Take your choice of six, full-day, highly-focused tutorials conducted by industry experts from around the world. Chock full of in-depth, practical information on current and emerging technologies, they compliment the INET 97 Conference and can be an important part of your professional development. The tutorials will give you a greater understanding of theories, practices, real-world applications, and critical issues. Whatever your level of expertise, there's a course that will help you shorten a learning curve. You'll leave with new ideas, options, and plans to help you succeed in your job.

This line-up of outstanding educational programs is intended for management, technical staff, network managers, and administrators. It all takes place June 23 and 24, so you can attend up to two separate tutorials before the INET conference. Select the ones that are right for you and sign up today.

To register for a tutorial and/or INET 97, complete the INET 97 Registration Form located on the ISOC Web-site: www.isoc.org/inet97/

Tutorial #1:Design of Web Proxies and Caches
Presenter:Stewart (Stew) Forster
Senior Systems Programmer/Software Developer
Victoria, Australia
email: slf@connect.com.au
Date:Monday, 23 June 1997
Time:Full Day, 0900-1700
Room:Bilik Redang
Description: This tutorial will focus on the 'care and feeding' of proxy web caches with a strong focus on the publicly available Squid proxy cache software. The tutorial will be of a fairly technical content and is recommended for those will may be ACTIVELY involved in maintaining such software. Issues taught will be an introduction to caching, the squid cache software, it's features and functionality. Further issues will be rightsizing hardware for intended load, optimizing of parameters, problems that can arise, security, remote maintenance and statistics gathering & reporting, and finally future trends in caching. A case study of the caching implementing at Connect will also be presented.

Participants will be fully equipped with the ability to set up and successfully maintain a proxy web cache of their own and be prepared for the issues that they will face in doing so. Attendees should have some experience with general system management. There will be no hands-on training. The implications for web caching are substantial savings (of up to 60%) of external Web based bandwidth costs as well as substantial speedups of Web transfers providing large benefits for companies attached to the Internet today.

Who Should Attend: Current and future proxy web cache maintainers who are looking for ways to save money on bandwidth costs through web caching technology.

Tutorial #2:Distance Learning Implementation: What You Shouldn't Overlook
Presenters:David Lassner
Director of Information Technology
University of Hawaii
email: david@hula.its.hawaii.edu

Hae Okimoto
Manager of Distance Learning and Instructional Technology
University of Hawaii
Hawaii, USA
email: hae@hawaii.edu

Date:Monday, 23 June 1997
Time:Full Day, 0900-1700
Room:Hall 2-A
Description: Distance learning offers tremendous opportunities to break down the barriers of place and time that have traditionally limited access to education. This tutorial is intended for management and staff who are planning or implementing distance learning projects. An overview of the key issues will be provided that must be addressed in a successful implementation, including planning, costs and benefits, quality, policy frameworks, instructor training, student support, assessment, and of course, the many technology options available today. At the end of the day, participants will be prepared to work within their own institutions to establish or enhance their own distance learning programs.

Tutorial #3:Internet for Business
Presenters:Tony Freeth (Tutorial Leader)
Internet Business Services Ltd.
Glasgow, Scotland
email: tony@ibs.co.uk

Gordon Howell (Tutorial Assistance)
Internet Business Services Ltd.
Glasgow, Scotland
email: gordon@ibs.co.uk

Date:Monday, 23 June 1997
Time:Full Day, 0900-1700
Room:Hall 2-B
Description: This one day workshop creates a methodology determining the business case for applying Internet technology to both internal (Intranet) and external (Internet) applications. The course depends heavily on real life case studies which are continually updated and refreshed.

Who Should Attend: CEOs and strategy policy makers, business development managers, IT managers planning Internet deployment, marketing and business process executives.

Course Objectives:
- Understand Internet technology from the business perspective
- Learn and adopt a methodology for modeling Internet applications
- Obtain reference case study examples to anchor the theory
- Undertake a personal audit and develop a personal plan (*limited use in tutorial format)
- Locate best personal opportunities and best priorities for Internet deployment and utilization

Course Outcomes: Attendees will appreciate current and future business use of the Internet, be able to analyze the tangible and intangible benefits and costs of introducing Internet technology, and optionally, have started their own personal plan.

Course Materials: Course notes, set of online references and published references, personal plan workbook, case study backgrounds, and glossary

Tutorial #4:Internationalization of the Internet
Presenters: Francois Yergeau, Ph.D.
Senior Technology Adviser
Alis Technologies Inc.
Montreal, Canada
email: yergeau@alis.com

Martin J. Dürst, Dr.
Senior Research Assistant
MultiMedia Laboratory
Department of Computer Science
University of Zurich
Zurich, Switzerland
email: mduerst@ifi.unizh.ch

Date:Monday, 23 June 1997
Time:Full Day, 0900-1700
Room:Hall 1-A
Description: In this tutorial, the internationalization of the Internet, i.e. the enabling and use of multiple languages and scripts on the Internet, will be discussed. This includes the World Wide Web, e-mail, FTP, the Domain Name System, character sets, directories (LDAP), etc. Anyone should attend who is interested in setting up and operating international Internet sites, including technical personnel and managers who wish to know about the issues involved: how to deal with multiple or "exotic" languages, what standards are relevant, what software to install, how to configure it, how to design and manage a multilingual Web site, etc. Implementers dealing with internationalization issues will also benefit from this tutorial.

Tutorial #5:Cryptography, Security, and Privacy for Networks and Distributed Systems
Presenter:Charlie E. Catlett
Associate Director, Computing and Communications
National Center for Supercomputing Applications
Illinois, USA
email: catlett@ncsa.uiuc.edu
Date:Tuesday, 24 June 1997
Time:Full Day, 0900-1700
Room:Hall 1-A
Description: This one-day tutorial provides an overview of the basic elements of computer security and privacy, including the building blocks and protocols to construct secure and private services and systems. An overview of existing and emerging technologies and implementations of secure and private systems will be given. This will include both current practice and technologies (Java, Kerberos, PGP, etc.) and their application in the real world for secure computing as well as newer capabilities (digital cash, digital signatures) supporting commerce on the Internet.

Who Should Attend: Participants should be familiar with networked computing (the Internet, client/server applications, etc.) as well as basic mathematics and computer programming. This basic background information is essential to anyone involved in the Internet today, including technical staff as well as executives.

Course Overview: Internet Background and Approaches to Security, Cryptography Basics, Cryptographic Algorithms, Cryptographic Protocols, Implementations and Example Systems, Critical Issues: Weak Links

Tutorial #6:Intranet Planning
Presenters:Gordon Howell (Tutorial Leader)
Director of Consulting Services
Internet Business Services Ltd.
Glasgow, Scotland
email: gordon@ibs.co.uk

Tony Freeth (Tutorial Assistance)
Internet Business Services Ltd.
Glasgow, Scotland
email: tony@ibs.co.uk

Date: Tuesday, 24 June 1997
Time:Full Day, 0900-1700
Room:Hall 2-A
Description: This tutorial will introduce the key issues faced by corporations seeking to implement new IT systems using Internet technologies.

Who Should Attend: IT managers, chief information officers, systems managers, networking managers, Internet/Intranet developers. Following the tutorial, attendees will be able to make a business case for use of Intranet in their organization, identify starting points and action plans for introducing Intranet, understand essentials of Intranet technologies and how they compare with proprietary approaches, identify key products and vendors for further product research.

Learning Outcomes:
- Business rationales for intranet and examples of best practice
- Intranet architectures and key technologies/relationship to Internet
- How to pinpoint cost-effective intranet applications
- Intranet development and roll-out strategies
- Intranet procurement - platforms, products and key vendors
- Key future trends and issues facing intranet planners

Prerequisites: System management/planning experience; basic Internet knowledge (what is URL, email, WWW, client/server architectures)

Main | Conference Program | Registration | Sponsoring INET 97 | Workshop for Developing Countries | African Networking Symposium | K-12 Workshop | Technical Tutorials | Hotels | Airlines | Tours | Malaysia | Media | Site Credits

Copyright ©1997 Internet Society. All Rights Reserved.
Last Modified 5-June-1997 by webmaster.