Database systems: achievements and opportunities
Communications of the ACM
Continuous profiling: where have all the cycles gone?
Proceedings of the sixteenth ACM symposium on Operating systems principles
Tuning Sendmail for Large Mailing Lists
LISA '97 Proceedings of the 11th Conference on Systems Administration
Automating 24x7 Support Response To Telephone Requests
LISA '97 Proceedings of the 11th Conference on Systems Administration
An Analysis of UNIX System Configuration
LISA '97 Proceedings of the 11th Conference on Systems Administration
Extensible, Scalable Monitoring for Clusters of Computers
LISA '97 Proceedings of the 11th Conference on Systems Administration
Bootstrapping an Infrastructure
LISA '98 Proceedings of the 12th Conference on Systems Administration
Using Gigabit Ethernet to Backup Six Terabytes
LISA '98 Proceedings of the 12th Conference on Systems Administration
mkpkg: A software packaging tool
LISA '98 Proceedings of the 12th Conference on Systems Administration
Building An Enterprise Printing System
LISA '98 Proceedings of the 12th Conference on Systems Administration
MRTG: The Multi Router Traffic Grapher
LISA '98 Proceedings of the 12th Conference on Systems Administration
Selectively Rejecting SPAM Using Sendmail
LISA '97 Proceedings of the 11th Conference on Systems Administration
Accountworks: Users Create Accounts on SQL, Notes, NT, and UNIX
LISA '98 Proceedings of the 12th Conference on Systems Administration
Customization in a UNIX Computing Environment
LISA '93 Proceedings of the 7th USENIX conference on System administration
Local Disk Depot - Customizing the Software Environment: Customizing the Software Environment
LISA '93 Proceedings of the 7th USENIX conference on System administration
A Case Study on Moves and Mergers
LISA '93 Proceedings of the 7th USENIX conference on System administration
The Amanda Network Backkup Manager
LISA '93 Proceedings of the 7th USENIX conference on System administration
Config: A Mechanism for Installing and Tracking System Configurations
LISA '94 Proceedings of the 8th USENIX conference on System administration
OMNICONF - Make OS Upgrade and Disk Crash Recovery Easier
LISA '94 Proceedings of the 8th USENIX conference on System administration
LPRng - An Enhanced Printer Spooler System
LISA '95 Proceedings of the 9th USENIX conference on System administration
How to Upgrade 1500 Workstations on Saturday, and Still Have Time to Mow the Yard on Sunday
LISA '95 Proceedings of the 9th USENIX conference on System administration
Exu - A System for Secure Delegation of Authority on an Insecure Network
LISA '95 Proceedings of the 9th USENIX conference on System administration
Priv: Secure and Flexible Privileged Access Dissemination
LISA '96 Proceedings of the 10th USENIX conference on System administration
Shuse: Multi-Host Account Administration
LISA '96 Proceedings of the 10th USENIX conference on System administration
RUST: Managing Problem Reports and To-Do Lists
LISA '96 Proceedings of the 10th USENIX conference on System administration
OC3MON: Flexible, Affordable, High Performance Staistics Collection
LISA '96 Proceedings of the 10th USENIX conference on System administration
A Simple Caching File System for Application Serving
LISA '96 Proceedings of the 10th USENIX conference on System administration
PC Administration Tools: Using Linux to Manage Personal Computers
LISA '96 Proceedings of the 10th USENIX conference on System administration
Abstract Yourself With Modules
LISA '96 Proceedings of the 10th USENIX conference on System administration
SLINK: Simple, Effective Filesystem Maintenance Abstractions for Community-Based Administration
LISA '96 Proceedings of the 10th USENIX conference on System administration
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
Deconstructing User Requests and the Nine Step Model
LISA '99 Proceedings of the 13th USENIX conference on System administration
NetReg: An Automated DHCP Registration System
LISA '99 Proceedings of the 13th USENIX conference on System administration
Automated Installation of Linux Systems Using YaST
LISA '99 Proceedings of the 13th USENIX conference on System administration
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A Simple Way to Estimate the Cost of Downtime
LISA '02 Proceedings of the 16th USENIX conference on System administration
An Approach for Secure Software Installation
LISA '02 Proceedings of the 16th USENIX conference on System administration
Nix: A Safe and Policy-Free System for Software Deployment
LISA '04 Proceedings of the 18th USENIX conference on System administration
LISA '04 Proceedings of the 18th USENIX conference on System administration
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Hi-index | 0.00 |
We examine two models for categorizing tasks performed by system administrators. The first model is the traditional task based model. The second model breaks tasks down by the source of the problem. We then look at the historical trends of the last 12 years of LISA proceedings based on these models. Finally, we analyze some of the more important tasks done by system administrators and propose future research in those areas. Our hope is that some of the academic rigor in analyzing research can be brought to systems administration without losing the practicality that makes the research valuable.