Abstract is missing.
- Autonomic Administration: HAL 9000 Meets Gene RoddenberryJohn Strassner. [doi]
- A Service-Oriented Data Grid: Beyond Storage VirtualizationBruce Moxon. [doi]
- Active Directory Group Policy for UNIXGerald Carter. [doi]
- ZFSJeff Bonwick. [doi]
- The LHC Computing ChallengeTony Cass. [doi]
- Homeless Vikings: BGP Prefix Hijacking and the Spam WarsDavid Josephsen. [doi]
- Ruby: Productivity or Penance?Andrew Hume. [doi]
- Scaling Production Repairs and QA Operations in a Live EnvironmentAvleen Vig. [doi]
- Ganeti: An Open Source High-Availability Cluster Based on XenGuido Trotter. [doi]
- NetFlow; or, How to Know What Your Network Really Did Without Going BrokeMichael W. Lucas. [doi]
- The Economic Meltdown of Moore s Law and the Green Data CenterKenneth G. Brill. [doi]
- Databases: Hit the Ground, Running?John Sellens. [doi]
- Scaling Production Repairs and QA Operations in a Live EnvironmentShane Knapp. [doi]
- Beyond NAC: What s Your Next Step?Mark Loveless. [doi]
- Should the Root Prompt Require a Road Test?Alva L. Couch. [doi]
- Prince Caspian on Location: Commodity Hardware and Gaffer TapeTrey Darley. [doi]
- Data Center DesignDouglas Hughes.
- OpenLDAP: Highlights for 2.4Howard Chu. [doi]
- Jails, VMs, and SandboxesBill Cheswick. [doi]
- ZFSJeff Bonwick. [doi]
- Cookin at the KeyboardDavid N. Blank-Edelman, Lee Damon. [doi]
- VoIP with NATs and FirewallsRobert Sparks. [doi]
- Who s the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their OwnGlenn Fink. [doi]
- Using Throttling and Traffic Shaping to Combat Botnet SpamKen Simpson. [doi]
- The Security Butterfly EffectCat Okita. [doi]
- Everything You Need to Know About Spam (in 15 Minutes)Chris St. Pierre. [doi]
- LDAPHoward Chu.
- Deploying Nagios in a Large Enterprise EnvironmentCarson Gaspar. [doi]
- Ganeti: An Open Source Multi-Node HA Cluster Based on XenGuido Trotter. [doi]
- How to Get Your LISA Paper AcceptedTom Limoncelli, Paul Anderson, Adam Moskowitz. [doi]
- NTPBrad Knowles.
- Hardening Your Systems Against LitigationAlexander Muentz. [doi]
- Eco Computing: Improving Data Center Energy EfficiencyLou Marchant. [doi]
- UNIX and Microsoft InteroperabilityJoseph Radin.
- SambaGerald Carter.
- SIP/VoIPRobert Sparks.
- Legal Issues/ForensicsJason Park.
- No Terabyte Left BehindAndrew Hume. [doi]
- The Biggest Game of Clue You Have Ever PlayedDonald A. Scelza. [doi]
- Data Center Growing PainsLou Marchant. [doi]
- Experiences with Scalable Network Operations at AkamaiErik Nygren. [doi]
- Autonomic Computing: Our Hopes, Dreams, and FearsGlenn Fink. [doi]
- Datacenter Design IssuesDoug Hughes. [doi]
- Virtualization/VMwareKenon Owens.
- AFSEsther Filderman.
- PolicyVis: Firewall Security Policy Visualization and InspectionTung Tran, Ehab S. Al-Shaer, Raouf Boutaba. 1-16 [doi]
- Inferring Higher Level Policies from Firewall RulesAlok Tongaonkar, Niranjan Inamdar, R. Sekar. 17-26 [doi]
- Assisted Firewall Policy Repair Using Examples and HistoryRobert M. Marmorstein, Phil Kearns. 27-37 [doi]
- NetADHICT: A Tool for Understanding Network TrafficHajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji. 39-47 [doi]
- CAMP: A Common API for Measuring PerformanceMark Gabel, Michael Haungs. 49-62 [doi]
- Application Buffer-Cache Management for Performance: Running the World s Largest MRTGDavid Plonka, Archit Gupta, Dale Carder. 63-78 [doi]
- Stork: Package Management for Distributed VM EnvironmentsJustin Cappos, Scott M. Baker, Jeremy Plichta, Duy Nguyen 0002, Jason Hardies, Matt Borgard, Jeffry Johnston, John H. Hartman. 79-94 [doi]
- Decision Support for Virtual Machine Re-Provisioning in Production EnvironmentsKyrre M. Begnum, Matthew Disney, Æleen Frisch, Ingard Mevåg. 95-104 [doi]
- OS Circular: Internet Client for ReferenceKuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Quynh Nguyen. 105-116 [doi]
- Secure Isolation of Untrusted Legacy ApplicationsShaya Potter, Jason Nieh, Matt Selsky. 117-130 [doi]
- Policy-Driven Management of Data SetsJim Holl, Kostadis Roussos, Jim Voll. 131-140 [doi]
- ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection SystemsDamiano Bolzoni, Bruno Crispo, Sandro Etalle. 141-152 [doi]
- PDA: A Tool for Automated Problem DeterminationHai Huang, Raymond B. Jennings III, Yaoping Ruan, Ramendra K. Sahoo, Sambit Sahu, Anees Shaikh. 153-166 [doi]
- Usher: An Extensible Framework for Managing Clusters of Virtual MachinesMarvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker. 167-181 [doi]
- Remote Control: Distributed Application Configuration, Management, and Visualization with PlushJeannie R. Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, Amin Vahdat. 183-201 [doi]
- Everlab: A Production Platform for Research in Network Experimentation and ComputationElliot Jaffe, Danny Bickson, Scott Kirkpatrick. 203-213 [doi]
- Master Education Programmes in Network and System AdministrationMark Burgess, Karst Koymans. 215-229 [doi]
- On Designing and Deploying Internet-Scale ServicesJames R. Hamilton. 231-242 [doi]
- RepuScore: Collaborative Reputation Management Framework for Email InfrastructureGautam Singaraju, Brent ByungHoon Kang. 243-251 [doi]
- Moobi: A Thin Server Management System Using BitTorrentChris McEniry. 253-260 [doi]
- PoDIM: A Language for High-Level Configuration ManagementThomas Delaet, Wouter Joosen. 261-273 [doi]
- Network Patterns in Cfengine and Scalable Data AggregationMark Burgess, Matthew Disney, Rolf Stadler. 275-289 [doi]