Take your choice of six, full-day, highly-focused tutorials conducted by industry experts from around the world. Chock full of in-depth, practical information on current and emerging technologies, they compliment the INET 97 Conference and can be an important part of your professional development. The tutorials will give you a greater understanding of theories, practices, real-world applications, and critical issues. Whatever your level of expertise, there's a course that will help you shorten a learning curve. You'll leave with new ideas, options, and plans to help you succeed in your job.
This line-up of outstanding educational programs is intended for management, technical staff, network managers, and administrators. It all takes place June 23 and 24, so you can attend up to two separate tutorials before the INET conference. Select the ones that are right for you and sign up today.
To register for a tutorial and/or INET 97, complete the INET 97 Registration Form located on the ISOC Web-site: www.isoc.org/inet97/
Tutorial #1: | Design of Web Proxies and Caches |
Presenter: | Stewart (Stew) Forster Connect.com.au Senior Systems Programmer/Software Developer Victoria, Australia email: slf@connect.com.au |
Date: | Monday, 23 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Bilik Redang |
Description: This tutorial will focus on the 'care and feeding' of proxy web caches with a
strong focus on the publicly available Squid proxy cache software. The tutorial will be of a fairly technical content and is recommended for those will may be ACTIVELY involved in maintaining such software. Issues taught will be an introduction to caching, the squid cache software, it's features and functionality. Further issues will be rightsizing hardware for intended load, optimizing of parameters, problems that can arise, security, remote maintenance and statistics gathering & reporting, and finally future trends in caching. A case study of the caching implementing at Connect will also be presented.
Participants will be fully equipped with the ability to set up and successfully maintain a proxy web cache of their own and be prepared for the issues that they will face in doing so. Attendees should have some experience with general system management. There will be no hands-on training. The implications for web caching are substantial savings (of up to 60%) of external Web based bandwidth costs as well as substantial speedups of Web transfers providing large benefits for companies attached to the Internet today. Who Should Attend: Current and future proxy web cache maintainers who are looking for ways to save money on bandwidth costs through web caching technology. | |
Tutorial #2: | Distance Learning Implementation: What You Shouldn't Overlook |
Presenters: | David Lassner Director of Information Technology University of Hawaii email: david@hula.its.hawaii.edu
Hae Okimoto |
Date: | Monday, 23 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Hall 2-A |
Description: Distance learning offers tremendous opportunities to break down the barriers of place and time that have traditionally limited access to education. This tutorial is intended for management and staff who are planning or implementing distance learning projects. An overview of the key issues will be provided that must be addressed in a successful implementation, including planning, costs and benefits, quality, policy frameworks, instructor training, student support, assessment, and of course, the many technology options available today. At the end of the day, participants will be prepared to work within their own institutions to establish or enhance their own distance learning programs. | |
Tutorial #3: | Internet for Business |
Presenters: | Tony Freeth (Tutorial Leader) Internet Business Services Ltd. Glasgow, Scotland email: tony@ibs.co.uk
Gordon Howell (Tutorial Assistance) |
Date: | Monday, 23 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Hall 2-B |
Description: This one day workshop creates a methodology determining the business case for applying Internet technology to both internal (Intranet) and external (Internet) applications. The course depends heavily on real life case studies which are continually updated and refreshed.
Who Should Attend: CEOs and strategy policy makers, business development managers, IT managers planning Internet deployment, marketing and business process executives.
Course Objectives: Course Outcomes: Attendees will appreciate current and future business use of the Internet, be able to analyze the tangible and intangible benefits and costs of introducing Internet technology, and optionally, have started their own personal plan. Course Materials: Course notes, set of online references and published references, personal plan workbook, case study backgrounds, and glossary | |
Tutorial #4: | Internationalization of the Internet |
Presenters: | Francois Yergeau, Ph.D. Senior Technology Adviser Alis Technologies Inc. Montreal, Canada email: yergeau@alis.com
Martin J. Dürst, Dr. |
Date: | Monday, 23 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Hall 1-A |
Description: In this tutorial, the internationalization of the Internet, i.e. the enabling and use of multiple languages and scripts on the Internet, will be discussed. This includes the World Wide Web, e-mail, FTP, the Domain Name System, character sets, directories (LDAP), etc. Anyone should attend who is interested in setting up and operating international Internet sites, including technical personnel and managers who wish to know about the issues involved: how to deal with multiple or "exotic" languages, what standards are relevant, what software to install, how to configure it, how to design and manage a multilingual Web site, etc. Implementers dealing with internationalization issues will also benefit from this tutorial. | |
Tutorial #5: | Cryptography, Security, and Privacy for Networks and Distributed Systems |
Presenter: | Charlie E. Catlett Associate Director, Computing and Communications National Center for Supercomputing Applications Illinois, USA email: catlett@ncsa.uiuc.edu |
Date: | Tuesday, 24 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Hall 1-A |
Description: This one-day tutorial provides an overview of the basic elements of computer security and privacy, including the building blocks and protocols to construct secure and private services and systems. An overview of existing and emerging technologies and implementations of secure and private systems will be given. This will include both current practice and technologies (Java, Kerberos, PGP, etc.) and their application in the real world for secure computing as well as newer capabilities (digital cash, digital signatures) supporting commerce on the Internet.
Who Should Attend: Participants should be familiar with networked computing (the Internet, client/server applications, etc.) as well as basic mathematics and computer programming. This basic background information is essential to anyone involved in the Internet today, including technical staff as well as executives. Course Overview: Internet Background and Approaches to Security, Cryptography Basics, Cryptographic Algorithms, Cryptographic Protocols, Implementations and Example Systems, Critical Issues: Weak Links | |
Tutorial #6: | Intranet Planning |
Presenters: | Gordon Howell (Tutorial Leader) Director of Consulting Services Internet Business Services Ltd. Glasgow, Scotland email: gordon@ibs.co.uk
Tony Freeth (Tutorial Assistance) |
Date: | Tuesday, 24 June 1997 |
Time: | Full Day, 0900-1700 |
Room: | Hall 2-A |
Description: This tutorial will introduce the key issues faced by corporations seeking to implement new IT systems using Internet technologies.
Who Should Attend: IT managers, chief information officers, systems managers, networking managers, Internet/Intranet developers. Following the tutorial, attendees will be able to make a business case for use of Intranet in their organization, identify starting points and action plans for introducing Intranet, understand essentials of Intranet technologies and how they compare with proprietary approaches, identify key products and vendors for further product research.
Learning Outcomes: Prerequisites: System management/planning experience; basic Internet knowledge (what is URL, email, WWW, client/server architectures) |