# The format consists of four fields separated by "|" (vertical bar, aka pipe)
# First two fields are begin and end time.
# Third field is description.
# Fourth field is "note" if there is a note attached.
# If there is a note, it follows starting on the next line,
# and continues until a line with just "end" .

# -------------------
# TECHNICAL SESSIONS
# -------------------

WEDNESDAY, NOVEMBER 6, 2002 8:45 am | 10:30 am|Opening Remarks, Awards, and Keynote|note
Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit)
Jim Reese, Chief Operations Engineer, Google

Want to know how to build an Internet search engine that indexes several terabytes of data--over 3 billion Web documents--and serves it up at a rate of thousands of requests per second? (Hint: Start with a farm of 10,000+ Linux servers.) This talk will cover the technology behind Google: company overview, search parameters and results, hardware and query load balancing, Linux cluster topology, scalability, fault tolerance, and more.
END

11:00 am | 12:30 pm|Refereed Papers|note
Working Smarter
Chair: Aeleen Frisch, Exponential Consulting

Work-Augmented Laziness with the Los Task Request System
Thomas Stepleton, Swarthmore College Computer Society

Spam Blocking with a Dynamically Updated Firewall Ruleset
Deeann M.M. Mikula, Chris Tracy, and Mike Holling, Telerama Public Access Internet

Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System
Michael Gilfix, Tufts University
END

11:00 am | 12:30 pm|Networking|note
Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ???
Brad Knowles, Snow BV

Name server administration is getting harder. With "black hats" trying to break in or use your machine for attacks elsewhere, 5kr1pt-k1dd135 DoS-ing it, and misconfigured clients burying it, you still have to serve your clients. We'll look at DNS server programs for RFC compliance, performance, ease of use, and security. We'll also survey the root and various TLD name servers. Finally, we'll recommend improvements, with particular attention paid to the default installation.
END

11:00 am | 12:30 pm|Invited Talks|note
Security on Macintosh OS X
John Hurley, Apple, Inc.

Leveraging the power of UNIX, many security features have been integrated into Apple's new operating system. The security architecture will be presented, along with ideas on how to configure and use the security features of OS X.
As the Security Policy Architect for Apple, John Hurley works with the Data Security team and other groups at Apple to define the security policies for Mac OS X.
END

11:00 am | 12:30 pm|Guru Sessions|note
SAMBA Guru
Gerald Carter, SAMBA Team/
Hewlett-Packard

Gerald has been a member of the SAMBA Team since 1998. At Hewlett-Packard, he works on Samba-based print appliances and acts as the release coordinator for the SAMBA project. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing and is the author of Teach Yourself Samba in 24 Hours for Sams Publishing.
END

2:00 pm | 3:30 pm|Refereed Papers|note
Service, Risk, and Scale
Chair: Alex Keller, IBM Research

Application Aware Management of Internet Data Center Software
Alain Mayer, CenterRun, Inc.

Geographically Distributed System for Catastrophic Recovery
Kevin Adams, NSWCDD

Embracing and Extending Windows 2000
Jon Finke, Rensselaer Polytechnic Institute
END

2:00 pm | 3:30 pm|Networking|note
Load Balancers
Tony Bourke

Tony Bourke will inspect the changing landscape of server load balancing
technology, including the integration of SSL acceleration, persistence issues, and performance metrics. This talk will go into both problems and solutions for today's site administrator, offering advice on challenges ranging from technical issues to office politics.
END

2:00 pm | 3:30 pm|Invited Talks|note
The Evolving Ethics of System Administration
Lee Damon, University of Washington, & Rob Kolstad, SAGE Executive Director

We'll start with a discussion of the ethics canons of various SAGE organizations and continue on to an interactive, bi-mediated debate on some practical ethical situations from the workplace. Raise your awareness of real-world ethical dilemmas and how to avoid them (or cope with them once they're upon you!).
END

2:00 pm | 3:30 pm|Guru Sessions|note
AFS Gurus
Esther Filderman, Pittsburgh Supercomputing Center, and Garry Zacheiss, MIT

Having worked for Carnegie Mellon University since 1988, Esther has been working with AFS since its toddlerhood. She is currently a Senior Systems Mangler and AFS administrator for the Pittsburgh Supercomputing Center. As a member of the Athena Server Operations team, Garry maintains and expands the AFS cells used by Athena.
END

4:00 pm | 5:30 pm|Refereed Papers|note
Practical Theory
Chair: Paul Anderson, University of Edinburgh

Stem: The System Administration Enabler
Uri Guttman, Stem Systems, Inc.

Pan: A High-Level Configuration Language
Lionel Cons and Piotr Poznanski, CERN, European Organization for Nuclear Research

Why Order Matters: Turing Equivalence in Automated Systems Administration
Steve Traugott, TerraLuna LLC, and Lance Brown, National Institute of Environmental Health Sciences
END

4:00 pm | 5:30 pm|Networking|note
Large-Scale 802.11 Deployment
Tim Pozar, Late Night Software

802.11 technology has significantly reduced the cost and technical knowledge needed to deploy wireless networking, making 802.11 radios attractive not only for the office and home user but to ISPs for last-mile, to educational institutions and corporations for campus networking, and to the Internet activist working on full neighborhood connectivity. This presentation will address what the technology can and can't do, available equipment, security, and the regulatory issues in deploying networks.
END

4:00 pm | 5:30 pm|Invited Talks|note
The Constitutional & Financial Argument Against Spam
Daniel V. Klein, LoneWolf Systems

Spam: you either loathe it or you hate it. It consumes bandwidth, disk space, and, perhaps most important, your time. It is, however, defended by the spammers themselves as an exercise of free speech. We will look at how spammers avoid detection and payment, and how you can defend against spam. The ultimate thrust of the talk will be to show the economic impact of spam and to examine the constitutional arguments against it.
END

4:00 pm | 5:30 pm|Guru Sessions|note
Consulting Guru
Nick Stoughton, MSB Associates

Nick is a principal with MSB Associates. He has been working as a consultant since 1984, with both small and large consulting firms, and has undertaken projects ranging from one day to over one year in duration. Nick is well known as a specialist in International Standards and in help desk systems and has a wealth of experience in Open Systems development and administration.
END



THURSDAY, NOVEMBER 7, 2002 9:00 am | 10:30 am|General Track|note
Logging and Monitoring
Chair: Marcus Ranum, Ranum.com

A New Architecture for Managing Enterprise Log Data
Adam Sah, Addamark Technologies, Inc.

MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis
Tetsuji Takada and Hideki Koike, University of Electro-Communications

Process Monitor: Detecting Events That Didn't Happen
Jon Finke, Rensselaer Polytechnic Institute
END

9:00 am | 10:30 am|Security|note
Internet Security: Beyond Firewalls, Passwords, and Crypto
Peter Salus, Matrix NetSystems, Inc.

If you are safely dug in behind your firewall and everyone in your company employs password security and cryptography, are you OK? No. You're as safe as the inhabitants of a mediaeval city under siege. DDoS attacks and SYN floods render you helpless, for businesses require constant traffic.

Using graphs and numbers from past attacks, this presentation will discuss the nature of such attacks and will suggest ways their effects can be reduced.
END

9:00 am | 10:30 am|Invited Talks|note
Risk-Taking vs. Management
Paul Evans

The fundamental role of operational management in the modern corporation is to balance the equation of putting assets at risk in the service of profit. What happens in a world where management doesn't understand the risks well enough to judge? The experience of the dot-com years gives the answer: managers will underestimate familiar risk and overestimate unfamiliar risk. In combination with the obsessively risk-averse American culture of the 1990s, this fact about human nature produced some very unfortunate economic consequences. Find out what happens when Boss-bert meets the world of production Internet service operations!
END

9:00 am | 10:30 am|Guru Sessions|note
Backups Guru
W. Curtis Preston,
The Storage Group, Inc.

Curtis is the president of a storage consulting firm focused on bridging the gap between customers and storage products. Curtis has ten years' experience designing storage systems for environments both large and small. He has advised the major product vendors regarding product features and implementation methods. Curtis is the administrator of the NetBackup and NetWorker FAQs, and answers the "Ask The Experts" backup forum on SearchStorage.com. He is the author of O'Reilly's UNIX Backup & Recovery and Using SANs & NAS, as well as a monthly column in Storage Magazine.
END

11:00 am | 12:30 pm|Refereed Papers|note
Short Subjects
Chair: Alva Couch, Tufts University

An Analysis of RPM Validation Drift
John Hart and Jeffrey D'Amelia, Tufts University

RTG: A Scalable SNMP Statistics Architecture for Service Providers
Robert Beverly, MIT Laboratory for Computer Science

Environmental Acquisition in Network Management
Mark Logan, Matthias Felleisen, and David Blank-Edelman, Northeastern University

A Simple Way to Estimate the Cost of Downtime
David A. Patterson, University of California at Berkeley
END

11:00 am | 12:30 pm|Security|note
The Promise of Privacy
Len Sassaman, Consultant

More than ten years have passed since the release of the controversial encryption program PGP, which proclaimed itself "encryption for the masses". In this presentation, I will discuss how PGP and other privacy-enhancing technologies have failed in their mission. I will examine the different problems that companies, governments, implementers, and individuals face when attempting to harness the benefits of privacy-enhancing technologies, using PGP as the primary example of these failures.

Among the issues: the importance of usability, reliability, and interoperability, the role of government interference, and public misconceptions.
END

11:00 am | 12:30 pm|Invited Talks|note
So You Want to Do a Startup?
Eric Allman, Sendmail, Inc.

So you want to start your own company. Is it too late to talk you out of it? Let me warn you: it probably won't turn out the way you expect. Company founders have to deal with a maze of annoying but critical details you know nothing about, and you often have to make decisions without all the information you feel you need.

In this talk I'll relate some of my experiences founding Sendmail, Inc. I am (more accurately, used to be) an engineer, so that's the perspective you'll hear. The focus will be on the first six months, but I will also talk about how the company adapted to fast growth followed by the loud pop of the Internet Bubble--and how I've changed and adapted with it.
END

11:00 am | 12:30 pm|Guru Sessions|note
Perl/Scripting Gurus
Daniel V. Klein, LoneWolf Systems, and Mark-Jason Dominus, Plover Systems Co.

Dan Klein started programming in Perl in 1995, about a month before he started teaching it (the best way to learn things is to tackle new problems, and there's no better way to find new problems than to hear other people's). He is the author of dozens of Perl-based Web applications, and tends to specialize in logfile analysis and compression.

Mark-Jason Dominus has been programming in Perl since 1992. He is a moderator of the comp.lang.perl.
moderated newsgroup; the author of the Text::Template, Tie::File, and Memoize modules; a contributor to the Perl core; and author of the perlreftut man page. Last year his work on the Rx regular expression debugger won the Larry Wall Award for Practical Utility.
END

2:00 pm | 3:30 pm|General Track|note
Service and Network Upgrades
Chair: Steve Traugott, TerraLuna LLC

Defining and Monitoring Service-Level Agreements for Dynamic e-Business
Alexander Keller and Heiko Ludwig, IBM T.J. Watson Research Center

HotSwap-Transparent Server Failover for Linux
Noel Burton-Krahn, HotSwap Network Solutions

Over-Zealous Security Administrators Are Breaking the Internet
Richard van den Berg, Trust Factory b.v.; and Phil Dibowitz, University of Southern California
END

2:00 pm | 3:30 pm|Invited Talks 1|note
My Years with the NSA Red Team
Tim Nagle, TRW Systems

Ready for a surprise visit from the Red Team? Tim Nagle will talk about NIST/NSA authorities and their partnership for government information security, and about NSA Information Security services. He'll discuss his experiences: the rules that must be followed, the tools and techniques, the legal issues--and his own views on the "ethical hacker."

Mr Nagle served as Deputy Associate General Counsel (Information Systems Security) at the National Security Agency, acting as the principal legal advisor to all teams conducting government-wide information system and network vulnerability assessments, and directing the procedures to be followed before and during the evaluations.
END

2:00 pm | 3:30 pm|Invited Talks 2|note
Making Backups Easier with Disk
Curtis Preston, The Storage Group

A new weapon in the backup and recovery arsenal: ATA-based, SCSI- and fiber-channel-addressable storage arrays. They come in three flavors, and are turning the backup world on its head.

Why should you look at these new tools? Wonder how they can help you? If you'd like to increase your backup and recovery speeds significantly, and simultaneously get your onsite backups much easier to administer and your offsite backups easier to make, you need to learn about these arrays.
END

2:00 pm | 3:30 pm|Invited Talks 3|note
Email/MTAs Guru
Eric Allman, Sendmail, Inc.

Eric is the original author of sendmail. He is the author of syslog, tset, the -me nroff macros, and trek. He was the chief programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee, and contributed to the Ring Array Processor project at the International Computer Science Institute. He is a former member of the USENIX Board of Directors.
END

4:00 pm | 5:30 pm|Invited Talks|note
"Who ARE These People?" Internet Governance, Peering, and Legislation
Paul Vixie, Internet Software Consortium

As the Internet engineering community ages, it seems as though the "Internet graybeard" population is burgeoning. Who are these people, and what are they doing to our playground? Mr. Vixie, as a member of the loyal opposition, will try to sort it all out for you.
END

4:00 pm | 5:30 pm|Security|note
The Intrusion Detection Timeline
Paul Proctor, Practical Security, Inc.

Numerous intrusion detection technologies can be found on the market today: TCP/IP analysis, log analysis, system call trapping, vulnerability assessment, network-node intrusion detection, file integrity--to name but a few. Each of these has its own value proposition, and each organization has its own requirements. This presentation shows enterprises how to match needs to capabilities so that you can choose the best tools to maximize your security effectiveness and minimize your budget. This is a vendor-neutral presentation.
END

4:00 pm | 5:30 pm|Guru Sessions|note
Project Management Guru
Strata Rose Chalup, VirtualNet Consulting

Strata Rose Chalup has managed project teams on Internet service rollouts from 50K to 500K users, and has managed to keep a sense of humor. Come on down!
END



FRIDAY, NOVEMBER 8, 2002 9:00 am | 10:30 am   |Refereed Papers|note
Security
Chair: Marcus Ranum, Ranum.com

An Approach for Secure Software Installation
V.N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, and Z. Liang, StonyBrook University

Network-based Intrusion Detection-Modeling for a Larger Picture
Atsushi Totsuka, Tohoku University; Hidenari Ohwada, NTT, Tokyo; Nobuhisa Fujita and Debasish Chakraborty, Tohoku University; Glenn Mansfield Keeni, Cyber Solutions, Inc.; Norio Shiratori, Tohoku University

Timing the Application of Security Patches for Optimal Uptime
Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright, WireX Communications, Inc.; Adam Shostack, Zero Knowledge Systems, Inc.
END

9:00 am | 10:30 am|Invited Talks|note
Panel: Nobody Notices Until It's Broken: Self-Marketing for Sysadmins
Moderator: Lee Damon, University of Washington

This panel will explore the issues of keeping your management and co-workers up-to-date on what you do and why it's important. We will include discussion on topics such as how you can let them know why the systems are doing so well, and why they need to keep you around.
END

9:00 am | 10:30 am|Guru Sessions|note
Performance Tuning Guru
Jeff R. Allen, Tellme Networks, Inc.

Jeff has been working in the sysadmin field since 1992. He finds himself drawn to running large, complex systems that serve people who don't want to know they are using a computer (therein lies the complexity). He developed tools for the NOC at WebTV Networks, then moved to Tellme Networks, where today he acts as a bridge between engineering and the NOC, interfaces with the European operations team, and solves tricky problems as they arise.
END

11:00 am | 12:30 pm|Invited Talks 1|note
SysAdmin, Stories, and Signing: Learning from Communication Experts
David Blank-Edelman, Northeastern University

To communicate effectively, you have to know how to tell a good story and how to speak someone else's language. With peers, sysadmins can use the model of storytelling to relate better and to understand the complex, multi-variate scenarios that make up our lives. With other species, such as users and managers, sysadmins can use wisdom gleaned from professional American Sign Language interpreters.

We will test these ideas by applying them to some difficult sample exchanges like those in my "Taxonomy of Useless Support Email Requests." Audience members will leave this talk with concrete tools to improve communication with peers, users, and managers.
END

11:00 am | 12:30 pm|Invited Talks 2|note
Perl 6
Larry Wall, Creator of Perl

Perl has always been good for those little household cleanup chores, but there's nothing so good it can't be improved upon. In this talk Larry will hype the latest and greatest thinking on where Perl 6 is going, and how that will help you get your job done--all for the same low, low price!
END

11:00 am | 12:30 pm|Guru Sessions|note
System Monitoring Guru
Doug Hughes, Global Crossing, Ltd.

System monitoring covers the gamut of activities from intrusion detection through availability to performance and response. Doug Hughes has been doing various forms of system monitoring since the early 1990s. Tools he uses range from such home-grown utilities as cpupie, qps, and various ping and pager scripts, to OS-integrated apps such as vmstat, iostat, and sar, freeware such as SE toolkit, big brother, and netsaint, and commercial suites such as Netcool and OpenRiver. Sites he's monitored include educational/university, commercial, quasi-governmental/financial, and military/industrial.
END

2:00 pm | 3:30 pm|WiPs|note
Work-in-Progress Reports (WiPs)
Chair: Peg Schafer

Can you "whip" up an audience about the most interesting aspects of your current work project in 4 short minutes? As the audience roars for its favorite, will you win the black leather trophy? Short, pithy and fun, the Work-in-Progress (WiP) reports grew from a desire to gather thoughts and suggestions on interesting or ongoing projects. Work-in-Progress Reports are spontaneous; this is where collaborators are discovered and flaws are revealed.

To present a WiP, prepare one or two paragraphs about your project and send them to lisa02wips@usenix.org. These paragraphs will be posted on the WiP boards at the conference, and speakers will be notified in advance. Presenters will have 15 seconds for set-up (clip on mike and plug in laptop/projector), 4 minutes for presentation, 1 minute for questions, then 15 seconds for tear-down. Join the fun! Submit your project today.
END

2:00 pm | 3:30 pm|Invited Talks|note
How to Write a Book with Someone You Don't Know: Internet Collaboration for the Truly Geeky
Tom Limoncelli, Lumeta Corp., and Christine Hogan, Independent Consultant

When Tom and Chris began writing The Practice of System and Network Administration, they faced a few challenges: They didn't know each other. They were five time zones apart. They had to share and interact with gigabytes of data. Amazingly enough, the book was completed, nobody went crazy in the process, and they've still only met in person 7 times. This conference will be the 8th.

While this talk sounds as though it's about collaboration, it's really about system administration. The project had security requirements, reliability requirements, bandwidth requirements, processes to be defined, and tons of scripting. The talk will cover all of these issues and more. We can't imagine how non-sysadmins could ever write a book!
END

2:00 pm | 3:30 pm|Guru Sessions|note
Infrastructures Guru
Steve Traugott, TerraLuna LLC

Steve helped pioneer the term "Infrastructure Architecture" and has worked toward industry acceptance of this SysAdmin++ career track for the last several years. He is a consulting Infrastructure Architect and publishes tools and techniques for automated system administration. His deployments have ranged from financial trading floors and NASA supercomputers to Web farms and growing startups.
END

4:00 pm | 5:30 pm|The LISA Game Show|note
Closing out this year's conference, the LISA Quiz Show will once again pit attendees against each other in a test of technical knowledge and cultural trivia. Host Rob Kolstad and sidekick Dan Klein will provide the questions and color commentary for this always memorable event.
END

# -------------------
# Activities
# -------------------

Tuesday, November 5, 2002 5:30 pm|6:30 pm|Welcome Get-Together|note
Welcome Get-Together and Conference Kick-off with USENIX Board

Meet the conference speakers and connect with your peers in the community.
END


Thursday, November 7, 2002 6:00 pm |8:00pm|Social Event|note
Conference Social Event: Franklin Institute Science Museum

Join your colleagues in what promises to be an evening of fun and learning at the exciting Franklin Institute Science Museum. Just a short shuttle-bus ride from the Philadelphia Marriott, the Museum's exhibits illustrate Benjamin Franklin's scientific genius, from metereology and music to electricity, optics, and aquatics. Get zapped when you visit the Electricity and Electronics exhibit. Explore inner space in the Bioscience gallery. And you won't want to miss Space Station in the IMAX theater: a fascinating documentary that details the building of the International Space Station, it will transport you 220 miles above the earth at 17,500 miles per hour to your new home in orbit. You'll experience life in zero gravity aboard the station and be treated to views that only astronauts and cosmonauts witness.

Enjoy light snacks, accompanied by beer, wine, and soft drinks, as you stroll from gallery to gallery during the evening.

Shuttle transportation will depart from the Philadelphia Marriott at 5:45 pm

One ticket to the Conference Social Event is included in the technical sessions registration fee. If you will not be attending the event, please donate it to another registrant by returning the ticket to the Membership Booth. If the supply of donated tickets has been exhausted, additional tickets may be purchased until noon on Thursday at the Membership Desk for $50 each.
END


Wednesday, November 6, 2002 5:30 pm|6:30 pm|Happy Hour|note
Exhibition Happy Hour, Franklin Hall

Enjoy refreshments and light snacks while visiting the Exhibition. Network with your peers and speak with company representatives while enjoying pizza, beer, and wine.
END



Wednesday, November 6, 2002 7:00 pm|8:00 pm|SAGE Community Meeting|note
SAGE Community Meeting

Hear from the SAGE Executive Committee about what's been happening in SAGE, including certification and community building. You can also find out how to get more involved in SAGE.
END


Thursday, November 7, 2002 8:00 pm|10:00 pm|SAGE Candidates Forum|note
SAGE Candidates Forum

SAGE Executive Committee candidates will be presented, along with their platforms. This is your big chance to hear what candidates think about the future of SAGE and to give your input to the candidates.
END



# ---------------------------------------------------------
# Birds-of-a-Feather Schedule, Current as of Oct. 24, 2002
# ---------------------------------------------------------

TUESDAY, November 5 7:00 pm | 8:00 pm|Samba BoF|note
Samba Community BoF
Jerry Carter, Hewlett-Packard SAMBA Team
Salon A, 5th Floor
END

8:00 pm | 9:00 pm|SPAM BoF|note
SPAM Warriors
Gurusamy Sarathy, ActiveState Corp.
Salon C, 5th Floor
END

8:00 pm | 9:00 pm|Certification BoF|note
SAGE Certification BoF
Salon D, 5th Floor
END

8:00 pm | 9:00 pm|Automating BoF|note
Automating the compilation, distribution, and installation of freely-available software
Albert Chin-A-Young, The Written Word
Salon K, 5th Floor
END

9:00 pm | 11:00 pm|Lesbian, Gay, Bisexual, Transgender and Friends BoF|note
Lesbian, Gay, Bisexual, Transgender and Friends BoF
Trey Harris, SAGE
Salon K, 5th Floor
END


WEDNESDAY, November 6 7:00 pm | 8:00 pm|Herding Cats BoF|note
Herding Cats, or Linux Software Management for the Enterprise
Keith Erskine, Senior Product Manager for Ximian Red Carpet
Salon A, 5th Floor
END

7:00 pm | 8:00 pm|SAGE Community BoF|note
SAGE Community Meeting
Salon I&J, 5th Floor
END

7:00 pm | 9:00 pm|Conserver BoF|note
Conserver, features & futures
David K. Z. Harris, BigBand Networks
Salon K, 5th Floor
END

7:30 pm | 9:30 pm|Legato Hospitality Suite|note
Legato Systems, Inc. Hospitality Suite
Salon D, 5th Floor
END

8:00 pm | 9:00 pm|Mentor BoF|note
SAGE Mentor/Apprentice Meet-n-Greet
Strata R. Chalup, Project Manager, SAGE Mentoring
Salon A, 5th Floor
END

8:00 pm | 10:00 pm|SOLARIS BoF|note
SOLARIS Community BoF
Salon B, 5th Floor
END


THURSDAY, November 7 8:00 pm | 9:00 pm|Data Migration BoF|note
Data Migration and HSM: They're Back and Better Than Ever
Will Spendlove and Mark Brandau, LEGATO Systems, Inc.
Salon D, 5th Floor
END

8:00 pm | 9:00 pm|One person Sysadmin BoF|note
One person Sysadmin Shops: How do you cope with the demand?
John J. Boris, Sr. System Administrator Archdiocese of Philadelphia
Salon K, 5th Floor
END

9:00 pm | 11:00 pm|Candidates BoF|note
SAGE Candidates Forum
Salon I&J, 5th Floor
END

