See the Schedule of Events for exact times.
Discuss benefits and technology related to Linux hosted on the Mach microkernel.
What tomorrow will bring for the SparcLinux port, and why the current development model has taken us to where we are now and will take us to where we are going.
The basics of the NLM and NSM protocols and the current implementation effort for Linux.
An overview, explaining what is unique about the distribution.
Trace how the first 100% computer-animated film was made, from story concept to animation. Learn about the 19 computer languages used in the production, and the extensive use of Unix.
How Radio Hams use Linux to communicate, design circuits, etc.
The author of Electric Fence explains how to debug malloc() problems.
This talk focuses on how to optimize code for platforms running Linux on DEC Alpha processors. While the focus is on the Alpha architecture, many of the topics covered are applicable to any RISC processor and even to modern CISC CPUs that employ implementation techniques pioneered by RISCs. The first part of the talk covers performance analysis tools that are available under Linux. The second part covers specific techniques that often improve performance by an order of magnitude or more. The talk assumes some basic knowledge of computer architecture and programming in C.
Coda is a state of the art, freely available networked filesystem developed at CMU by the group of Satyanarayanan. It has advances features such as client side write-back caching, server replication, disconnected operation (laptops), bandwith adaptation, and solid security models. The Linux port is nearly complete (Nov 1996) and CMU is making further ports, and improving the performance of the system.
The talk will cover some new development in the NFS area that will improve performance and add several new features, including support for NFS over TCP and alternative authentication flavors.
I'm age 29, and have studied mathematics (aka chewing pencils) before becoming a full-time programmer. I've been working (playing?) with Linux since the days of Owen's MCC Interim Releases back in 1992, and I'm happy that I've finally found an employer who actually pays me for playing with my favorite toy.
Theodore Ts'o has been involved with Linux since almost the very beginning. ``Be a Linux hacker, and you too can see the world and get free hardware.''
The talk will survey Linux's capabilities as a server for Mac and PC networks using legacy protocols.
This talk will discuss some threats to Linux security and how to deal with them. It will include information about real break-ins, the loopholes that were utilized by intruders, how the system administrators could have closed the loopholes and how the intruders were discovered. The topics covered will include Security Policies vs. Security Mechanisms, password security, UNIX security model, basics of cryptographic protection, management of priviledges and security of systems connected to networks.
The IPv4 protocol family is the foundation on which the other network technologies are built. Understanding what really happens at that level is mandatory for being able to make correct decisions on issues that system and network administrators face today, whether it is tuning the network to get an extra Kbit of a bandwidth, creating a better filter for a screening router or verifing a claim of a vendor that says "Only mail can go across our SuperGuardian/Deluxe firewall. Only port 25 is open to the outside world." This class is intended for the system or network administrators that are either responsible for configuring and running networks in the organization, or who may want to gain better understanding of nuts-and-bolts of the networking.
With the Linux development team using a paradigm of 'You Snooze You Loose' to direct kernel releases it can become difficult to find time for entertainment. Don't miss this opportunity to hear a speaker who is world-renowned for bringing humor and a business world perspective to Linux and the free software movement. Dr. Wettstein will discuss strategies for enabling Linux to compete in heterogenous environments composed of legacy mainframe systems, dilapidated mini-computers and the ever present shadow of Windows and Novell Netware. So take a break from kernel patches and enjoy an hour of entertainment while the master of metaphor recounts how he developed the bravery to stake his professional career on free software.
This talk is about the new Multiple Devices (MD) personalities written by Gadi Oxman, Ingo Molnar and Miguel de Icaza that adds RAID-1, RAID-4 and RAID-5 capabilities to the Linux kernel.
This talk will offer a technical look at Linux's special features leveraged in game development so far and where Linux needs to go to continue its status as the most cost-effective advanced solution to stable game development. The talk will feature a sneak peak of Crack dot Com's forthcoming title, Golgotha, the first officially supported commercial Linux game.
The ELF file has become the defacto standard executable for linux on all of the different architectures, and while it serves us well and offers a lot of flexibility, there are some shortcomings that were not anticipated by the original design committee. Discussions are currently underway about potential extensions which will serve to solve the problems in a backwards compatible manner. In the talk,I will discuss the nature of the problems, and the solutions that are being considered. Eric has been working with Linux since back in the 0.95b days, and over the years has worked in a number of different areas of the kernel. He doesn't have as much time for Linux as he used to, but he still manages to get a few things done inbetween extended bouts of goofing off.
Spread the Word!