USENIX SUMMER 1991 TECHNICAL CONFERENCE & EXHIBITION: TUTORIALS PROGRAM

Carolyn Carr carolyn at usenix.ORG
Fri Apr 26 08:46:47 AEST 1991


       	USENIX SUMMER 1991 TECHNICAL CONFERENCE & EXHIBITION
	             Nashville, Tennessee

                MULTIMEDIA FOR NOW AND THE FUTURE  

		   ***TUTORIALS PROGRAM***

HOTEL REGISTRATION DEADLINE
Monday, May 6, 1991

PRE-REGISTRATION DEADLINE
Monday, May 20, 1991

The brochure containing full information on registration has just been
mailed and members should be receiving it shortly.  Non-members can
receive the brochure by contacting:

                        USENIX Conference Office
                        22672 Lambert St., Suite 613
                        El Toro, CA  92630
                        Telephone # (714) 588-8649
                        FAX # (714) 588-9706
                        email address:  judy at usenix.org


MAKE YOUR HOTEL RESERVATIONS EARLY!  Opryland Hotel and most other 
hotels in the area will be SOLD OUT due to the International Country 
Music Fan Fair (with the must-see Grand Masters Fiddlers Convention).

We encourage you to reserve your hotel rooms early - BEFORE MAY 6 -
even before you register for the conference.  Rooms will be difficult
to find after the May 6 deadline.  You can cancel your room reservation
up to 3 days prior to your arrival in Nashville and still get a full
refund.

Special rates have been arranged for USENIX attendees at the hotels
listed below.  Call the hotel of your choice DIRECTLY.  BE SURE TO
MENTION that you are attending the USENIX Conference/Exhibition to take
advantage of the group discount.  A one night's deposit is required
for each room reserved.

*Opryland Hotel (Headquarters)
 2800 Opryland Drive, Nashville, TN 37214
 615/889-1000

 "Traditional Room" rates:     Single:  $114	Double:  $129
 "Golden Terrace" room rates:  Single:  $144	Double   $159

*Shoney's Inn of Music Valley (Nearby with shuttle services available)
 2420 Music Valley Drive, Nashville, TN 37214
 615/885-4030

              Room Rates: Single or Double Room:  $84

*Sheraton Music City Hotel
 777 McGavock Pike, Nashville, TN 37214
 615/885-2200

	      Room Rates:  Single or Double Room: $92

***********************************************************************

TUTORIAL PROGRAM
Monday and Tuesday, June 10 & 11

*****
Special Note for Full-Time Students

A limited number of seats in each tutorial has been reserved for
full-time students at a special fee. For complete details contact
the USENIX Conference Office at 714/588-8649. 

*****

M1
Programming in Perl
Instructor:     Tom Christiansen, CONVEX Computer Corporation

INTENDED AUDIENCE: This tutorial is designed for programmers who 
do substantial amounts of shell programming.  It is especially suited 
for system administrators in a heterogeneous environment.  Some 
experience in sh, sed, awk, or the C language is assumed.  

While shell scripts are one of UNIX's strengths (because they are 
constructed from small, efficient, single purpose tools), these shell 
scripts quickly grow in complexity, until they become cumbersome, 
hard to understand, modify and maintain.

Perl is a publicly available and highly portable language written by 
Larry Wall that looks much like interpreted C combined with many 
of the best features of sh, sed, awk, and several other popular 
programming languages.  It is particularly suited for system 
management tasks, but is rich enough for many general programming
problems as well.  Because perl is one program, rather  than a
conglomeration of dozens of others, it is usually clearer and 
easier to express oneself in perl than in sh and its allies, and often 
more efficient as well.  Topics of this tutorial include a detailed 
description of the syntax and semantics of the perl language, its data 
types, operators, flow control, regular expressions, I/O facilities, 
networking features, and system call interfaces.  Comparisons 
between perl and other UNIX tools are made and issues of style, 
efficiency, and traps and pitfalls of the language are explored.  In-
depth examples of complete programs, especially those relevant to 
system administration, are provided.

Tom Christiansen left the University of Wisconsin, where he had 
been a system administrator for 6 years, with an MS-CS in 1987.  He 
joined CONVEX Computer Corporation in Richardson, Texas.  There he 
is a software development engineer in the Internal Tools Group, 
designing software to streamline software development and systems 
administration, and to improve system security.


M2
An Introduction to the TCP/IP Protocol Suite
Instructor:     Richard Stevens, Consultant

INTENDED AUDIENCE:  This tutorial is for UNIX users and 
programmers interested in learning about the TCP/IP protocol suite.  
No networking knowledge is assumed.

The tutorial covers the following material:

Introduction:  packet switching, client-server model, OSI model, 
encapsulation, and multiplexing.

TCP/IP protocols:  RFCs, Internet addresses, subnet addresses, 
address resolution (ARP, RARP), IP, ICMP, IP routers, broadcasting 
problems, UDP, TCP, port numbers, buffering and out-of-band data, 
and flow control.

The TCP/IP Internet:  current topology, NSFNET, regional and 
international networks.

Applications:  routing in the Internet, Domain Name System (DNS), 
ping, traceroute, bootstrapping diskless workstations (BOOTP), 
remote login (TELNET, rlogin), file transfer (FTP, TFTP), electronic 
mail (SMTP), and network management (SNMP).

Richard Stevens received his Ph.D. in Systems Engineering from the 
University of Arizona in 1982.  He is the author of the book UNIX 
Network Programming.  Currently he is an author and independent 
consultant residing in Tucson, Arizona.


M3
An Introduction to C++
Instructor:    Robert Murray, AT&T Bell Laboratories

INTENDED AUDIENCE:  The audience is assumed to be technical (as 
opposed to managerial).  A fairly complete knowledge of C is 
assumed.  Knowledge of object-oriented programming or data 
abstraction is not required.

A survey of the main features of C++ (including features added in 
Releases 2.0 and 2.1) is presented, along with some short examples 
that show how to use the features effectively.

Most use of C++ falls into one of three flavors:  a better C, data 
abstraction, or object-oriented programming. We will examine all 
three, starting with the features and paradigms that are closest to C, 
progressing to the more advanced, and more powerful features.  We 
also discuss the relationship between ANSI C, C++, and the current 
activities of the ANSI C++ committee.

Rob Murray is a Supervisor in the C++ Software Systems Department, 
AT&T Unix System Laboratories Inc.  His job responsibilities include 
giving presentations on C++ to research and development 
organizations across Bell Labs, and investigating advanced C++ 
compilation techniques.


M4
UNIX System V Release 4.0 Internals Part I:  Virtual Memory and 
File Systems
Instructors:   Steve Buroff, AT&T and Mike Scheer, ProLogic 
Corporation.

INTENDED AUDIENCE:  This tutorial is intended for people who 
maintain, modify, or port the UNIX system or who are interested in 
learning about its internals.  Attendees should have a good working 
knowledge of UNIX applications programming and the C language; 
those with knowledge of UNIX internals will particularly benefit from 
the focus on new and changed features of Release 4. 

Two abstractions that most distinguish the System V Release 4 
kernel from its predecessors are the Virtual File System (VFS) and 
Virtual Memory (VM) system.  This tutorial gives a comprehensive 
overview of both, and analyzes the fork, exec, and exit system calls, 
emphasizing their implementation as applications of VFS and VM.

Steve Buroff is a Distinguished Member of Technical staff at AT&T.  
He received his Ph.D. in Computer Science from Illinois Institute of 
Technology.  He has worked on UNIX  kernel development including 
multi-processor systems, demand paging, and real-time features.

Michael Scheer is a Principal Member of Technical Staff at ProLogic 
Corporation. His work includes distributed operating systems, file 
systems, and symmetric multiprocessing. He was previously a 
Member of the Technical Staff at AT&T Bell Laboratories, where he 
was lead developer for the Remote File Sharing kernel in System V 
Release 4.0, and contributed to the designs of the virtual file and 
virtual memory subsystems. Mike received his M.S. degree in 
Computer Science at the University of Vermont in 1982.


M5
Programming the X Window System, Version 11
Instructor:     Oliver Jones, Saber Software, Inc.

INTENDED AUDIENCE:  This tutorial is for software developers and 
other people interested in UNIX-based graphical user interfaces who 
are beginning the process of learning to program using the X Window 
System.  A working knowledge of UNIX and the C programming 
language are the only prerequisites.

This tutorial covers the fundamental mechanisms provided by 
M.I.T.'s X Window System.  After completing this course, attendees 
should be able to develop simple applications in X.  More 
importantly, attendees will learn enough of X to be able to make 
sense of the X Toolkit, OPEN LOOK, OSF/Motif and other higher-level 
software for developing graphical user interfaces.

The tutorial addresses the "how" and "why" of the following parts of 
X:
	Network connections	
	Windows and screen real-estate
	Graphics	
	Exposures
	Text	
	Color
	Images	
	The X Protocol
	Mouse and Keyboard input	
	Inter-application communication
	X Events, solicitation and handling

The tutorial places an emphasis on software design considerations, 
especially those which relate to application performance.  In the light 
of X's central dogma, "Mechanism, not Policy," the course discusses 
how to exploit the various features of X, and why they work the way 
they do.

Oliver Jones has been teaching the X Window System for several 
years.  He is the author of Introduction to the X Window System, a 
textbook on the subject.  He is professionally involved with the 
development of X-based user interfaces for programming 
environments.

M6  NEW!
An Introduction to UNIX System Security
Instructor:     Matt Bishop, Dartmouth College

INTENDED AUDIENCE:  This new tutorial is intended for UNIX users 
and system administrators who are concerned about system security; 
no knowledge of UNIX security features is assumed.

* What is security (security policies, mechanisms, requirements)?
* Basic security mechanisms (permissions, setuid, encryption, 
  passwords, etc.)
* File system auditing (scanning for illicit setuid programs, looking
  for unexpected changes)
* Password security (password cracking, choosing good passwords, 
  how the password hash works, shadow password files)
* Users and superusers (how to work safely as root, the risks of 
  Trojan horses and computer viruses, environment, etc.)
* Network security (UUCP, the Internet, file transfer, remote logins, 
  etc.)
* Security in programming (which library calls to avoid, safe 
  environments, dangerous programming practises)
* Miscellaneous (restricted user environments, user and staff 
  responsibilities and awareness, etc.)

Matt Bishop has been working on issues of security in UNIX since 
1980.  After graduating from Purdue University, he worked at the 
Research Institute for Advanced Computer Science at NASA, where 
he specialized in computer security.  Currently he is at Dartmouth 
College, teaching operating systems, computer security, 
cryptography, and software engineering.  He is a member of the 
Privacy and Security Research Group, which studies issues related to 
security on the Internet, and has chaired the last two UNIX Security 
Workshops.


M7  NEW!
UNIX Programming Tools
Instructor:     Kenneth Ingham, Consultant

INTENDED AUDIENCE:  This new tutorial is aimed at programmers 
familiar with basic Unix topics, and preferably those who are familiar 
with the C programming language.

The Unix Operating system comes with a great variety of tools which 
allow programmers to produce cleaner, more accurate code with less 
work.  The knowledge of when and why to use these tools is not 
covered in the manuals users must learn this for themselves, 
usually by trial and error.  Additionally, while the manuals are good 
references, they are not often best for learning the fundamentals of 
the Unix programming tools.

This tutorial not only teaches how to use specific Unix tools, but 
offers insight into why.  It covers tools such as lex, yacc, make, and 
awk, each of which can assist the Unix programmer in doing their job 
with greater facility.  The tutorial employs detailed examples to 
illustrate the tool being covered.

Kenneth Ingham has worked with Unix for eleven years, spending 
the last six years as a systems programmer at the University of New 
Mexico.  He has taught classes for the University, for UniForum, and 
for companies in New Mexico.  He is the author of the book UNIX Tool 
Building (Academic Press).  Currently Kenneth is a freelance 
consultant, teaching classes on Unix and doing other interesting 
projects.


M8  NEW!
OSF/1 Internals
Instructor:     Thomas W. Doeppner Jr., Brown University

INTENDED AUDIENCE:  This new tutorial benefits the individual who 
is involved with porting or supporting the OSF/1 operating system, 
as well as those who are simply interested in what the OSF/1 kernel 
is all about.  It assumes a general knowledge of how UNIX systems 
are organized and some previous exposure to UNIX internals (such as 
an earlier USENIX tutorial on UNIX internals).

OSF/1 is a newly released implementation of UNIX.  It is based on 
technology derived from Mach, Berkeley UNIX, and more.  

Beginning with an overview on how the system is organized, the 
tutorial then focuses on the following areas:
        Process model
                Multithreaded processes
                Multiprocessor support
                Scheduling
        Virtual memory
                Address space representation
                Paging techniques
        File System
                "Virtual File System" architecture
                Parallelization of the file system
        Streams
                A new implementation of streams
                Transparent parallelization of streams components
        Sockets and networking
                Parallelization of sockets and networking
                A kernel interface between streams and sockets

Thomas W. Doeppner Jr. received his Ph.D. in Computer Science from 
Princeton University in 1977.   He has been on the faculty at Brown 
University since 1976, where his research interests are in operating 
systems and parallel programming. He has lectured extensively on 
UNIX internals over the past seven  years for the Institute for 
Advanced Professional Studies.  He authored the multi-day OSF/1 
internals course that is offered by OSF.


M9
Mach Overview
Instructor:    Avadis Tevanian, Jr., NeXT, Inc.

INTENDED AUDIENCE:  This tutorial is of interest to a wide range of 
people, from those working closely with Mach to those who would 
just like to find out more about Mach and its internals.  People 
interested in doing a port of Mach will find the tutorial especially 
useful.

This tutorial investigates the Mach Operating System and 
Environment.  Emphasis is on the Mach kernel internals, including 
design and implementation philosophies, virtual memory 
management, thread scheduling and inter-task communication.  Both 
machine independent and machine dependent parts of the kernel are 
examined, especially the machine dependent interfaces that must be 
implemented to port Mach to a new machine.  Finally, Unix 
compatibility as implemented within the Mach kernel is considered.

In addition to the Mach internals, the basic mechanisms available to 
users are studied, including an introduction to the basic user level 
services such as the Network Message Server, the Mach Interface 
Generator (MiG) and general  Mach programming hints.  The tutorial  
includes a discussion of the latest features available in Mach, future 
plans for Mach and Mach distribution.

Avadis Tevanian, Jr. is currently Chief Operating System Scientist at 
NeXT, Inc.  He has worked on the Mach system since its inception, 
being one of the original designers and a major contributor to its 
implementation.  He received his Ph.D. in Computer Science in 1987 
and received his M.S. in Computer Science in 1985, both from 
Carnegie-Mellon University.  Dr. Tevanian has worked on many ports 
of the Mach system and has written many papers and lectured 
extensively on various aspects of Mach.


T1
Advanced Topics in Systems Administration
Instructors:    Evi Nemeth, University of Colorado and Rob Kolstad, 
Sun Microsystems

INTENDED AUDIENCE:  System administrators in networked 
computing environments.  The ever-popular Nemeth and Kolstad 
Systems Administration tutorials almost always sell out.  Preregister 
early.

Networked environments give administrators some of their most 
painful migraines.  This session responds to many requests to offer 
material on advanced system administration including:  

  *Simple Network Management Protocol (SNMP) for network management
  *The Berkeley Internet Name Daemon for name resolution
  *RIP, EGP, gated and their configuration
  *The Network Time Protocol for keeping machines' clocks in step
  *Dialup SLIP for providing local network functionality to remote 
   users
  *Configuration of NFS clients for optimal network and CPU usage
  *State-of-the-art security (Kerberos IV and COPS)
   Advanced Sendmail configuration (complete with a verification 
   suite)

Dr. Rob Kolstad is a Software Manager at Sun Microsystems at the 
Rocky Mountain Technology Center in Colorado Springs, Colorado.  
Rob is secretary of the USENIX Board of Directors and sponsored the 
first USENIX System Administrators Workshop.

Dr. Evi Nemeth spent last year at Dartmouth College on leave from 
the University of Colorado at Boulder where she is on the Computer 
Science faculty.  She is co-author of the recent book The UNIX System 
Administration Handbook (Prentice Hall).


T2
UNIX Network Programming
Instructor:     Richard Stevens, Consultant

INTENDED AUDIENCE:  UNIX/C programmers interested in learning 
how to write programs that communicate across a network.  A basic 
familiarity with networking concepts and the TCP/IP protocols is 
assumed.  

The goal of the tutorial is to provide the basics required to write 
network programs and to develop and examine actual examples.  The 
tutorial covers the following:

* Introduction (5%).  Review of UNIX process handling, reliable 
  signals, coding a daemon process.  
* Berkeley sockets (45%).  All the socket system calls, TCP and UDP 
  client-server examples, reserved ports, stream pipes, passing file 
  descriptors, asynchronous I/O, multiplexed I/O, out-of-band data, 
  raw sockets (ping program), broadcasting (rwhod server), inetd 
  superserver, constructing Internet addresses, and possible socket 
  changes with 4.4BSD.
* System V Transport Layer Interface (20%). Comparison of TLI 
  functions to corresponding socket functions, TCP client-server 
  example, and the relationship of sockets and TLI in System V Release 
  4.
* Examples (30%).  Security in 4.3BSD, remote command execution, 
  pseudo-terminals and remote login, and remote procedure call 
  overview.

Richard Stevens received his Ph.D. in Systems Engineering from the 
University of Arizona in 1982.  He is the author of the book UNIX 
Network Programming.  Currently he is an author and independent 
consultant residing in Tucson, Arizona.


T3 
C++ Programming Style
Instructor:     Tom Cargill, Consultant

INTENDED AUDIENCE:  Programmers who are starting to program in 
C++ or have a reading knowledge and are looking for guidance on 
how to use C++ features in practice.  Knowledge of C++ language basics 
is assumed.  Advanced language features are clarified as needed.  
The material is code intensive, for programmers who like to read and 
understand programs.

C++ supports programming-in-the-large, allowing relationships 
between different parts of a program to be described.  The scope of 
C++ programming style therefore goes beyond traditional 
programming in-the-small issues.  This tutorial examines the use of 
C++ language features that often confuse a novice, including 
(multiple) inheritance, virtual functions, constructors, destructors, 
function and operator overloading, default arguments and static 
members.

Unwarranted use of the more powerful features leads to cluttered 
programs that are harder to comprehend or less efficient.  In this 
tutorial, we read a number of programs and discuss their 
organization and use of C++.  Together we critique the design, 
redesign where necessary, then recode.  Techniques range from 
simple rules of thumb about constructors to transformations that 
remove redundant inheritance.  Questions from data abstraction and 
object-oriented design to the expression of a given design in C++ are 
discussed.  Design and coding style guidelines are distilled from the 
examples.

Tom Cargill started programming in C++ at the Computing Science 
Research Center, AT&T Bell Labs, Murray Hill, NJ, when the language 
was called "C84."  He wrote one of the first major C++ programs, a 
family of portable, distributed debuggers.  He has continued to use 
and teach C++, presenting his experience in papers and tutorials at 
numerous technical conferences.  Tom is the author of Addison-
Wesley's TEC C++ course.  Currently a software consultant, based in 
Colorado, he holds a Ph.D. from the University of Waterloo.


T4
UNIX System V Release 4.0 Internals 2 Part II:  Streams I/O and 
Process Management
Instructors:    Mike Scheer, ProLogic and Steve Buroff, AT&T

INTENDED AUDIENCE:  Attendees should have attended "UNIX System 
V Release 4.0 Internals Part I:  Virtual Memory and File Systems," 
or have equivalent knowledge.  This is a newly revised tutorial and a 
source license is not required.

Streams is a framework for the modular implementation of character 
devices and network protocols.  The tutorial begins with a discussion 
of Streams, emphasizing features new for SVR4.  It continues with 
process management facilities.  For Release 4, process management 
includes a novel session management architecture that supports 
POSIX job control and the secure management of controlling 
terminals, configurable real-time and time-sharing schedulers, and 
the /proc file system, which provides powerful support for 
debuggers.

Michael Scheer is a Principal Member of Technical Staff at ProLogic 
Corporation. His work includes distributed operating systems, file 
systems, and symmetric multiprocessing. He was previously a 
Member of the Technical Staff at AT&T Bell Laboratories, where he 
was lead developer for the Remote File Sharing kernel in System V 
Release 4.0, and contributed to the designs of the virtual file and 
virtual memory subsystems. Mike received his M.S. degree in 
Computer Science at the University of Vermont in 1982.

Steve Buroff is a Distinguished Member of Technical staff at AT&T.  
He received his Ph.D. in Computer Science from Illinois Institute of 
Technology.  He has worked on UNIX  kernel development including 
multi-processor systems and demand paging.  He is currently 
investigating possible real-time enhancements to the UNIX system.


T5
Introduction to Programming With the X Toolkit Intrinsics
Instructor:    Paul Kimball, Digital Equipment Corporation

INTENDED AUDIENCE:  Programmers who are new to X Toolkits, or 
interested end-users who want a better understanding of the 
technology.  Attendees should have a good working knowledge of the 
X Window System Architecture, including the Xlib programming 
interface, or should attend the X Window System Tutorial. For the 
more advanced material, a good understanding of C language syntax 
and structures is required.

This tutorial provides a step-by-step practical introduction to 
programming with user-interface toolkits based on the MIT X Toolkit 
Intrinsics.  The X Toolkit Intrinsics are a significant enhancement to 
the X Window  System standard.  Shipped with X on the MIT tape, 
the Intrinsics provide facilities for constructing and employing 
workstation graphical user-interface tools ("widgets") such as scroll 
bars,  dialog boxes, buttons, etc.  This tutorial presents a detailed 
overview of the Intrinsics, and how to use them to build applications 
based on any of a number of common toolkits, including DEC 
windows XUI, OSF/Motif, The MIT Athena widget set and AT&T's 
OPEN LOOK GUI X-based Toolkit.  Each of the major Intrinsics 
routines and subsystems are discussed, including the latest Release 4 
enhancements.  Features of the several industry toolkits based on  
the X Toolkit Intrinsics are compared and their practical use 
discussed.  The tutorial ends with a discussion of object-oriented 
programming principles as implemented in the package.

Paul Kimball is an expert on graphics, window systems, user-
interface toolkits and CAD integration.  He joined Digital in 1984 as a  
Computer-Aided Design consultant and is now Group Consultant with 
the Independent Software Vendor support team in Mountain View, 
CA, where he assists software developers in porting to Open Systems.  
He has been working and teaching with X and X Toolkits since 1986.  
He holds Engineering degrees from MIT (1977) and Princeton 
University (1978).


T6
Network Security: The Kerberos Approach
Instructors:    Dan Geer, DEC and Jon A. Rochlis, MIT

INTENDED AUDIENCE:  Systems developers responsible for networked 
workstation environments, particularly those whose environments 
may include networks which are not themselves physically secure 
(i.e., "open" networks).  Systems managers concerned about the 
inherent lack of security for managing today's network-based 
environments (e.g., UNIX's .rhosts files).

Given the increasing importance of the information transmitted via 
the Internet, it is imperative to consider the basic security issues 
presented as large open networks replace isolated timesharing 
systems.

Tutorial attendees gain an understanding of the kinds of security 
threats which result from operating in an open environment, such as 
one comprised of a network of workstations and supporting servers.  
They are presented with approaches to meeting these threats.  The 
focus is on the Kerberos system developed at MIT, but public key 
techniques for ensuring privacy and authentication on an open 
network are also covered.  The X.509 authentication model studied as 
is the new Internet Privacy Enhanced Electronic Mail RFCs.

At  the conclusion of the tutorial, attendees should be able evaluate 
the vulnerability of their particular computing environments and 
applications, and know how to add an appropriate amount of 
security.

Daniel E. Geer, Jr. is now a member of the Technical Staff of Digital 
Equipment Corporation's External Research Program, working out of 
the Cambridge Research Laboratory.  For the previous 4.5 years, he 
was the Manager of Systems Development for MIT's Project Athena 
where he oversaw the creation of the Athena distributed computing 
environment, including the work that forms the basis for this 
tutorial.  He holds a Bachelor of Science in Electrical Engineering and 
Computer Science from MIT and a Doctor of Science in Biostatistics 
from Harvard University.

Jon A. Rochlis is an Assistant Network Manager for MIT Network 
Services, which runs the MIT campus network and network services 
including the Athena Kerberos realm.  Prior to working for MIT he 
worked on the Amber operating system for the S1 project at 
Lawrence Livermore National Laboratories, and the Multics operating 
system at Honeywell.  Mr. Rochlis received his Bachelor's in 
Computer Science and Engineering from MIT.


T7 NEW!
Introduction to Hypertext Systems and Hypermedia Applications
Instructor:     Paul Kahn, Brown University

INTENDED AUDIENCE:   This new tutorial assumes no previous 
experience with hypertext or hypermedia software. It is for 
managers, end-users, and software engineers interested in 
understanding hypermedia concepts and applying hypermedia 
software solutions in their work.

Hypertext/hypermedia, though among the most frequently heard 
and misunderstood concepts in the information industry, nonetheless 
has proven to offer substantial benefits to product developers and 
information consumers.  This in-depth workshop explores the 
concepts behind hypertext development, offers an overview of 
hypertext applications currently on the market, and provides 
attendees with a tutorial in the use of commercially available 
hypermedia systems.

Significant developments in the fifty year history of hypertext 
research are considered in terms of their influence on the current 
application software market.  An overview of the current hypertext 
applications in research labs and on the market follows.

Designing hypermedia materials means delivering information on the
computer screen.  We review the graphic design principles that affect 
hypermedia screen design in contrast to book and magazine design.  
Next is a detailed, practical tutorial in the use of three
commercially available hypermedia systems: HyperCard, IRIS
Intermedia, and DynaText.  Participants learn techniques for 
converting and organizing data, building links, and designing finished
educational applications.

Paul Kahn has been Project Coordinator at the Institute for Research
in Information and Scholarship at Brown University since 1985,
involved in the design and creation of hypermedia materials for
education.  He is also a partner in Dynamic Diagrams, Inc., a firm
specializing in the design of information graphics in print and
electronic media.  He has presented seminars and workshops on
hypermedia in the United States and Europe.  His writing on 
computer technology and information design has appeared in Byte, 
Publish, Optical Information Systems Journal, Journal of the 
American Society of Information Science, Hypermedia, Laserdisk 
Professional, many other professional journals as well as computer 
science conference proceedings.  He contributed to Hypertext and 
Literary Studies (MIT Press 1991) and is co-editor of From Memex to 
Hypertext:  Vannevar Bush and the Mind's Machine (Academic Press 
1991).


T8
The Network Computing System (OSF/DCE Remote Procedure Call)
Instructors:    Nathaniel Mishkin and Paul J. Leach, Hewlett-Packard; 
Richard Mackey, Open Software Foundation

INTENDED AUDIENCE:  No prior knowledge about distributed 
computing will be assumed.  A  knowledge of general networking 
issues will be helpful.  The tutorial should give attendees a good 
overall sense of what NCA/NCS is and how one writes applications 
using NCS.

The Network Computing System (NCS) is an implementation of the 
Network Computer Architecture (NCA), a framework for building 
distributed applications in a heterogeneous computing environment.  
NCS runs on a variety of Unix systems, VMS, and MS/DOS.  NCA/NCS's 
core feature is a Remote Procedure Call (RPC) mechanism that allows 
programs to "call" subroutines that run on remote systems.

This tutorial describes the general structure of NCA:  The Network 
Interface Definition Language (NIDL), the Network Data 
Representation (NDR) protocol, the NCA Remote Procedure Call 
(NCA/RPC) protocol, and NCA's object-oriented model of distributed 
computing and resource locating.  The tutorial also examines the 
Network Computing Kernel (NCK) runtime library and NIDL compiler, 
which are part of NCS.  Several sample NCS-based applications from 
simple examples to real live complex distributed systems like the 
NCS-based user registry are studied.

The tutorial describes NCS 2.0, a follow-on version of 
Hewlett-Packard Apollo's NCS 1.5.  NCS 2.0, developed jointly by HP 
and Digital Equipment Corporation, has been selected to be the RPC 
system for the Open Software Foundation's Distributed Computing 
Environment.

Nathaniel Mishkin is an senior consulting engineer at HP's 
Cooperative Object Computing Operation and is one of the architects 
and developers of NCS.  Mr. Mishkin received his Ph.D. from the Yale 
University Department of Computer Science in 1984.

Paul J. Leach, the founder of the NCS project, was one of the first 
engineers at Apollo Computer and is a principal architect of Apollo's 
DOMAIN operating system.

Richard Mackey, as principal engineer at the Open Software 
Foundation, is the technical lead in the areas of remote procedure call 
and threads technologies for OSF's Distributed Computing 
Environment (DCE) project.  Mr. Mackey served as a member of the 
DCE Request For Technology evaluation team and has delivered 
presentations on NCS and other DCE technologies to large audiences 
all over the world.


T9
New Kernel Facilities in 4.3BSD-Reno
Instructors:       Marshall Kirk McKusick and Michael J. Karels, 
University of California, Berkeley

INTENDED AUDIENCE:  This tutorial is directed to systems 
programmers that have taken a tutorial on 4.3 internals or who have 
had at least a year of experience working on the 4.3 kernel.  No 
source license is required for this tutorial.

This tutorial presents a detailed discussion of the new facilities that 
have been released in the 4.3BSD-Reno distribution. Presentations 
emphasize system organization, data structure navigation, and 
algorithms.  About 35% of the material from our previous USENIX 
tutorial, "Beyond 4.3BSD: Advanced Kernel Topics" is retained.

1)  Networking
        OSI protocols
        new networking buffering scheme
        routing and routing sockets
        TCP improvements (header prediction, compressed SLIP)
2)  POSIX
        termios
        process groups and controlling terminal
        new process structure
        new system call interface
3)  Filesystems
        virtual filesystem interface
        changes to the local filesystem
        new quota implementation
        NFS implementation
        memory-based filesystem
        dead filesystem
4)  System Interface Changes
        virtual memory
        bstreams
        get kernel info
        ktrace facility

Dr. McKusick did his graduate work at the University of California, 
where he received Masters degrees in Computer Science and 
Business Administration, and a Ph.D. in the area of programming 
languages.  While at Berkeley he implemented the 4.2BSD fast file 
system and was involved in implementing the Berkeley Pascal 
system.  He is currently the Research Computer Scientist at the 
Berkeley Computer Systems Research Group, continuing the 
development of future versions of Berkeley UNIX.  He is president of 
the USENIX Association and a member of the editorial board of UNIX 
Review.

Michael J. Karels is the Principal Programmer of the Computer 
Systems Research Group at the University of California, Berkeley.  
Since the release of 4.2BSD, he has been the system architect for 
Berkeley UNIX, continuing the development of new versions of BSD.  
Michael received his B.S. in Microbiology at the University of Notre 
Dame.  While a graduate student in Molecular Biology at the 
University of California, he was the principal developer of the 2.9BSD 
UNIX release of the Berkeley Software Distribution for the PDP-11.  
He is a member of the ACM, the IEEE,the Internet Engineering Task 
force and several POSIX working groups.

The speakers are co-authors of the book The Design and 
Implementation of the 4.3BSD UNIX Operating System.

***********************************************************************



To receive a brochure and information on registration and hotel,
please contact:

                        USENIX Conference Office
                        22672 Lambert St., Suite 613
                        El Toro, CA  92630
                        Telephone # (714) 588-8649
                        FAX # (714) 588-9706
                        email address:  judy at usenix.org



More information about the Comp.org.uniforum mailing list