August 1999, Volume 24, Number 4
Table of Contents
IN THIS ISSUE . . .
LETTERS TO THE EDITOR
THE USENIX CROSSWORD PUZZLE
JUNE CROSSWORD PUZZLE SOLUTION
CONFERENCE REPORTS
Report on the Workshop on Embedded Systems
SAGE NEWS AND FEATURES
Wisdom of Words
by Tina Darmohray
Truth, Justice, and the Sysadmin Way
by Hal Miller
Sysadmin Tools Your Vendor Never Told You About
Revisited
by Mike Nemeth
The SAGE Report
by Gale Berkowitz
Call for How-To Authors and Reviewers
by Melissa Binde
How-To: Configure DNS
by Chris deLongpre
Webmaster's Toolbox: Apache Modules
by Neil Kohl
Managing Network Security with CfenginePart 1
by Mark Burgess
On Reliability: Security and Reliability
by John Sellens
Enough SNMP to Be DangerousPart 2
by Elizabeth Zwicky
FEATURES
Optimal Peripheral Access Using Pipe-Based Double-Buffering
by Diomidis Spinellis
The Tclsh Spot
by Clif Flynt
Source Code UNIX: What's Your Data Worth?
by Bob Gray
Software Mini-Review: Red Hat Linux 6.0
by Bob Gray
The Trouble with Biometrics
by Christopher Calabrese
Java Performance
by Glen McCluskey
Using Java: Input and Output Streams
by Prithvi Rao
Musings
by Rik Farrow
STANDARDS REPORTS
POSIX Update
by Nicholas M. Stoughton
POSIX.1h SRASS and POSIX.1m Checkpoint Restart
by Helmut Roth
Whither the X Window System?
by Finnbarr P. Murphy
BOOK REVIEWS
The Bookworm
by Peter H. Salus
Handbook of Programming Languages
Reviewed by Glenn Vanderburg
USENIX NEWS
Member Dues and 1998 Financial Statements
by Gale Berkowitz
20 Years Ago in USENIX
by Peter H. Salus
USENIX Annual Awards
Board Meeting Summary
by Ellie Young
In Memoriam: Mark Weiser
ANNOUNCEMENTS AND CALLS
2nd Conference on Domain-Specific Languages
2nd USENIX Symposium on Internet Technologies & Systems
2000 USENIX Annual Technical Conference
motd
by Rob Kolstad