Join Bridge Winners

Bridge Winners Profile for Richard Willey

Richard Willey
Richard Willey
  • 3
    Following
  • 32
    Followers
  • 38
    Posts
  • 1
    Favorites

Basic Information

Member Since
Jan. 21, 2011
Last Seen
3 hours ago
Member Type
Bridge Player
about me

My academic background is as a mathematical economist, focusing on game theory and mechanism design. I have a Masters in Economics from Indiana University and dual Masters in Management and Engineering from MIT.

\n

For the last 20 years I have pretty much lived at the intersection of TCP/IP networking and mathematical modeling. I spent my first 10 years out of school working for various networking companies. For the last 10 years I have split my time between the MathWorks where I was the manager for MATLAB's statistics system and Akamai Technologies. I currently work with the Adversarial Resilience team at Akamai, focusing on event detection, capacity planning, and Transport Layer Security.

\n

I don't have many real achievements in the world of bridge, though I am fairly well know on BBO (and earlier on OKB). Bridgewise, I am probably most proud of my MOSCITO notes (which I really need to finish one of these days)

Country
United States of America

Bridge Information

Favorite Bridge Memory
Making 2HX vulnerable in a 3-3 fit after psyching during a "Montreal Relay" sequence and getting an aggressive raise from partner.
Favorite Conventions
MOSCITO
BBO Username
Hrothgar
ACBL Ranking
Life Master
Sorry, this user has no cards yet.
The Next Step
http://lmgtfy.com/?q=threat+model+adversary+powers Please note: You are going to get references to a set of analytic techniques that cyber security professionals use to assess how secure they believe a system to be. It is still necessary to spend time and effort to apply these methods ...
The Next Step
And, correspondingly, our ability to detect the signals and the devices increases the further we separate the players. Here's another, though potentially more controversial, claim: If we separate players into different rooms, than communications will most likely be written. (Players will type out information for the opponents). In turn ...
The Next Step
Here's the thing Ray, that's not my "turn of phrase". Its at well establish up principle in security, most notably with respect to cipher design, and anyone with a modicum of experience in the area would recognize it immediately.
The Next Step
Because good security does not depend on obscurity...
The Next Step
> I still do not understand why playing on electronic devices > seems to dictate also playing in different rooms for some. The inverse square law
The Next Step
@Gene, From what I can tell, the top level of the game is actually dominated by the clients, not the players. At some point in time, the clients are going to get sick of getting cheated and will take some kind of action.
The ACBL: a Byword for Incompetence?
I wonder if ham and cheese would have been any worse....
The Next Step
Hi Josef, Does anything in the agreement that you reached with the WBF prevent you from making a public allocution? More specifically, documenting A. The methods that you were using to the cheat B. The set of events that you cheated in
The Next Step
> The various major NBOs know this, and have been given presentations on this. Out of curiosity, who has been giving these presentations and are they available for review? Neither the ACBL nor the WBF have any real competencies in InfoSec or "security". As such, there's a real possibility that ...
The Next Step
> Prevention is moving towards an all electronic setting > with players in separate rooms. Wow... Pity no one figured this out back in the days of the "Race Cars". Think of how much ugliness we would have saved ourselves... > Detection is more complicated. From my perspective, the tricky issue around detection ...
.

Bottom Home Top