I attended the third annual by-invitation-only Computational Cybersecurity in Compromised Environments (C3E) workshop, held in Keystone Colorado this year from 9/25-28. The workshop is sponsored by the National Security Agency (NSA) and the Office of the Director of National Intelligence (ODNI) who bring together experts in cyber-security and other areas to discuss current challenges and formulate clever countermeasures to cyber-crime and, increasingly, covert cyber-warfare by nation-states. This year's topics were "Big Data and Intersecting Anomalies" and "Emergence."
Well, the 2010-2011 academic year has come and gone. With Rutgers Day we have tried to lure the best, brightest and most motivated into the ECE family. And in the usual flurry of activity -- finishing up coursework and presenting an impressive array of technical projects, not sleeping for days -- our babies of just a few years ago have graduated to embark on the first leg of their adult journeys. Seems like business as usual, right?
Well, not quite, at least from the perspective of this old prof.