UniForum NZ '96 -- Programme

Thursday 23 May 2019

Rolf Jester
The Magic of Open Clients and Servers

This paper is about survival - of the business, of the IS department and of the IT professional and manager. It examines the technical and business case for building an open information architecture, arguing that IT must actively add to the value-creation process of the business, and must create the strategic flexibility essential to success. Taking a view of current and possible future technologies, a practical set of survival guidelines is proposed.
Carl Cargill
A Report on the Status of Open Systems

This paper seeks to unscramble some of the current myths of what "open" and "systems" mean, and why the consortia and user alliances, driven by vendors, will continue to fall short in their efforts to make open systems a reality, barring fundamental changes in their approach. (M)
Anand Raman
NIETSHE: A New Shell for Unix with Built-in Help

The question of designing an interface which evolves with the changing help needs of the user seems not to have been addressed in any great detail to date. This paper describes work in progress on NIETSHE, a Unix shell based on a triphasic interface model and the provision of active help. (T)
Liam Greenwood
Installing Linux

All about Linux: a complete run-down, from choosing what you want through installation to day-to-day care and feeding of your system. (T)
Michael Condry
A New Paradigm for Useful Standards

Software products often have the standard compliant software as a "bolt on" that is not truly integrated into the software product and sometimes does not even interoperate with the majority of the system. This paper proposes a new process for standards development that results in compliant products with reduced documentation costs. (M)
Bruce Miller
Data Mining - Dealing with Data

Need help to extract that jewel of information from the mound of data? This paper presents several examples of successful applications of data mining in New Zealand and overseas and offers a checklist for investigating the possible use of these techniques in your own organisation. (T)
John Paynter
Software Plagiarism - The Ultimate in Open Systems?

Much is made in the press of software copying and software copyright, but little is said of 'software cloning'. This paper examines some of the legislation and legal decisions made on software plagiarism and proposes an analysis method for detecting and quantifying cloning. (M)
Mike Hayes
A Unix File System for the 21st Century

This paper examines a new filesystem which provides the features needed to handle the demands of modern Unix systems such as guaranteed I/O performance, support for huge files and journalling for rapid and reliable recovery of data. (T)
Mark Davies
Introduction to Security

This workshop introduces system and network security, identifies the major potential security risk and indicates the steps necessary to reduce the risk. This will be particularly suitable for those who have just joined or are about to join the Internet. (T)
Berny Goodheart
The Evolution of Unix. Where is it Going?

The Unix system is now the operating system of choice for commercial grade, mission critical applications. However, there is some speculation that the demise of Unix is upon us. And others are forecasting that the road for Unix has only just begun. This paper takes a look at the way the various flavours of Unix have evolved, and attempts to provide some indication on its future. (M)
Donald Neal
Take the Cache and Run

The Harvest Object Cache software has allowed the construction of an international network of communicating caching servers, in effect a very large distributed cache. This paper describes the growth and operation of the Harvest Object Cache software. (T)
David Long
Java: The Reality

This session will feature a non-technical talk about Java, why it is important and how it might affect future of the web, and distributed computing. Topics covered include applications, browsers, security, portability and animation.

Key to Sessions: (M) - Management; (T) - Technical; (G) - General


Friday 24 May 2019

Paul Mockapetris
Internet 2000 - New Alternatives

Can the Internet evolve into a scalable structure delivering ever-increasing levels of bandwidth to its users? Will it continue to offer surprising increases in functionality or is the web as we know it today the end? Can the Internet solve the routing, administrative and funding problems that seem to have become part of the net today? Paul will discuss why the Internet user of 2000 will have much more power, but perhaps at the cost of new concerns.
Malcolm Stayner
Exploiting Information

It is generally recognised that there is an abundance of information available today, especially on-line. This paper looks at strategies for, and examples of, successful information exploitation. (M)
Brent Summers
Nigel: A Simple Approach to General User Accounting

This paper describes the University of Waikato's "Nigel" user-accounting system, to be deployed across the University campus this year. (T)
Brenda Parsons
Decision Support Systems - It Ain't Easy!

Why would you want to build data warehouses for decision support systems and how do you go about it? This workshop looks at the rationale and the terminology and covers issues of design, scalability, data, and performance. (T)
John Hine
Information Discovery and Retrieval Tools

Network users can now be given immediate access to a wealth of information - provided we can collect and index this information. This talk will look at the Harvest system, which can produce indices that are significantly more effective than traditional full text search strategies. (M)
Roger de Salis
A Large Scale Commercial Implementation of Open Systems and PCs

Interesting problems and unexpected solutions are encountered when implementing open systems and PCs on a grand scale. What are the technical solutions, are they successful, do the end-users like it, and in hindsight what would we change? (T)
Mike Warren
Application Gateways to Achieve Open Integration

Where standards-based products are not available to fulfill open systems development models, it may be easier to isolate the functions desired and design those into small, compact, reliable and transparent modular application gateways. (M)
Robert Biddle
Visualising IP Network Performance with TCL/Tk

Effective network management requires understanding of network performance and practical tools which work with a range of hardware and software. This paper introduces a tool for visualising network traffic on IP networks by means of customisable dynamic displays of network topology. (T)
Bruce Miller
Driving the Information Superhighway

This workshop will provide a tour of the hardware and operating systems being deployed by both the cable and telco industries, review the deployment of digital cable infrastructure from a number of equipment manufacturers including those currently installing equipment here in NZ and explore the operating system developments from companies like Microsoft and Silicon Graphics. We'll also look at a possible hybrid scenario which could describe a path for New Zealand. (G)
Roger Hicks
ISOCNZ - Roles, Goals, and Ambitions

The Internet Society of New Zealand has been formed to promote and administer the Internet in this country and to represent our interests internationally. Roger, its founding Chairman, will describe the society, its activities and the issues ahead. (G)
Steve Wong
Graphic Manipulation of Performance Data with Perl/Tk

The performance data essential to network management varies from system to system and as systems evolve. This paper describes a tool for graphically manipulating computer system performance data and manipulating streams of performance data in real-time using the Perl programming language. (T)
Anne Buzbee
Architecture Options: What's New and What Works in Today's Business Environments

Returning by popular request, Anne will provide in this session a firm grounding in fundamental decisions about client/server technologies, helping you make decisions about two-tier versus three-tier architectures, when to use application partitioning; options for scaling; when to use second-generation development tools; and the role of object-oriented technologies in client/server environments.
Roger Fraumann
Digital Dial Tone - Electronic Commerce on Demand

Commerce and the Internet are rapidly becoming inseparable. This session explores key factors in the emerging worldwide electronic mall: scalability, administration and surety, plus issues of identity, authentication, anonymity, security, privacy, tax laws and the need to strike a balance between network commerce and local "shops."

Key to Sessions: (M) - Management; (T) - Technical; (G) - General


Saturday 25 May 2019

Anne Buzbee
A Status Report on Object Oriented Technologies

Object-oriented technologies and their implementation are gaining popularity within the mainstream IT organizations. The reasons for this are the need to reduce development costs, decrease the "time-to-market" of applications and the use of objects as an enabling technology within a client/server environment. This session will focus on what is new in the OO world, standardization efforts and pitfalls of implementing OO technology. (M)
Alby Cartner
Awk in Daily Life

The virtues of awk and a brief overview of some of the problems that it can solve are presented in this paper. A description -- with examples -- of the basic constructs of an awk script and the mechanisms it uses are offered, with a question and answer time to follow. (T)
Ian Soffe
Success Through Middleware

Case studies are used to look at building successful distributed client-server architectures using middleware tools such as OLTP monitors and compliant tools, databases and platforms. (M)
Frank van der Zwaag
The Use of IT at "Operation Park"

The hunt for South Auckland¹s serial rapist was about systems integration, data exchange, integrity and auditing of systems, and software development. (G)
Panel Session -- Moderator: Noel Cheer
Calling to Account

Your chance to challenge the experts! In this final plenary session, we will bring together all the earlier Keynote and Plenary speakers to present their overviews of the conference as a whole, and to answer questions from one another and the audience in general, under the control of a moderator.

Key to Sessions: (M) - Management; (T) - Technical; (G) - General


return to conference guide