 
Front
Page

About UniForum
Conference 98
 Registration Details
 Programme Update
 Programme Timetable
 Programme Abstracts
 Tutorials
 Conference Specials
 General Info

Corporate
Sponsors
Special Interest
Groups
Unix Assistance

Book
Reviews
Library
Newsletter

Research Grants
Regional Meetings
UniForum
Board
|
Programme Abstracts
Thursday 21 May 2019
Changes from printed programme marked in
red. |
KEYNOTE:
The Impact of the Web on World Commerce
Carl Cargill, USA
The World Wide Web promises
to change the way that the world looks at
commerce - and the way commerce looks at the
world. Beginning with the premise that
information technology basically serves to
promote commerce, the talk will trace the way
that commerce has changed with the Web. The
somewhat sobering conclusion of the talk will
emphasize that change - especially in areas that
can impact the livelihood of nations - will occur
.
|
Mainly
Management |
User
Experiences |
Technically
Tilted |
Brenda Lobb
Communication in the Electronic
Age
Everybody's doing it - but as
this paper will discuss, we actually know little
about the effect of computer supported
communication on interpersonal interaction, despite
40 years of academic research on the
subject.
|
Rob Kolstad
Real World Sendmail: a Case Study
If you're interested in performance
of Unix boxes or, particularly, how to move more
bits over a network link, this talk is for you. It
includes a case study of tuning/optimising sendmail
in order to host the internet-access mailing list,
which currently transmits over half a million
messages per day. An off-the-shelf PC can now drive
a T-3 line flat out with over 100,000 email
deliveries per hour
|
Donald Neal
The Hypertext Transfer Protocol Meets Real
Life
HTTP is now used to move most of
the traffic on the Internet, a job for which it was
not designed. This paper outlines the relationship
between HTTP and TCP, and describes improvements
now in use and improvements proposed to HTTP to
allow the World Wide Web to deliver material more
quickly
|
Edwin Lim and John Paynter
Design Considerations For Web Site
Navigation
This paper addresses the major
design issues relating to web site navigation on
the World Wide Web, including the breadth and depth
of web links, the implementation of frames, the
page length of web documents and general
navigational concepts and design principles. A
framework for web navigation is proposed.
|
Julie Jester and Stephanie Nicholls
Scripts to Manage Change
Managing the promotion of
change from the development environment into
production is critical in a large organisation -
but evaluating the numerous change management
packages now available takes time. This paper
discusses the design concepts and techniques used
in an interim solution developed using shell
scripts.
|
Anne
Buzbee, Sun, USA
Virtual Product Design over the Internet |
PLENARY
The Internet and Healthcare
Anne Buzbee
|
Friday 22
May 1998: INTERNET DAY
Changes from printed programme
marked in red. |
KEYNOTE:
The Future of the Internet
Rob Kolstad, BSDI, USA
The future of Internet is
very difficult to predict because so many
different factors can push the Internet towards
success or failure. Hype aside, this talk
discusses the financial and economic factors,
security issues, political factors, cultural
issues and wildcards that might push the Internet
toward fabulous success or cataclysmic failure.
It also includes discussions of technical
wildcards, evolution of the Internet user
community, and - if time permits - a summary of
the bad things that can happen if the Internet
starts to go `the wrong way'
|
Mainly
Management |
User
Experiences |
Technically
Tilted |
John Paynter
An Analysis of Web-based Information Systems
In this paper, a case
study approach is used to investigate how various
WWW-based information systems are developed and the
reasons why particular strategies and software
development methodologies are used in diverse
organisations - and to high-light deficiencies in
the development strategies used.
|
Evan Lyon
User Security: A pragmatic
Approach
This paper examines the use of two
custom programs, source code available, and
standard Unix tools to provide improved security
for heterogeneous Unix sites - e.g. improved
tracking of use of privileged accounts, easy
administration and user-machine access restrictions
- all with minimal impact on appropriate use of the
systems. ** TBA, SunSoft, Aus Cryptography for Java
This paper looks at issues of incorporating
cryptography into Java programs. An API is proposed
that provides an abstraction of various
cryptography functions to facilitate a delay in the
choice of cryptographic algorithm until run-time.
The Java Cryptography Extensions will also be
examined.
|
David Purdue, Sunsoft Aus
Java and Cryptography: Architecture and Practical
Design Issues
This paper looks at issues of
incorporating cryptography into Java programs. An
API is proposed that provides an abstraction of
various cryptography functions to facilitate a
delay in the choice of cryptographic algorithm
until run-time. The Java Cryptography Extensions
will also be examined.
|
Jim Higgins
Will Governance kill the Internet?
The current moves by the US
Government in trying to bring some order to the
Internet may strike at its very roots. How will
these moves impact on the international Internet
community and how might we achieve a system of
governance which will allow the Net to continue to
expand?
|
Dean Pemberton
SSH: Making Secure Remote Access to Network
Resources Affordable
This paper investigates the various
challenges of remote network access and examines
how SSH can be used to provide some solutions.
|
Greg Clarke
DCE As An Authentication Service
This presentation will cover the
basics of both authentication and DCE, how DCE is
put together, the concepts behind DCE security, and
the benefits of using DCE as an authentication
service. The implementation process will cover the
cell design, population, and how DCE integrates
with authentication methods currently in use.
|
Mark Harris
A Beginner's Guide to Electronic Commerce
Encryption and digital currency are
the two most potent weapons aimed at national
governments at this time. They offer a chance for
freedom for the wired individual that is anathema
to central governments. Pornography and fraud are
dragged out regularly to drum up support for
unworkable legislative attempt to regulate the
irregular. The Internet is inherently resistant to
such attempts, but what effect will they have in
themselves?
|
Bill Parkin
Living With LINUX
This presentation offers a personal
view of an environment for home use, made from
LINUX, the GNU suite of utilities, and other
free-to-use-and-distribute software. Several tools
and applications are introduced and their context
described, to show what can be done.
|
John Miller-Williams, Robert
Biddle, Ewan Tempero
Rapid ImplementationOf A Program Visualisation
System
This paper describes how a
successful system for visualisation of the
execution of C++ programs on a Unix system was
produced in a fraction of the time that would
otherwise have been necessary. While program
visualisation is a relatively specialised
application, all this technology would be similarly
useful for many other applications.
|
Roger Bradshaw
E-Commerce And Certification Authorities In NZ -
Public Or Private?
This paper will address worldwide
issues in electronic commerce, noting developments
in the U.S. and investigating the relationship
between e-commerce and certification authorities in
New Zealand.
|
John Terpstra, AquaSoft, Aus
Mission-Critical Experiences With
Linux
Just how acceptable is RedHat Linux
as a mission-critical business platform? This paper
reviews the key packages available for Linux,
outlining their strengths and weaknesses. Could be
controversial! Some case studies may show what the
"Company of Angels" turns into (hee,hee, hee!).
|
Horst Truestedt, IBM, USA
Fibre Channel Arbitrated Loop Standard and
Architecture
This paper will describe the Fibre
Channel Arbitrated Loop Standard, and provide some
details on architecture issues
|
PLENARY
NT 5.0
Guy Haycock, Microsoft NZ
|
PLENARY
Horst Truestedt, IBM, USA
Fibre Channel - The Background, Today's Reality
and the Future
|
Saturday 23 May 2019
Changes from printed
programme marked in red. |
Mainly
Management |
User
Experiences |
Vendor
Sessions |
Bruce Miller
Threats and Opportunities for IT in Multiple
Mergers
In the wave after wave of
mergers, takeovers, spin-offs and buyouts in New
Zealand, IT groups have frequently been left with
the unenviable task of knitting together the
networks, servers, databases, desktops and
applications. This presentation discusses the
actual problems addressed by several IT groups in a
variety of industries.
|
Chris Goodyer
Heal Thyself
Crown Health Enterprises (CHEs)
were set up in NZ in 1993. This paper looks at
progress made to date by a typical CHE, the
strategic imperatives, the emergence of internet
technologies that make realisation both achievable
and affordable, and blueprints for thefuture.
|
TBA |
Malcolm Stayner
PM++ - The Art of Open Systems Project
Managment
This paper looks at the some of the
special challenges that face the open systems
project manager and proposes some strategies for
dealingwith them.
|
Simon Henley
A Case Study in Large-Scale 3-tier Client-Server
deployment
This paper introduces the audience
to the concept of middleware, and in particular
outlines the role of distributed Transaction
Processing (TP) Monitor middleware solutions in
building 3-tier client/server applications. It
describes in some detail two recent international
projects that have deployed OLTP middleware
solutions in large-scale 3-tier client/server
applications.
|
TBA |
PLENARY
Rolf Jester
Nostradamus Predicts: IT in 1999-2003
Will Gates still dominate, or
will he be out-Gated? Will NT sweep all before
it? Will Unix die? Will mainframes finally be
buried? Will Java give us the stimulant we need,
or will it turn out to be just a storm in a
coffee cup? In this session, Rolf will look at
Australian and New Zealand user research, consult
with his fellow industry analysts and read the
tea-leaves to chart the future of IT.
|
KEYNOTE
President's Closing Address
|
|