LISA '93 | Methods for Maintaining One Source Tree in a Heterogeneous Environment | Bjorn Satdeva |
LISA '93 | Towards a POSIX Standard for Software Administration | Barrie Archer |
LISA '93 | Managing the Mission Critical Environment | E. Scott Menter |
LISA '93 | Open Systems Formal Evaluation Process | Brian William Keves |
LISA '93 | A Case Study on Moves and Mergers | John Schimmel |
LISA '93 | Guerrilla System Administration: Scaling Small Group Systems Administration To a Larger Installed Base | Tim Hunter, Scott Watanabe |
LISA '93 | Role-based System Administration or Who, What, Where, and How | Dinah McNutt |
LISA '93 | Delegation: Uniformity in Heterogeneous Distribued Administration | Jean-Charles Grégoire |
LISA '93 | satool - A System Administrator's Cockpit, An Implementation | Todd Miller, Christopher Stirlen, Evi Nemeth |
LISA '93 | Sysctl: A Distributed System Control Package | Salvatore DeSimone, Christine Lombardi |
LISA '93 | Automated System Monitoring and Notification with Swatch | Stephen E. Hansen, E. Todd Atkins |
LISA '93 | Where Did All The Bytes Go? | Dinah McNutt, Michael Pearlman |
LISA '93 | A Practical Approach to NFS Response Time Monitoring | Gary L. Schaps, Peter Bishop |
LISA '93 | The Amanda Network Backup Manager | James da Silva, Ólafur Guðmundsson |
LISA '93 | PLOD: Keep Track of What You're Doing | Hal Pomeranz |
LISA '93 | How to Keep Track of Your Network Configuration | J. Schönwälder, H. Langendörfer |
LISA '93 | Forecasting Disk Resource Requirements for a Usenet Server | Karl L. Swartz |
LISA '93 | Simplifying System Administration Tasks: The UAMS Approach | Roland J. Stolfa |
LISA '93 | System Administrtion as a User Interface: An Extended Metaphor | Wilson H. Bent, Jr. |
LISA '93 | The System Administration Maturity Model - SAMM | Carol Kubicki |
LISA '93 | Establishing and Administering a Public Access Internet facility | Sheri Byrne |
LISA '93 | Implementing Execution Controls in Unix | Todd Gamble |
LISA '93 | HLFSD: Delivering Email to Your $HOME | Erez Zadok, Alexander Dupuy |
UNIX Security '93 | Retrofitting Network Security to Third-Party Applications -- The SecureBase Experience | Jonathan I. Kamens |
UNIX Security '93 | Secure RPC Authentication (SRA) for TELNET and FTP | David R. Safford, Douglas Lee Schales, David K. Hess |