Skip to main content

Currently Skimming:

Appendix C: Speaker Biographies
Pages 43-48

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 43...
... She has an extensive background in systems and network administration with an emphasis on practical security and has worked to build and secure some of the world's largest infrastructure. She now focuses her time primarily on the defense of Google's computing infrastructure and working with industry to tackle some of the greatest security challenges as part of the Defending Digital Democracy project at the Belfer Center for Science and International Affairs at Harvard Kennedy School.
From page 44...
... He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault tolerant computing, transaction processing, computer security, WYSIWYG editors, and 44 Forum on Cyber Resilience
From page 45...
... At Constellation, he was the technical assistant to the vice chairman for security related matters and was involved in a variety of both physical and cybersecurity issues across the entire nuclear sector of the United States. In the realm of physical security, Roxey was involved in reviewing security system architectures for the next generation of nuclear power in America as a member of the various oversight committees.
From page 46...
... His responsibilities at the FBI included a term as acting chief technology officer, section chief responsible for the FBI's technical collection and analysis platforms, and as a section chief overseeing the FBI's Cyber Division components responsible for the technical analysis of computer and network intrusion activities. His Cyber Division oversight included areas of malicious code analysis, computer exploitation tool reverse-engineering, and technical analysis of computer intrusions.
From page 47...
... Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop (2016) Future Directions for NSF Advanced Computing Infrastructure to Support U.S.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.