Lisa08 Brochure
Lisa08 Brochure
administration training
22ND LARGE INSTALLATION SYSTEM
ADMINISTRATION CONFERENCE
San Diego
CALIFORNIA
KEYNOTE ADDRESS
Implementing Intellipedia Within
a Need to Know Culture by Sean
Dennehy, Chief of Intellipedia
Development, Directorate of Intelligence, U.S. Central Intelligence
Agency
PLENARY SESSIONS
Reconceptualizing Security, by
Bruce Schneier, Founder and CTO,
BT Counterpane
The State of Electronic Voting,
2008, by David Wagner, University
of California, Berkeley
6 DAYS OF TRAINING
SPONSORED BY
&
lisa 08 at a glance
Saturday, November 8
5:00 p.m.8:00 p.m. On-Site Registration
Sunday, November 9
7:30 a.m.5:00 p.m. On-Site Registration
9:00 a.m.5:00 p.m. Training Program
9:00 a.m.5:00 p.m. Workshop: Fighting Spam
9:00 a.m.5:00 p.m. Workshop: MicroLISA
9:00 a.m.12:30 p.m. Workshop: BusinessDriven IT Management
1:30 p.m.5:00 p.m. Workshop: Configuration
Management
Monday, November 10
7:30 a.m.5:00 p.m. On-Site Registration
9:00 a.m.5:00 p.m. Training Program
9:00 a.m.5:00 p.m. Workshop: University Issues
9:00 a.m.5:00 p.m. Workshop: ZFS
9:00 a.m.5:00 p.m. Workshop: Government
and Military System
Administration
7:00 p.m.11:00 p.m. Birds-of-a-Feather Sessions (BoFs )
Tuesday, November 11
7:30 a.m.5:00 p.m. On-Site Registration
9:00 a.m.5:00 p.m. Training Program
9:00 a.m.5:00 p.m. Workshop: Advanced Topics
9:00 a.m.5:00 p.m. Workshop: Best Practices in the
Server Room
9:00 a.m.5:00 p.m. Workshop: Virtual Infrastructures
7:00 p.m.11:00 p.m. Birds-of-a-Feather Sessions (BoFs )
Wednesday, November 12
7:30 a.m.5:00 p.m. On-Site Registration
8:45 a.m.10:30 a.m. Opening Remarks, Awards, and
Keynote
9:00 a.m.5:00 p.m. Training Program
11:00 a.m.5:30 p.m. Technical Sessions
Noon7:00 p.m.
Vendor Exhibition
5:30 p.m.6:30 p.m. Exhibit Hall Happy Hour
6:30 p.m.7:30 p.m. Poster Session
7:30 p.m.11:30 p.m. Birds-of-a-Feather Sessions (BoFs )
Thursday, November 13
7:30 a.m.5:00 p.m. On-Site Registration
9:00 a.m.5:00 p.m. Training Program
9:00 a.m.5:30 p.m. Technical Sessions
10:00 a.m.2:00 p.m. Vendor Exhibition
5:30 p.m.6:30 p.m. Poster Session
6:30 p.m.8:30 p.m. Reception
8:30 p.m.11:30 p.m. Birds-of-a-Feather Sessions (BoFs )
Friday, November 14
8:00 a.m.noon
9:00 a.m.5:00 p.m.
9:00 a.m.3:30 p.m.
4:00 p.m.5:30 p.m.
On-Site Registration
Training Program
Technical Program
Closing Session
LISA 08 is still the meeting place of choice for system, network, database, and
other computer administrators and engineers from all over the world. Take
advantage of 6 days of top-notch training and return with the skills you need to
take your career to new heights.
Dear Colleague,
On behalf of all of the LISA 08 organizers, Id like to invite you to join us in San Diego, CA, for
the 22nd Large Installation System Administration Conference.
For the past 20 years LISA has been the focal point for the global community of system and
network administrators. This year LISA continues that tradition, featuring innovative tools
and techniques essential for your professional and technical development.
Take advantage of the popular 6 days of training. Select from over 50 tutorials taught by highly
expert instructors, including:
Mark Burgess on Integrating Cfengine into Organizational Service Management
Tom Christiansen on Advanced Perl
David N. Blank-Edelman on Over the Edge System Administration
Plus, new in 2008, were offering tracks on virtualization and on Solaris. These two 6-day
series include classes such as:
Peter Baer Galvin on Solaris 10 Administration
Jim Mauro on Solaris Dynamic Tracing (DTrace)
Richard McDougall on VMware ESX Performance and Tuning
In addition to the training, 3 days of technical sessions include top-notch refereed papers,
informative invited talks, expert Guru Is In sessions, and a poster sesson.
Our 20+ invited talks feature our most impressive slate of speakers to date. They include:
Keynote Address: Implementing Intellipedia Within a Need to Know Culture, by Sean
Dennehy, Chief of Intellipedia Development, Directorate of Intelligence, U.S. Central
Intelligence Agency
Plenary Session: Reconceptualizing Security, by Bruce Schneier, Chief Security Technology Officer, BT
Plenary Session: The State of Electronic Voting, 2008, by David Wagner, University of
California, Berkeley
LISA is the premier forum for presenting new research in system administration. We selected
papers showcasing state-of-the-art work on topics including configuration management,
parallel systems deployment, virtualization, and security.
Bring your perplexing technical questions to experts at LISAs Guru Is In sessions.
Explore the latest commercial innovations at the Vendor Exhibition.
Benefit from opportunities for peer interaction (a.k.a. the Hallway Track).
Take advantage of the live streaming opportunities.
Early registration discounts for LISA 08, taking place November 914, 2008, in San Diego, are
now available. Register by Friday, October 17, and save up to $300!
Were pleased to bring LISA to San Diego and we look forward to seeing you there.
Mario Obejas, Raytheon
LISA 08 Program Chair
Program Chair
Mario Obejas, Raytheon
Program Committee
Paul Anderson, University of Edinburgh
Derek Balling, Answers Corporation
Travis Campbell, AMD
Narayan Desai, Argonne National
Laboratory
leen Frisch, Exponential Consulting
Brent Hoon Kang, University of North
Carolina at Charlotte
Chris McEniry, Sony Computer
Entertainment America
Adam Moskowitz, Permabit Technology
Corporation
David Parter, University of Wisconsin
David Plonka, University of Wisconsin
Kent Skaar, BMC Software, Inc.
Invited Talks Coordinators
Rudi van Drunen, Competa IT/Xlexit
Philip Kizer, Tekelec
Workshops Coordinator
Lee Damon, University of Washington
Guru Is In Coordinator
John Rowan Littell, California College
of the Arts
Work-in-Progress Reports and Posters
Coordinators
Brent Hoon Kang, University of North
Carolina at Charlotte
Gautam Singaraju, University of North
Carolina at Charlotte
USENIX Board Liaison
Alva L. Couch, Tufts University
The USENIXAssociation Staff
discoun
t
bird
ly
r
r by
registe
ea
OCT 17 08
www
. use nix . o rg /
lisa
20
08
ird discount
yb
rl
a
er by
regist
e
Training AT A GLANCE
OCT 17 08
www
. use nix . o rg /
lisa
20
08
Sunday, November 9
Monday, November 10
M1
S2
M2
S3
M3
M4
S4
M5
S5
M6
S6
S7
M7
S8
M8
M9
S9
LISA now offers two 6-day series of classes, focusing on some of the
most important topics youll encounter: virtualization and Solaris.
Follow the icons throughout the training section and complete the
series. See p. 14 for more information about these special tracks.
=
T3
T4
T5
T6
W6
T7
W7
T8
W8
Thursday, November 13
R1
R2
T9
R3
R4
R5
R6
Friday, November 14
Full Day: 9:00 a.m.5:00 p.m.
W3
F2
W4
F3
W5
F4
ird discount
yb
rl
a
er by
regist
e
Training PROGRAM
Full Day (9:00 a.m.5:00 p.m.)
www
S5
lisa
20
08
OCT 17 08
. use nix . o rg /
Topics include:
How the kernel is organized
Ground rules of kernel
programming
Implementation and properties of
the most important algorithms
Comparison between Linux and
UNIX kernels, with emphasis on
differences in algorithms
Details of the Linux scheduler
The virtual memory subsystem
Linuxs virtual file system layer
A quick tour through Linuxs networking stack
Half Day Morning (9:00 a.m.12:30 p.m.)
S6
S8
Topics include:
Oral and written communication
Understanding others
Time, risk, and project management
Half Day Afternoon (1:30 p.m.5:00 p.m.)
S9
Sunday, NOVEMBER 9
Training PROGRAM
Full Day (9:00 a.m.5:00 p.m.)
ird discount
yb
rl
a
er by
regist
e
www
OCT 17 08
. use nix . o rg /
lisa
20
08
MONDAY, NOVEMBER 10
ird discount
yb
rl
a
er by
regist
e
Training PROGRAM
Topics include:
Introduction to DTrace
DTrace components
Using DTrace
DTrace in open source software
Advanced topics
www
T5
T4
lisa
20
08
T3
OCT 17 08
. use nix . o rg /
Topics include:
Modular shell script programming
Writing secure shell scripts
Performance tuning
Addressing portability at the design
stage
T6
T8
T9
TUESDAY, NOVEMBER 11
Training PROGRAM
Half Day Afternoon (1:30 p.m.5:00 p.m.)
continued from p. 9
Attention managers:
why you should send your
employees to LISA 08
Hiring the best and the brightest is the
ultimate goal for any employer. However,
keeping current employees up to par is
just as important. Technology continues
to evolve. To stay ahead of the game, your
employees must continue to enhance
their skills.
The training program at LISA 08 offers a
cost-effective, one-stop shop for training
current IT and development employees. Over 55 full- and half-day tutorials
taught by the most respected leaders in
the field provide an unparalleled opportunity to learn from the best. Tutorials
cover a multitude of system administration topics including open source technologies, security, and defeating spam.
New in 2008, the two training series on
Solaris and virtualization provide your
employees with the opportunity for more
focused training on two of todays most
important topics.
Combining days of training with days of
technical sessions on groundbreaking
research related to system and network
administration makes the LISA 08 experience even more valuable. Additionally,
the evening receptions and BoF sessions provide your staff with a chance to
network with peers and industry leaders
to gain that all-important insider IT
knowledge that will keep your company
current and running smoothly.
Keeping up with technology can be costly
and time-consuming in this unforgiving economy: take full advantage of this
opportunity to have your staff learn from
the top researchers, practitioners, and
authors all in one place, at one time.
WEDNESDAY, NOVEMBER 12
Training PROGRAM
Full Day (9:00 a.m.5:00 p.m.)
THURSDAY, NOVEMBER 13
F3
Topics include:
Replacing an NIS domain with an
LDAP directory
Integrating Samba domain file and
print servers
Integrating MTAs such as Sendmail
and Postfix
Creating customized LDAP schema
items
Examining scripting solutions for
developing your own directory
administration tools
F4
FRIDAY, NOVEMBER 14
Our Guarantee
If youre not happy, were not happy. If
you feel a tutorial does not meet the
high standards you have come to expect
from USENIX, let us know by the first
break and we will change you to any
other available tutorial immediately.
Topics include:
Generator functions
Iteration protocol and properties
Database API
Graphical capabilities
ird discount
yb
rl
a
er by
regist
e
www
OCT 17 08
. use nix . o rg /
lisa
20
08
Solaris Series
Sunday, November 9
S1 Virtualization! Whats It Good For?
leen Frisch and Kyrre Begnum
Sunday, November 9
S2 Solaris 10 Performance, Observability, and Debugging
James Mauro
Monday, November 10
M1 Introduction to the Open Source Xen Hypervisor
Stephen Spector, Wenjin Hu, and Zach Shepherd
Monday, November 10
M2 System and Network Performance Tuning
Marc Staveley
Tuesday, November 11
T1 Virtualization with VMware ESX 3i for UNIX Administrators:
The Fundamentals
John Arrasjid and Shridhar Deuskar
Tuesday, November 11
T2 Solaris Dynamic Tracing: DTrace
James Mauro
Wednesday, November 12
W1 Virtualization with VMware ESX 3i for UNIX Administrators:
Advanced Topics
John Arrasjid and Shridhar Deuskar
Thursday, November 13
R1 Securing Virtual Servers: XenServer and VMware ESX Server
Phil Cox
Friday, November 14
F1 VMware ESX Performance and Tuning
Richard McDougall
Wednesday, November 12
W3 Solaris 10 Administration Workshop 1: Administration
(Hands-on)
Peter Baer Galvin and Marc Staveley
W6
Thursday, November 13
R3 Solaris 10 Administration Workshop 3: File Systems
(Hands-on)
Peter Baer Galvin and Marc Staveley
R5
Friday, November 14
F2 Resource Management with Solaris Containers
Jeff Victor
Training INSTRUCTORS
John Arrasjid
Mark Burgess
Mike Ciavarella
T1, W1
T8, T15
Training INSTRUCTORS
Phil Cox
Shridhar Deuskar
leen Frisch
R1
T1, W1
S1, M4, W5
Shridhar Deuskar is an
experienced professional
in the IT industry. He has
over 10 years of experience
in system administration of
UNIX and Windows servers. He has consulted with companies such as Caterpillar,
HP, and EMC. Currently he is a Consulting
Architect in VMwares Professional Services
organization and is responsible for delivering services tied to virtualization to clients
worldwide.
Jacob Farmer
T6, T13
Jacob Farmer is a wellknown figure in the data
storage industry. He has
written numerous papers
and articles and is a regular speaker at trade shows and conferences.
In addition to his regular expert advice
column in the Reader I/O section of InfoStor
Magazine, the leading trade magazine of the
data storage industry, Jacob also serves
as the publications senior technical advisor. Jacob has over 18 years of experience
with storage technologies and is the CTO of
Cambridge Computer Services, a national
integrator of data storage and data protection solutions.
Rik Farrow
M8
Rik Farrow has been teaching UNIX security classes
since 1987. He wrote the
second book on UNIX security, as well as hundreds
of security-related articles. His experience
with Linux security goes back over ten years
and has led him to believe that sandboxing
applications with SELinux is not just a good
idea, but necessary. Rik Farrow is also editor
of ;login:.
Simson L. Garfinkel
Steve Holden
Peter Losher
S4, M3
F4
W8
Simson L. Garfinkel is
an Associate Professor
at the Naval Postgraduate School in Monterey,
CA, and a fellow at the
Center for Research on Computation and
Society at Harvard University. He is also the
founder of Sandstorm Enterprises, a computer security firm that develops advanced
computer forensic tools used by businesses
and governments to audit their systems.
Garfinkel has research interests in computer
forensics, the emerging field of usability and
security, information policy, and terrorism.
He has actively researched and published in
these areas for more than two decades. He
writes a monthly column for CSO Magazine,
for which he has been awarded four national
journalism awards, and is the author or coauthor of fourteen books on computing. He
is perhaps best known for Database Nation:
The Death of Privacy in the 21st Century and for
Practical UNIX and Internet Security.
Geoff Halprin
S8, S11, M6
Geoff Halprin has spent
over 30 years as a software developer, system
administrator, consultant,
and troubleshooter. He
has written software from system management tools to mission-critical billing
systems, has built and run networks for
enterprises of all sizes, and has been called
upon to diagnose problems in every aspect of
computing infrastructure and software. He
is the author of the System Administration
Body of Knowledge (SA-BOK) and the SAGE
Short Topics booklet A System Administrators Guide to Auditing, and was the recipient
of the 2002 SAGE-AU award for outstanding
contributions to the system administration
profession. Geoff has served on the boards
of SAGE, SAGE-AU, USENIX, and LOPSA.
He has spoken at over 20 conferences in
Australia, New Zealand, Canada, Europe,
and the U.S.
Wenjin Hu
M1
Wenjin Hu is a graduate
student at Clarkson University. He is the author of
the network chapter in the
book Running Xen: A Handson Guide to the Art of Virtualization. While at
Clarkson, Wenjin has investigated a lot of different virtualization systems and coauthored
an academic paper entitled Quantifying the
Performance Isolation Properties of Virtualization Systems. For his PhD research,
he focuses on Xen virtualization and file systems, trying to apply the techniques in those
two fields to provide a more secure and reliable desktop enviroment for common users.
Currently, he is also tackling Solaris xVM and
writing an introductory article for ;login:.
W4, W7
Evan joined Global Data
Center Management
(GDCM) as the Lead Sales
Engineer for North America in 2007. He has more
than 20 years of experience on UNIX systems. Before joining GDCM, he spent 8 years
at VERITAS Software as a systems engineer,
speaker, and author. He also spent 5 years
at Sun Microsystems and 2+ years at Fusion
Systems, where he worked to bring the first
high availability software applications for
SunOS and Solaris to market. He also spent
two years as a system administrator on
the equities trading floor of a multinational
trading institution. He is the co-author of
Blueprints for High Availability, 2nd edition
(John Wiley & Sons, 2003) and coauthor and
co-editor of The Resilient Enterprise (VERITAS
Publications, 2002). He is a well-regarded
and popular speaker on the design of highly
available and disaster-resilient systems and
on fixed-content storage archives.
Training INSTRUCTORS
James Mauro
Tobias Oetiker
John Sellens
S2, T2
Richard McDougall
F1
Richard McDougall is a
Principal Engineer and the
Chief Performance Architect in the Office of the CTO
at VMware. A recognized
expert in operating systems, virtualization, performance, resource management,
and filesystem technologies, Richard is a
frequent speaker and has published several
papers and books on these topics. Prior
to VMware, most recently he was a Distinguished Engineer at Sun Microsystems,
where he wrote the authoritative books
Solaris Internals and Solaris Performance and
Tools.
Marcus Ranum
T9, W2
Marcus Ranum has been
building and designing
security and security
systems since 1989. He is
the author of several books
on security and has been, variously, network
manager, C programmer, development team
leader, VP of engineering, CSO, CEO, and
consultant. He is currently the CSO of Tenable Network Security.
Zach Shepherd
M1
Zach Shepherd is an
undergraduate student
studying computer science,
physics, and mathematics
at Clarkson University. At
Clarkson, he has collaborated with students
and professors on various Xen-related
projects, including the setup of a Xenbased infrastructure for the Clarkson Open
Source Institute and research in virtualization benchmarking. Zach was a technical
reviewer for Running Xen: A Hands-on Guide to
the Art of Virtualization.
Abe Singer
Marc Staveley
Jeff Victor
F2
Stephen Spector
Theodore Tso
M1
TECHNICAL SESSIONS
8:45 a.m.10:30 a.m.
Refereed Papers
Keynote Address
Sean will share the technical and cultural changes underway at the
CIA involving the adoption of wikis, blogs, and social bookmarking
tools. In 2005, Dr. Calvin Andrus published The Wiki and The Blog:
Toward a Complex Adaptive Intelligence Community. Three years later,
a vibrant and rapidly growing community has transformed how the
CIA aggregates, communicates, and organizes intelligence information. These tools are being used to improve information sharing
across the U.S. intelligence community by moving information out of
traditional channels.
Sean Dennehy was the pilot customer for Intellipedia and has since
become a leading change agent for incorporating Enterprise 2.0
solutions into the intelligence communitys business practices. He
has developed an innovative sabbatical program that introduces
intelligence community officers to the numerous Web 2.0 applications that are being deployed across the intelligence community. The
focus of his efforts is encouraging a viral adoption where officers
replace existing processes to take advantage of network effects
encountered when individuals move projects out of channels and
onto platforms.
WEDNESDAY, NOVEMBER 12
Refereed Papers
Refereed Papers
Large-ish Infrastructure
Invited Talks I
Invited Talks I
Does Your House Have Lions? Controlling for the Risk from Trusted
Insiders
Marcel Simon, Medco Health Solutions
How do you control for risk from trusted insiders? The nature of the
job that system/network/database administrators, application developers, operations center staff, etc., do pretty much requires them
to have privileged access to your infrastructure. That very privilege
means rogues among such individuals can both do great damage
and cover their tracks, so how do you protect your information? This
talk proposes a practical, technology-neutral approach to trusted
insider controls that adapts readily to your business practices and
has proven itself over years of production usage.
Invited Talks II
Invited Talks II
Once users have figured out that their computers are slow, there is
an uphill battle to improve the performance and at the same time
lose that slowness image. In this talk I will report on the development
of a Perl-based system for passive application monitoring for a large
Swiss telecom company. The system keeps track of hundreds of different performance metrics. Running on over 1,000 client workstations, several gigabytes of performance data are gathered each week
and stored in a central PostgreSQL database. An Ajax-enabled Web
application allows users to explore, compare, and investigate performance data. Hear how investigating performance problems has
turned from random guesswork into a clearly defined process, based
on objective measurements rather than rumors.
The Guru Is In
The Guru Is In
Spam Fighting
Chris St. Pierre, Nebraska Wesleyan University
Bring your most perplexing questions on this topic to our gurus. See
www.usenix.org/lisa08/tech for more details.
Bring your most perplexing questions on this topic to our gurus. See
www.usenix.org/lisa08/tech for more details.
Register by October 17, 2008, and save! | 21
TECHNICAL SESSIONS
9:00 A.M.10:30 A.M.
PLENARY SESSION
Refereed Papers
Reconceptualizing Security
Bruce Schneier, Chief Security Technology Officer, BT
Virtualization
Security is both a feeling and a reality. You can feel secure without
actually being secure and you can be secure even though you dont
feel secure. We tend to discount the feeling in favor of the reality, but
theyre both important. The divergence between the two explains why
we have so much security theater, and why so many smart security
solutions go unimplemented. Several different fieldsbehavioral
economics, the psychology of decision-making, evolutionary
biologyshed light on how we perceive security, risk, and cost. Its
only when the feeling and the reality of security converge that we
have real security.
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a security guru, he
is best known as a refreshingly candid and lucid security critic and
commentator. When people want to know how security really works,
they turn to Schneier.
His first bestseller, Applied Cryptography, explained how the arcane
science of secret codes actually works. It was described by Wired as
the book the National Security Agency wanted never to be published. His book on computer and network security, Secrets and
Lies, was called by Fortune [a] jewel box of little surprises you can
actually use. His current book, Beyond Fear, tackles the problems of
security from the small to the large: personal safety, crime, corporate security, national security.
Regularly quoted in the media, he has testified on security before the
United States Congress on several occasions and has written articles
and op eds for many major publications, including The New York
Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic
Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram,
which has over 130,000 readers. In its seven years of regular publication, Crypto-Gram has become one of the most widely read forums
for free-wheeling discussions, pointed critiques, and serious debate
about security. As head curmudgeon at the table, Schneier explains,
debunks, and draws lessons from security stories that make the
news.
VMware
Richard McDougall and John Y. Arrasjid, VMware
Bring your most perplexing questions on this topic to our gurus. See
www.usenix.org/lisa08/tech for more details.
THURSDAY, NOVEMBER 13
Refereed Papers
Refereed Papers
On the Wire
Time Management
Tom Limoncelli, Google NYC
Bring your most perplexing questions on this topic to our gurus. See
www.usenix.org/lisa08/tech for more details.
TECHNICAL SESSIONS
9:00 A.M.10:30 A.M.
PLENARY SESSION
Invited Talks I
FRIDAY, NOVEMBER 14
MacOS X
Jordan Hubbard, Director, UNIX Technology Group, Apple, Inc.
Bring your most perplexing questions on this topic to our gurus. See
www.usenix.org/lisa08/tech for more details.
Invited Talks I
Closing Session
Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Arent Cutting It
Monica Lam, MokaFive and Stanford University
The advent of thin client computing and Virtual Desktop Infrastructure (VDI) revitalized computing by enabling applications, remote
desktops, and even virtual machines to be run on centralized servers
in a datacenter. However, wracked by performance, cost, and delivery
issues, neither approach is cut out to solve the problem of managing
multiple desktops within an organization. Come hear about the rise
of a streamed virtual desktop approach that allows IT departments to
manage and deploy secure desktops that run across multiple hardware and operating systems while working online or offline.
Invited Talks II
WORKSHOP SERIES
SUNDAY, NOVEMBER 9
MicroLISA
Business-Driven IT Management
Robert Au
University Issues
ZFS
Advanced Topics
Virtual Infrastructures
VENDOR EXHIBITION
premium exhibitors
Make knowledgeable decisions on products and services for your business needs.
Exhibitor demonstrations save you hours
of research and let you quickly compare
solutions.
Learn about the latest and greatest technologies and tools from industry leaders,
provocative startups, and open source
projects.
Silicon Mechanics
EVeryone is welcome!
exhibitors
AdRem Software
Advanced Computer & Network
Corporation
Berkeley Communications
e-DMZ Security
FreeBSD
No Starch Press
MRV Communications
Oracle
PostgreSQL
SNIA
Splunk
The Register
Zasmos
Register by October 17, 2008, and save! | 29
NetApp
Microsoft Research
USENIX Benefactors
Hewlett-Packard
IBM
VMware
Raytheon
Splunk
Zenoss
USENIX PARTNERS
Cambridge Computer
Services, Inc.
Intel
Ripe NCC
Hyperic
Infosys
Oracle
Sendmail, Inc.
Sun Microsystems, Inc
SAGE PARTNER
MSB Associates
LISA 08 SPONSOR
Google
LISA 08 MEDIA SPONSORS
ACM Queue
Linux Journal
Addison-Wesley Professional/
Prentice Hall Professional/
Cisco Press
Access to the SAGE Jobs Board, including real-time email notification of new jobs posted and the ability to post resumes
InfoSec News
Linux+DVD Magazine
ITtoolbox
Linux Gazette
LXer.com
Network World
No Starch Press
SNIA
StorageNetworking.org
SourceForge
Systems Management News
The Register
UserFriendly.org
poster sessions
Conference Reception
Conference Proceedings
Those registered for the technical sessions will receive a complimentary copy of the Proceedings, either in print or on CD-ROM. Additional copies will be available for purchase at the conference.
STUDENT DISCOUNTS & GRANTS
Training
A limited number of tutorial seats are reserved for full-time students
at the very special rate of $200 for one full-day tutorial (if you plan
to take half-day tutorials, you must take both half-days to qualify for
the student rate). You must send email to [email protected] to
confirm availability and make a reservation. In your email, please
specify which tutorials you wish to attend. You will be given a code
number to use when you register. The Conference Department must
receive your registration form, with the code number, full payment,
and a copy of your current student I.D. card, within 14 days of the date
you make your reservation, or your reservation will be canceled. This
special fee is nontransferable.
Technical Sessions
Full-time students may attend technical sessions for only $110 per
day. You must fax a copy of your current student I.D. card to the
USENIX Conference Dept. when you register. This special fee is not
transferable.
hotel
Transportation
Hotel parking is $4/day. The hotel is approximately 10 minutes
from the San Diego International Airport, Lindbergh Field. Airport
transportation options include taxi (approximately $2530 one way),
XPRESS Shuttle ($11 per person one way), and SUPER SHUTTLE ($12
per person one way). For more information about XPRESS Shuttle,
see http://www.xpressshuttle.com/san_diego.htm. More information about SUPER SHUTTLE can be found at http://supershuttle.com.
The San Diego Trolleys Green Line is adjacent to the Town & Country
at the Fashion Valley Transit Center. The Trolley is a fun way to get
around, whether traveling to the International Border or heading to
Centre Citys shopping, restaurants, harbor, and historic attractions.
The Trolley does not stop at the airport, but you can use bus service
to connect with the Trolley. See http://transit.511sd.com to plan your
trip. The Trolley system has two stations that connect with Amtrak.
Traveling to LISA 08 from Outside the U.S.A.?
See detailed advice from the National Academies about visiting
the United States at http://www7.nationalacademies.org/visas/
Traveling_to_US.html.
About San Diego
USENIX and SAGE are pleased to bring LISA back to San Diego and
the Town & Country Resort and Convention Center. San Diego offers
beautiful weather, a wide array of restaurants to suit every taste and
budget, and miles of stunning beaches. There are many attractions
that will be of interest to LISA attendees. Here are just a few:
The world-famous San Diego Zoo and Wild Animal Park, featuring thousands of species of rare and endangered animals
SeaWorld San Diego, a 150-acre park featuring marine habitats,
aquariums, and Shamu the killer whale
The Reuben H. Fleet Science Center, featuring planetarium
shows and more than 100 interactive science exhibits
The Birch Aquarium at Scripps, where you can explore coral
reefs, see sharks feed, and dip into tidepools
LEGOLAND California, an interactive theme park for LEGO
enthusiasts of all ages
More information is available from the San Diego Convention and
Visitors Bureau, http://www.sandiego.org, as well as the Town &
Country, http://www.towncountry.com.
Registration Fees
USENIX is pleased to offer Early Bird Registration Discounts of up
to $300 to those who register for LISA 08 by October 17, 2008. After
October 17, registration fees increase.
Daily Rates
Before
Oct. 17
After
Oct. 17
$280
$330
1 day of training
$635
$685
$385
Before
Oct. 17
After
Oct. 17
$730
$880
$1220
$1320
$1805
$1955
$2340
$2540
$2875
$3125
$3210
$3510
G. Wednesday/Thursday Half-and-Half
Tech and Training*
H. Virtualization or Solaris Training Series
$915
$1015
$3110
$3410
Workshop Fees
1 half-day of workshops
$75
$150
Optional Costs
Continuing Education Units (CEUs): $15 per training day
Registration Fees for Full-Time Students
USENIX offers full-time students special low registration fees for
LISA 08 that are available at any time. See p. 31 for details.
Daily Rates
$110
1 day of training
$200
ea
regist
OCT 17 08
www
li
. use n ix . o rg /
s a2
00
Google
Live Streaming Powered by
ITtoolbox
No Starch Press
Addison-Wesley Professional/
Prentice Hall Professional/
Cisco Press
Linux+DVD Magazine
SNIA
Linux Gazette
StorageNetworking.org
Linux Journal
SourceForge
LXer.com
The Register
Network World
UserFriendly.org
Non-Profit
Organization
US Postage
USENIX Association
2560 Ninth Street, Suite 215
Berkeley, CA 94710
510.528.8649
510.548.5738 fax
PAID
Permit #110
Hopkins, MN