Tami King, The Ohio 
State University

Network Information Management and Distribution in a Heterogeneous and
Decentralized Enterprise Environment
Alexander D. Kent and James R. Clifford, Los Alamos National Laboratory

INVITED TALKS
	ACADIA

The Digital House
Lorette Cheswick, cheswick.com

The Cheswicks have been computerizing their house since 1981. They have bent
computer-age services to their very idiosyncratic needs: they are 
alerted to the
arrival of snail-mail, they know who's at their front door, and their family
photo album has become a Web site. A Linux text-to-speech application announces
phone callers, the weather, and iridium flares. Cron wakes up their kids and
performs other tasks. The whole family is involved planning new applications.
But wait, there's more!

NETWORK TRACK
	CARONDELET

Go with the Netflow
Session Chair: David Williamson, Certainty Solutions

Combining Cisco NetFlow Exports with Relational Database Technology for Usage
Statistics, Intrusion Detection, and Network Forensics
Bill Nickless, John-Paul Navarro, and Linda Winkler, Argonne National
Laboratory

The OSU Flow-tools Package and CISCO NetFlow Logs
Mark Fullmer, OARnet, and Steve Romig, The Ohio State University

FlowScan: A Network Traffic Flow Reporting and Visualization Tool
Dave Plonka, University of Wisconsin. Madison


THURSDAY, DECEMBER 7, 2000   

9:00 am - 10:30 am

INVITED TALKS
	BISSONET/ACADIA

Dr. Felten Goes to Washington: A Personal View of the Microsoft Case
Edward Felten, Princeton University

Edward Felten recently served as an expert witness in the Microsoft antitrust
case and as a consultant to the Department of Justice. He will talk about his
experiences in working on this high-profile case, and what he learned about the
law, economics, computer science, and connections among them.

NETWORK TRACK
	CARONDELET

[To Be Announced]

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

The Toolshed
Session Chair: Phil Scarr, Certainty Solutions

xps--Dynamic Process Tree Watching Under X
Rocky Bernstein, Breakaway Solutions

Extending UNIX System Logging with SHARP
Matthew Bing and Carl Erickson, Grand Valley State University

Peep (The Network Auralizer): Monitoring Your Network with Sound
Michael Gilfix and Alva Couch, Tufts University


INVITED TALKS
	ACADIA

Experiences with Incident Response at The Ohio State University
Steve Romig, The Ohio State University

Steve will talk about his experiences with incident response at OSU. He'll talk
briefly about the formation and current structure of the OSU incident response
team, the services they provide, and how they approach incident response. The
majority of the talk will cover real-life successes and failures (and amusing
anecdotes) from a large and long-running investigation of two local cracking
groups.


NETWORK TRACK
	CARONDELET

Broadband Changes Everything
Brent Chapman, Great Circle Associates, Inc.

End users today are connecting to the Internet at speeds that, a 
couple of years
ago, were available at only the best-connected sites and were shared 
by hundreds
or even thousands of users. And the "always on" nature of broadband 
is likely to
have even more fundamental and far-reaching consequences. This talk will give
you an introduction to end-user broadband services and an idea of how they'll
change your life both as a user and as a network manager.


12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

1984
Session Chair: Jeff Allen

Thresh--A Data-Directed SNMP Threshold Poller
John Sellens, Certainty Solutions

eEMU: A Practical Tool and Language for System Monitoring and Event
Management
Jarra Voleynik, eEMUconcept Pty Ltd

Aberrant Behavior Detection in Time Series for Network Service Monitoring
Jake D. Brutlag, Microsoft WebTV


INVITED TALKS
	ACADIA

Integrating LDAP in a Heterogeneous Environment
Leif Hedstrom, Netscape

This talk discusses the intricacies and obstacles, as well as the joy, in
integrating LDAP into a heterogeneous environment at Netscape. The 
audience will
learn from our experiences, as well as find out what is available today. Not
just a beginner's guide to LDAP, the presentation emphasizes a primarily UNIX
environment but of course covers Windows NT and 2000 integration.


SECURITY TRACK
	CARONDELET

Cops are from Mars, Gurus are from Pluto: Dealing with "the Feds" and 
Other Cops
Tom Perrine, Pacific Institute of Computer Security

Every system administrator will have to deal with law enforcement at some time,
usually in connection with a security incident. This talk is about how to
interact with them effectively. It covers cultural differences and language
barriers, differing goals, ways to build bridges, and how to spot a "fake Fed."
Jurisdictional issues, preserving evidence, and guidelines for testifying in
court are also covered.


3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

The Sorcerer's Apprentice
Session Chair: Josh Simon, Collective Technologies

PIKT, "Problem Informant/Killer Tool"
Robert Osterlund, University of Chicago

Relieving the Burden of System Administration Through Support Automation
Allan Miller and Alex Donnini, HandsFree Networks

FTP Mirror Tracker: First Steps Towards URN
Alexei Novikov, ITEP, and Martin Hamilton, Loughborough Univ, UK,

INVITED TALKS
	ACADIA

Mapping Corporate Intranets and Internets
Bill Cheswick, Lumeta Corporation

Bill will talk about what the researchers at Bell Labs and Lumeta have learned
about mapping corporate intranets. As intranets grow they become more difficult
to track. By mapping corporate networks they have been able to find security
problems, gain a better understanding of what's out there, and provide pretty
pictures of the network which management finds useful.

SECURITY TRACK
	CARONDELET

Does It Take the Same Skill Set to Secure a System as to Break into It?
Panelists: Peter Shipley, Lab OneSecure Inc.; Mark Hardy, Guardent, 
Inc.; and Elias Levy, securityfocus.com

With myriad companies bidding for the contract to secure your 
Internet services,
two questions arise: (1) "What does it take to do the job?" (2) "If 
this company
hires 'reformed hackers,' is that good or bad?" Are these people competent?
Should you contract with a company that employs reformed hackers or convicted
felons? Conversely, why should you trust a company that doesn't have people who
know security from both sides? This panel includes representatives from the
cracking community, corporate and professional services, and law enforcement.


FRIDAY, DECEMBER 8, 2000   

9:00 am - 10:30am

REFEREED PAPERS
	MARDI GRAS D-H

Fully Automatic
Session Chair: John Orthoefer, Genuity Inc.

Deployme: Tellme's Package Management and Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks

Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University

Use of Cfengine for Automated, Multi-Platform Software and Patch
Distribution
David Ressman and John Valdes, University of Chicago


INVITED TALKS
	ACADIA

The Design and Implementation of Highly Scalable Email Systems
Brad Knowles, Belgacom Skynet SA/NV

Email systems can scale larger than had been thought possible! This talk will
detail fundamental flaws in the current mailbox-per-user paradigm of standard
off-the-shelf Local Delivery Agent software. It will describe how they can be
scaled up to handle many more users, how virtually all synchronous metadata and
file locking can be eliminated, how storage requirements can be reduced to grow
at a rate less than O(n), and how various services can be broken out and
handled by multiple separate servers.


SECURITY TRACK
	CARONDELET

Real-World Intrusion Detection--First Steps
Mark K. Mellis, SystemExperts Corporation

For decades intrusion detection has been desired but rarely implemented at most
organizations. Finally, emerging technologies and proven techniques are making
intrusion detection not only possible but downright practical. This talk is
addressed to all technical staff and managers who want to understand how to
practice integrated intrusion detection at their site. Examples of actual
scripts and a discussion of when to use them will be included.


10:30 am - 11:00 am   Break
11:00 am - 12:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

Building Blocks
Session Chair: Ruth Milner, NRAO

Unleashing the Power of JumpStart--A New Technique for Disaster Recovery,
Cloning, or Snapshotting a Solaris System
Lee Amatangelo, Collective Technologies

A Linux Appliance Construction Set
Michael W. Shaffer, Agilent Labs RCS

Automating Dual Boot (Linux & NT) Installations
Rajeev Agrawala, Shaun Erickson, and Robert Fulmer, Lucent/Bell Labs
Research

INVITED TALKS
	ACADIA

SANs--From A to Reality
W. Curtis Preston, Collective Technologies

Storage Area Networks (SANs) are showing up everywhere. Many IT managers have
been overheard making statements such as, "We're going to completely get rid of
X, Y, and Z, and replace it with a SAN," or "We've got to have a SAN road map."
This talk gives you the information you need to be able to respond 
appropriately
to such statements, and it includes examples of real-life applications of SAN
technology so that you can decide whether or not a SAN is in your future.


SECURITY TRACK
	CARONDELET

Someone's Knocking at the Door
Session Chair: Cat Okita, Global Crossing Ltd.

Tracing Anonymous Packets to Their Approximate Source
Hal Burch, Carnegie Mellon Univ, and Bill Cheswick, Lumeta Corporation

Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center; Neil Long, Oxford 
University; and David Dittrich, University of Washington

12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm

REFEREED PAPERS
	MARDI GRAS D-H

Work-in-Progress Reports
Session Chair: Peg Schafer, Harvard University

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or
on-going work, and the LISA audience provides valuable discussion and feedback.

A schedule of presentations will be posted at the conference.

To present a WiP, please see the  submission instructions.

INVITED TALKS
	ACADIA

Why the Documentation Sucks and What You Can Do About It
Steven Levine, SGI

System administrators often complain about documentation. It can be 
difficult to
find just the right information in the circumstances you most need it. Why is
this so? This talk will discuss some inherent difficulties of writing
administration documentation, presented from the point of view of a technical
writer. It will also present proposals for how system administrators and
technical writers can work together to improve the general state of
administration documentation.


SECURITY TRACK
	CARONDELET

. . . Don't Let Them In
Session Chair: Simon Cooper, SGI

YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox PARC

SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, and
Virgil Gligor, WireX Communications, Inc.

NOOSE--Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research & Development


3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm

The LISA Game Show, with your host, Rob Kolstad
	BISSONET/CARONDELET

Back by popular demand, Rob Kolstad hosts this challenging test of wits for
LISA attendees.  Watch contestants wither under the dual spotlights 
of difficult
questions and special attention of the moderator.  Entry forms for contestants
available Thursday around noon.

******************************************************************************
USENIX - LISA 2000 - Guru Is In Schedule
Wednesday - Friday, December 6 - 8, 2000     (MARDI GRAS A, B)

Co-location Services/Hosting
Wednesday, 11:00am-12:30pm
Cat Okita, Global Crossing

Automated Sysadmin
Wednesday, 2:00-3:30pm
Mark Burgess, Oslo University College

Java, RDBMS
Wednesday, 4:00-5:30pm
Scottie Swenson, Cellworks Project, University of Washington

Wireless Ethernet (802.11)
Thursday, 9:00-10:30am
Tom Limoncelli, Lucent Technologies/Bell Labs

W2K Kerberos/"Active Directory"--MIT Kerberos KDC integration
Thursday, 11:00am-12:30pm
Steven Freed, Industrial Light & Magic

Customer Relations and Help Desk Issues
Thursday, 2:00-3:30pm
Nick Stoughton, Webvan Group Inc.

Incident Response/Network Activity Logging and Tools
Thursday, 4:00-5:30pm
Steve Romig, The Ohio State University

Systems Programming
Friday, 9:00-10:30am
Doug Hughes, Auburn University College of Engineering

Managing SysAdmins
Friday, 11:00am-12:30pm
Strata Rose Chalup

Broadband
Friday, 2:00-3:30pm
Brent Chapman, Great Circle Associates, Inc.
