OPINION Sysadmin NETWORKING Security Columns

Total Page:16

File Type:pdf, Size:1020Kb

OPINION Sysadmin NETWORKING Security Columns October 2010 VOLUME 35 NUMBER 5 OPINION Musings 2 RikR FaR ow SYSADMin Teaching System Administration in the Cloud 6 Jan Schaumann THE USENIX MAGAZINE A System Administration Parable: The Waitress and the Water Glass 12 ThomaS a. LimonceLLi Migrating from Hosted Exchange ­Service to In-House Exchange Solution 18 T Roy mckee NETWORKING IPv6 Transit: What You Need to Know 23 mT aT Ryanczak SU EC RITY Secure Email for Mobile Devices 29 B Rian kiRouac Co LUMNS Practical Perl Tools: Perhaps Size Really Does Matter 36 Davi D n. BLank-eDeLman Pete’s All Things Sun: The “Problem” with NAS 42 Pe TeR BaeR GaLvin iVoyeur: Pockets-o-Packets, Part 3 48 Dave JoSePhSen /dev/random: Airport Security and Other Myths 53 RoT BeR G. FeRReLL B OOK reVIEWS Book Reviews 56 El izaBeTh zwicky, wiTh BRanDon chinG anD Sam SToveR US eniX NOTES USA Wins World High School Programming Championships—Snaps Extended China Winning Streak 60 RoB koLSTaD Con FERENCES 2010 USENIX Federated Conferences Week: 2010 USENIX Annual Technical Conference Reports 62 USENIX Conference on Web Application Development (WebApps ’10) Reports 77 3rd Workshop on Online Social Networks (WOSN 2010) Reports 84 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud ’10) Reports 91 2nd Workshop on Hot Topics in Storage and File Systems (HotStorage ’10) Reports 100 Configuration Management Summit Reports 104 2nd USENIX Workshop on Hot Topics in Parallelism (HotPar ’10) Reports 106 The Advanced Computing Systems Association oct10covers.indd 1 9.7.10 1:54 PM Upcoming Events 24th Large InstallatIon system admInIstratIon ConferenCe (LISA ’10) Sponsored by USENIX in cooperation with LOPSA and SNIA november 7–12, 2010, San joSe, Ca, USa http://www.usenix.org/lisa10 aCm/IfIP/USENIX 11th InternatIonaL mIddLeware ConferenCe (mIddLeware 2010) nov. 29–DeC. 3, 2010, bangalore, India http://2010.middleware-conference.org/ 9th USENIX ConferenCe on file and storage teChnoLogIes (FAST ’11) Sponsored by USENIX in cooperation with ACM SIGOPS FebrUary 15–18, 2011, San joSe, Ca, USa http://www.usenix.org/fast11 8th USENIX symPosium on networked systems desIgn and ImplementatIon (NSDI ’11) Sponsored by USENIX in cooperation with ACM SIGCOMM and ACM SIGOPS marCh 30–aprIl 1, 2011, boSton, MA, USa http://www.usenix.org/nsdi11 eUroPean ConferenCe on Computer systems (eUrosys 2011) Sponsored by ACM SIGOPS in cooperation with USENIX aprIl 10–13, 2011, SalzbUrg, AustrIa http://eurosys2011.cs.uni-salzburg.at 13th workshoP on hot topics In oPeratIng systems (hotOS XIII) Sponsored by USENIX in cooperation with the IEEE Technical Committee on Operating Systems (TCOS) may 8–10, 2011, napa, Ca, USa http://www.usenix.org/hotos11 Submissions due: January 15, 2011 2011 USENIX federated ConferenCes week IncludIng USENIX ATC ’11, webapps ’11, and hotCLoUd ’11 June 12–17, 2011, portlanD, OR, USa 20th USENIX securIty symPosium (USENIX securIty ’11) August 10–12, 2011, San Francisco, Ca, USa For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. oct10covers.indd 2 9.9.10 10:47 AM OPINION Musings 2 Rik FArrOw SYSADMin Teaching System Administration in the Cloud 6 JAN SchAumANN A System Administration Parable: The Waitress and the Water Glass 12 thOmas A. LImoncellI Migrating from Hosted Exchange Service to In-House Exchange Solution 18 contents trOy mckee NETWORKING IPv6 Transit: What You Need to Know 23 Matt ryanczAk SECUritY Secure Email for Mobile Devices 29 brian KirOuAc CoLUMNS Practical Perl Tools: Perhaps Size Really Does Matter 36 DAvid N. Blank-EdeLmAN Pete’s All Things Sun: The “Problem” with NAS 42 Peter Baer GALvIN VOL. 35, #5, Oct Ober 2010 Editor ;login: is the official iVoyeur: Pockets-o-Packets, Part 3 48 Rik Farrow magazine of the DS Ave JO ePhSeN USENIX Association. [email protected] /dev/random: Airport Security and Managing Editor ;login: (ISSN 1044-6397) is Other Myths 53 Jane-Ellen Long published bi-monthly by the Robert G. Ferre LL [email protected] USENIX Association, 2560 Ninth Street, Suite 215, Copy Editor Berkeley, CA 94710. Steve Gilmartin BEook R ViewS Book Reviews 56 [email protected] $90 of each member’s annual Eli zAbeth zwIcky, wIth br andoN chinG dues is for an annual sub- anD sam StOver produCtion scription to ;login:. Subscrip- Casey Henderson tions for nonmembers are Jane-Ellen Long $125 per year. Jennifer Peterson USeniX NOTES USA Wins World High School Programming Periodicals postage paid at Championships—Snaps Extended China typEsEttEr Berkeley, CA, and additional Winning Streak 60 Star Type offices. [email protected] Rob Kolstad POSTMASTER: Send address USEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, ConFerenCES Suite 215, Berkeley, 2560 Ninth Street, 2010 USENIX Federated Conferences Week: California 94710 Suite 215, Berkeley, 2010 USENIX Annual Technical Conference Phone: (510) 528-8649 CA 94710. FAX: (510) 548-5738 Reports 62 ©2010 USENIX Association http://www.usenix.org USENIX Conference on Web Application http://www.sage.org USENIX is a registered trade- Development (WebApps ’10) Reports 77 mark of the USENIX Associa- 3rd Workshop on Online Social Networks tion. Many of the designations (WOSN 2010) Reports 84 used by manufacturers and sellers to distinguish their 2nd USENIX Workshop on Hot Topics in products are claimed as trade- Cloud Computing (HotCloud ’10) Reports 91 marks. USENIX acknowledges 2nd Workshop on Hot Topics in Storage all trademarks herein. Where those designations appear in and File Systems (HotStorage ’10) this publication and USENIX Reports 100 is aware of a trademark claim, Configuration Management Summit the designations have been Reports 104 printed in caps or initial caps. 2nd USENIX Workshop on Hot Topics in Parallelism (HotPar ’10) Reports 106 ;LOGIN: OctOber 2010 ARTIcLe tItLe 1 OCTOBER_2010_loginarticles_ch.indd 1 9.7.10 2:11 PM As I w As g oIng over the l Ineup of articles for this issue of ;login:, I found my- Rik Fa rrow self thinking about just how cool it is that we have not just virtualization, but services that make it easy to spin up new systems on a moment’s notice. We can use the new “system” for testing, and as soon as we are musings done with it, it is gone. Poof. At the same time, I found myself pondering this Rik is the Editor of ;login:. brave new world, facing the quandaries it creates: [email protected] spinning up VMs is really easy, but how do we manage all these systems? Greybeard I learned system administration the way many people have—through trial and error. I had no mentors, as the people who could manage UNIX systems were still few and far between. I was fortu- nate in one way, though: I was being paid to learn how to manage UNIX systems and to write about it. And the people who were paying me provided systems to play with. I fondly recall sitting in Becca Thomas’s backyard in San Francisco, playing with a Xenix system while drinking a beer. My goal was to understand how dump and restor worked, with a particular focus on dump levels. The man page writer had suggested using a Tower of Hanoi sequence of dump levels, but I wanted, really needed, to know why. I couldn’t just follow some unknown person’s suggestions, as I knew nothing about this person’s reasoning or reputation. I wrote several system manuals for manufacturers of microcomputer-based multi-user UNIX systems, and each time I understood more. Then I ghost- wrote chapters for several books before I started my own. Now that it was my book, I had to use my own computer. I kept it locked inside a special desk that I had designed (lots of ventilation), and added deadbolts with keys for both inside and out to all house doors, to make it more difficult for someone to steal the computer. The physical security seems ridiculous to me today, as the computer really only had value to me—a thief would be hard-pressed to use a UNIX system running System V Release 3 with one megabyte of RAM and 34 megabytes of hard disk. But that was my experimental system, as well as where Thomas and I wrote. Primitive by today’s standards, but a big deal back then. 2 ;LOGIN: vOL. 35, NO. 5 OCTOBER_2010_loginarticles_ch.indd 2 9.7.10 2:11 PM A Wider World I was missing out on a much wider world, but didn’t know it. I also did consulting as a sysadmin, in those few places that needed a small multi-user system. I thought I was working in the real world of UNIX, but individual systems were quickly becoming a thing of the past. When I proposed a title for my book, The Handbook of System Administration, I was stunned to discover that my publisher had contracted with another group to write a similar book, and they had already chosen that name. I later learned that this was Evi Nemeth and friends, whose fourth edition [1] of their book has just arrived, but too late for a review to be included in this issue. Nemeth et al. were taking a very different approach to sysadmin. Their envi- ronment was the University of Colorado in Boulder, and they had access to lots of systems. From my perspective, telling people how to attach vampire taps [2] to thick Ethernet cables seemed far afield from sysadmin, yet this was an important topic in their first edition. And this pointed to something very important that my co-author and I had completely missed. Computers would soon be connected to networks, and only rarely would they be used alone. While our book had an excellent chapter on using UUCP over dialup, they included basic IP networking.
Recommended publications
  • Security in Cloud Computing a Security Assessment of Cloud Computing Providers for an Online Receipt Storage
    Security in Cloud Computing A Security Assessment of Cloud Computing Providers for an Online Receipt Storage Mats Andreassen Kåre Marius Blakstad Master of Science in Computer Science Submission date: June 2010 Supervisor: Lillian Røstad, IDI Norwegian University of Science and Technology Department of Computer and Information Science Problem Description We will survey some current cloud computing vendors and compare them to find patterns in how their feature sets are evolving. The start-up firm dSafe intends to exploit the promises of cloud computing in order to launch their business idea with only marginal hardware and licensing costs. We must define the criteria for how dSafe's application can be sufficiently secure in the cloud as well as how dSafe can get there. Assignment given: 14. January 2010 Supervisor: Lillian Røstad, IDI Abstract Considerations with regards to security issues and demands must be addressed before migrating an application into a cloud computing environment. Different vendors, Microsoft Azure, Amazon Web Services and Google AppEngine, provide different capabilities and solutions to the individual areas of concern presented by each application. Through a case study of an online receipt storage application from the company dSafe, a basis is formed for the evaluation. The three cloud computing vendors are assessed with regards to a security assessment framework provided by the Cloud Security Alliance and the application of this on the case study. Finally, the study is concluded with a set of general recommendations and the recommendation of a cloud vendor. This is based on a number of security as- pects related to the case study’s existence in the cloud.
    [Show full text]
  • Misc Thesisdb Bythesissuperv
    Honors Theses 2006 to August 2020 These records are for reference only and should not be used for an official record or count by major or thesis advisor. Contact the Honors office for official records. Honors Year of Student Student's Honors Major Thesis Title (with link to Digital Commons where available) Thesis Supervisor Thesis Supervisor's Department Graduation Accounting for Intangible Assets: Analysis of Policy Changes and Current Matthew Cesca 2010 Accounting Biggs,Stanley Accounting Reporting Breaking the Barrier- An Examination into the Current State of Professional Rebecca Curtis 2014 Accounting Biggs,Stanley Accounting Skepticism Implementation of IFRS Worldwide: Lessons Learned and Strategies for Helen Gunn 2011 Accounting Biggs,Stanley Accounting Success Jonathan Lukianuk 2012 Accounting The Impact of Disallowing the LIFO Inventory Method Biggs,Stanley Accounting Charles Price 2019 Accounting The Impact of Blockchain Technology on the Audit Process Brown,Stephen Accounting Rebecca Harms 2013 Accounting An Examination of Rollforward Differences in Tax Reserves Dunbar,Amy Accounting An Examination of Microsoft and Hewlett Packard Tax Avoidance Strategies Anne Jensen 2013 Accounting Dunbar,Amy Accounting and Related Financial Statement Disclosures Measuring Tax Aggressiveness after FIN 48: The Effect of Multinational Status, Audrey Manning 2012 Accounting Dunbar,Amy Accounting Multinational Size, and Disclosures Chelsey Nalaboff 2015 Accounting Tax Inversions: Comparing Corporate Characteristics of Inverted Firms Dunbar,Amy Accounting Jeffrey Peterson 2018 Accounting The Tax Implications of Owning a Professional Sports Franchise Dunbar,Amy Accounting Brittany Rogan 2015 Accounting A Creative Fix: The Persistent Inversion Problem Dunbar,Amy Accounting Foreign Account Tax Compliance Act: The Most Revolutionary Piece of Tax Szwakob Alexander 2015D Accounting Dunbar,Amy Accounting Legislation Since the Introduction of the Income Tax Prasant Venimadhavan 2011 Accounting A Proposal Against Book-Tax Conformity in the U.S.
    [Show full text]
  • AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions
    AWS Certified Developer – Associate (DVA-C01) Sample Exam Questions 1) A company is migrating a legacy application to Amazon EC2. The application uses a user name and password stored in the source code to connect to a MySQL database. The database will be migrated to an Amazon RDS for MySQL DB instance. As part of the migration, the company wants to implement a secure way to store and automatically rotate the database credentials. Which approach meets these requirements? A) Store the database credentials in environment variables in an Amazon Machine Image (AMI). Rotate the credentials by replacing the AMI. B) Store the database credentials in AWS Systems Manager Parameter Store. Configure Parameter Store to automatically rotate the credentials. C) Store the database credentials in environment variables on the EC2 instances. Rotate the credentials by relaunching the EC2 instances. D) Store the database credentials in AWS Secrets Manager. Configure Secrets Manager to automatically rotate the credentials. 2) A Developer is designing a web application that allows the users to post comments and receive near- real-time feedback. Which architectures meet these requirements? (Select TWO.) A) Create an AWS AppSync schema and corresponding APIs. Use an Amazon DynamoDB table as the data store. B) Create a WebSocket API in Amazon API Gateway. Use an AWS Lambda function as the backend and an Amazon DynamoDB table as the data store. C) Create an AWS Elastic Beanstalk application backed by an Amazon RDS database. Configure the application to allow long-lived TCP/IP sockets. D) Create a GraphQL endpoint in Amazon API Gateway. Use an Amazon DynamoDB table as the data store.
    [Show full text]
  • Ky; Okf”Kzd Izfrosnu
    2013-14 tokgjyky usg# fo’ofo|ky; Jawaharlal Nehru University okf”kZd izfrosnu 44 Annual Report Contents THE LEGEND 1 ACADEMIC PROGRAMMES AND ADMISSIONS 5 UNIVERSITY BODIES 10 SCHOOLS AND CENTRES 19-302 School of Arts and Aesthetics (SA&A) 19 School of Biotechnology (SBT) 35 School of Computational and Integrative Sciences (SCIS) 40 School of Computer & Systems Sciences (SC&SS) 45 School of Environmental Sciences (SES) 51 School of International Studies (SIS) 60 School of Language, Literature & Culture Studies (SLL&CS) 101 School of Life Sciences (SLS) 136 School of Physical Sciences (SPS) 154 School of Social Sciences (SSS) 162 Centre for the Study of Law & Governance (CSLG) 281 Special Centre for Molecular Medicine (SCMM) 292 Special Centre for Sanskrit Studies (SCSS) 297 ACADEMIC STAFF COLLEGE 303 STUDENT’S ACTIVITIES 312 ENSURING EQUALITY 320 LINGUISTIC EMPOWERMENT CELL 324 UNIVERSITY ADMINISTRATION 327 CAMPUS DEVELOPMENT 331 UNIVERSITY FINANCE 332 OTHER ACTIVITIES 334-341 Gender Sensitisation Committee Against Sexual Harassment 334 Alumni Affairs 336 Jawaharlal Nehru Institute of Advanced Studies 336 International Collaborations 340 CENTRAL FACILITIES 342-370 University Library 342 University Science Instrumentation Centre 358 Advanced Instrumentation Research Facility 360 University Employment Information & Guidance Bureau 370 JNU Annual Report 2012-13 iii FACULTY PUBLICATIONS 371-463 FACULTY RESEARCH PROJECTS 464-482 ANNEXURES 483-574 MEMBERSHIP OF UNIVERSITY BODIES 483 University Court 483 Executive Council 489 Academic Council 490 Finance Committee 495 TEACHERS 496 Faculty Members 496 Emeritus/Honorary Professors 509 Faculty Members Appointed 510 Faculty Members Confirmed 512 Faculty Members Resigned 512 Faculty Members Retired Compulsorily 513 Faculty Members Retired Superannuation 513 Faculty members Re-employed 513 RESEARCH SCHOLARS 514-574 Ph.D.
    [Show full text]
  • Introduction to Amazon Web Services
    Introduction to Amazon Web Services Jeff Barr Senior AWS Evangelist @jeffbarr / [email protected] What Does It Take to be a Global Online Retailer? The Obvious Part… And the Not-So Obvious Part How Did Amazon Get in to Cloud Computing? • We’d been working on it for over a decade • Development of a platform to enable sellers on the Amazon global infrastructure • Internal need for centralized, scalable deployment environment for applications • Early forays into web services proved developers were hungry for more This Led to a Broader Mission • Enable businesses and developers to use web services (what people now call “the cloud”) to build scalable, sophisticated applications. “It's not the customers' job to invent for themselves. It's your job to invent on their behalf. You need to listen to customers. You need to invent on their behalf. Kindle, EC2 would not have been developed if we did not have an inventive culture.” - Jeff Bezos, Founder & CEO, Amazon.com Attributes of Cloud Computing No Up-Front Capital Low Cost Pay Only for What Expense You Use Self-Service Easily Scale Up and Improve Agility & Time- Infrastructure Down to-Market Deploy Last-Generation IT Services Cloud-Generation IT Services Cloud-Generation IT Services What’s the Difference? Last-Generation Cloud-Generation • IT department • Empowered users • Manual Setup • Automated Setup • Hours/Days/Weeks • Seconds/Minutes • Error-prone • Scripted & repeatable • Small scale • Any scale AWS PLATFORM Cloud-Powered Applications Management & Administration Administration Identity &
    [Show full text]
  • Implementación De Los Algoritmos De Factorización 201
    Universidad Complutense de Madrid Facultad de Informática Sistemas Informáticos 2010/2011 RSA@Cloud Criptoanálisis eficiente en la Nube Autores: Directores de proyecto: Alberto Megía Negrillo José Luis Vázquez-Poletti Antonio Molinera Lamas Ignacio Martin Llorente José Antonio Rueda Sánchez Dpto. Arquitectura de Computadores Página 0 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Se autoriza a la Universidad Complutense a difundir y utilizar con fines académicos, no comerciales y mencionando expresamente a sus autores, tanto la propia memoria, como el código, la documentación y/o el prototipo desarrollado. Alberto Megía Negrillo Antonio Molinera Lamas José Antonio Rueda Sánchez Página 1 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 2 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Agradecimientos Un trabajo como este no habría sido posible sin la cooperación de mucha gente. En primer lugar queremos agradecérselo a nuestras familias que tanto han confiado y nos han dado. A nuestros directores José Luis Vázquez-Poletti e Ignacio Martín Llorente, por conseguir llevar adelante este proyecto. Por último, a todas y cada una de las personas que forman parte de la Facultad de Informática de la Universidad Complutense de Madrid, nuestro hogar durante estos años. Página 3 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Página 4 Facultad de Informática UCM RSA@Cloud Sistemas Informáticos – FDI Resumen En el presente documento se describe un sistema que aprovecha las virtudes de la computación Cloud y el paralelismo para la factorización de números grandes, base de la seguridad del criptosistema RSA, mediante el empleo de diferentes algoritmos matemáticos como la división por tentativa y criba cuadrática.
    [Show full text]
  • Cisco Workload Automation Amazon EC2 Adapter Guide
    Cisco Workload Automation Amazon EC2 Adapter Guide Version 6.3 First Published: August, 2015 Last Updated: September 6, 2016 Cisco Systems, Inc. www.cisco.com THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • System Administration Training Available!
    LISA ’06 offers the most in-depth, real-world system administration training available! A Blueprint for Real World System Administration 20TH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE DECEMBER 3–8, 2006 | WASHINGTON, D.C. Register by November 10 and save! www.usenix.org/lisa2006 CONFERENCE AT A GLANCE Saturday, December 2 5:00 p.m.–8:00 p.m. On-Site Registration 6:00 p.m.–7:00 p.m. Welcome Get-Together 7:00 p.m.–8:00 p.m. Conference Orientation Sunday, December 3 7:30 a.m.–5:00 p.m. On-Site Registration 9:00 a.m.–5:00 p.m. Training Program Building a 9:00 a.m.–5:00 p.m. Workshops 12:30 p.m.–1:30 p.m. Luncheon for Training Sysadmin & Workshop Attendees Monday, December 4 7:30 a.m.–5:00 p.m. On-Site Registration Community 9:00 a.m.–5:00 p.m. Training Program 9:00 a.m.–5:00 p.m. Workshops 12:30 p.m.–1:30 p.m. Luncheon for Training & Workshop Attendees WHY ATTEND LISA ’06? 7:00 p.m.–11:00 p.m. Birds-of-a-Feather Sessions “There is always one thing that I learn that makes me want to shout, ‘That just paid for the entire conference!’ Also, there Tuesday, December 5 have been many times when I learned about a new sysadmin 7:30 a.m.–5:00 p.m. On-Site Registration tool at LISA years before it was popular: that’s really helped me 9:00 a.m.–5:00 p.m.
    [Show full text]
  • Trade Marks Journal No: 1861 , 06/08/2018 Class 36 1816623 11
    Trade Marks Journal No: 1861 , 06/08/2018 Class 36 1816623 11/05/2009 ITZ ONLINE PAYMENTS LIMITED trading as ;ITZ ONLINE PAYMENTS LIMITED 10TH FLOOR, TIMES TOWER, KAMALA CITY, SENAPATI BAPAT MARG, LOWER PAREL, MUMBAI-400 013. SERVICE PROVIDERS A COMPANY INCORPATED IN INDIA Address for service in India/Agents address: VISHESH & ASSOCIATES. 2, 3 RD FLOOR, YESHWANT CHAMBERS, 18 - B, BHARUCHA MARG, KALAGHODA, FORT, MUMBAI - 400 023. Used Since :29/01/2009 MUMBAI INSURANCE,FINANCIAL AFFIRA,MONETARY AFFAIRS,REAL ESTATE AFFIARS,CAPITAL INVESTMENTS,FINANCIAL CONSULTANCY,INSURANCE CONSULTANCY,FINANCIAL EVALUATION,FUND INVESTMENTS, FINANCIAL MANAGEMENT,MUTUAL FUNDS,STOCK AND BONDS BROKING,ELECTRONIC FUND TRANSFER, ONLINE BANKING,ONLINE PAYMENT SERVICES, ONLINE CREDIT SERVICES,CASH CARD SERVICES, CASH CARD SERVICES,CREDIT CARD SERVICES,DEBIT CARD SERVICES, PRE PAID CARD SERVICES,FISCAL VALUATION". 5996 Trade Marks Journal No: 1861 , 06/08/2018 Class 36 Priority claimed from 10/03/2011; Application No. : 2011-017409 ;Japan 2200160 05/09/2011 NIPPON COMMERCIAL DEVELOPMENT CO., LTD YODOYABASHI MITSUI BLDG. 4F, IMABASHI 4-1-1 CHUO -KU OSAKA 541-0042 JAPAN MANUFACTURERS, TRADERS AND SERIVCES PROVICERS A JAPANESE CORPORATION Address for service in India/Agents address: ANAND AND ANAND. B-41,NIZAMUDDIN EAST, NEW DELHI - 110 013. Proposed to be Used DELHI DESIGN AND DEVELOPMENT ON ESTABLISHMENT AND OPERATION OF REAL-ESTATE INVESTMENT FIIND FOR OTHERS; PROVIDING INFORMATION ABOUT DESIGN AND DEVELOPMENT ON ESTABLISHMENT AND OPERATION OF REAL-ESTATE INVESTMENT
    [Show full text]
  • 60 Stray Dogs Killed in AP Internet Access Is a Basic Right
    c m y k c m y k THE LARGEST CIRCULATED ENGLISH DAILY IN SOUTH INDIA HYDERABAD I FRIDAY I 20 SEPTEMBER 2019 WEATHER Max: 29.4OC WORLD TABLOID Min: 23.8OC RH: 97% Iran warns against war as Duress code has become Rainfall: 13 mm US, allies mull action dress code in colleges Forecast: Cloudy sky with thunder showers. 11 Max/Min temp. 30/22ºC deccanchronicle.com, facebook.com/deccannews, twitter.com/deccanchronicle, google.com/+deccanchronicle Vol. 82 No. 261 Established 1938 | 32 PAGES | `4.00 ASTROGUIDE Singh becomes Tejas pilot for 2 minutes Vikari; Dakshinayana Tithi: Bhadrapada Bahula Internet access is Shasthi till 8.07 pm Star: Krittika till 10.16 am Varjyam: 2.57 am to 4.37 am (Saturday) a basic right: HC Durmuhurtam: 8.32 am to 9.21 am and 12.33 pm to 1.21 pm Rahukalam: 10.30 am to 12 pm Kerala High Court says it’s a part of Article 21 HIJRI CALENDAR Muharram 20,1441 AH DC CORRESPONDENT provides an avenue for stu- PRAYERS KOCHI, SEPT. 19 dents to access knowledge. Fajar: 5.05 am Counsel for the petitioner The Kerala High Court pointed out that the UN Zohar: 12.19 pm ruled on Thursday that the Human Rights Council had Asar: 4.30 pm right to access Internet declared right to internet as Maghrib: 6.20 pm using mobile phone is a fun- a human right in 2016. Isha: 7.27 pm damental right under the Justice Asha upheld the SUNSET TODAY 6.14 PM Constitution. Justice P.V.
    [Show full text]
  • Quad Plus: Special Issue of the Journal of Indo-Pacific Affairs
    The Journal of JIPA Indo-Pacific Affairs Chief of Staff, US Air Force Gen Charles Q. Brown, Jr., USAF Chief of Space Operations, US Space Force Gen John W. Raymond, USSF Commander, Air Education and Training Command Lt Gen Marshall B. Webb, USAF Commander and President, Air University Lt Gen James B. Hecker, USAF Director, Air University Academic Services Dr. Mehmed Ali Director, Air University Press Maj Richard T. Harrison, USAF Chief of Professional Journals Maj Richard T. Harrison, USAF Editorial Staff Dr. Ernest Gunasekara-Rockwell, Editor Luyang Yuan, Editorial Assistant Daniel M. Armstrong, Illustrator Megan N. Hoehn, Print Specialist Journal of Indo-Pacific Affairs ( JIPA) 600 Chennault Circle Maxwell AFB AL 36112-6010 e-mail: [email protected] Visit Journal of Indo-Pacific Affairs online at https://www.airuniversity.af.edu/JIPA/. ISSN 2576-5361 (Print) ISSN 2576-537X (Online) Published by the Air University Press, The Journal of Indo–Pacific Affairs ( JIPA) is a professional journal of the Department of the Air Force and a forum for worldwide dialogue regarding the Indo–Pacific region, spanning from the west coasts of the Americas to the eastern shores of Africa and covering much of Asia and all of Oceania. The journal fosters intellectual and professional development for members of the Air and Space Forces and the world’s other English-speaking militaries and informs decision makers and academicians around the globe. Articles submitted to the journal must be unclassified, nonsensitive, and releasable to the public. Features represent fully researched, thoroughly documented, and peer-reviewed scholarly articles 5,000 to 6,000 words in length.
    [Show full text]
  • Time Management for System Administrators by Thomas A
    Time Management for System Administrators By Thomas A. Limoncelli ............................................... Publisher: O'Reilly Pub Date: November 2005 ISBN: 0-596-00783-3 Pages: 226 Table of Contents | Index Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that prevent you from ever getting to those long-term projects. But the pressure is on you to produce and it only increases with time. What do you do? The answer is time management. And not just any time management theory--you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator. Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise. Among other skills, you'll learn how to: Manage interruptions Eliminate timewasters Keep an effective calendar Develop routines for things that occur regularly Use your brain only for what you're currently working on Prioritize based on customer expectations Document and automate processes for faster execution What's more, the book doesn't confine itself to just the work environment, either.
    [Show full text]