<?xml version="1.0"?>
<News hasArchived="false" page="62" pageCount="221" pageSize="10" timestamp="Mon, 11 May 2026 01:23:39 -0400" url="https://dev.my.umbc.edu/groups/ieee/posts.xml?mode=pawpularity&amp;page=62">
  <NewsItem contentIssues="true" id="73852" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73852">
  <Title>talk: Nonnegative Binary Matrix Factorization on a D-Wave Quantum Annealer, 1:30 2/15</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/d-wave-2000q.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/d-wave-2000q.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h3>CHMPR Distinguished Lecture Series</h3>
    <h1>
    <strong>Nonnegative Binary Matrix Factorization</strong><br><strong>with a D-Wave Quantum Annealer</strong>
    </h1>
    <h2>
    <strong>Dr. Daniel O’Malley</strong><br><strong> Los Alamos National Laboratory</strong>
    </h2>
    <h3><strong>1:30 15 February 2018, ITE325, UMBC</strong></h3>
    <p> </p>
    <p>D-Wave <a href="https://en.wikipedia.org/wiki/Quantum_annealing" rel="nofollow external" class="bo">quantum annealers</a> represent a novel computational architecture and have attracted significant interest. Much of this interest has focused on the quantum behavior of D-Wave machines, and there have been few practical algorithms that use the D-Wave. Machine learning has been identified as an area where quantum annealing may be useful. Here, we show that the D-Wave 2X can be effectively used as part of an unsupervised machine learning method. This method takes a matrix as input and produces two low-rank matrices as output — one containing latent features in the data and another matrix describing how the features can be combined to approximately reproduce the input matrix. Despite the limited number of bits in the D-Wave hardware, this method is capable of handling a large input matrix. The D-Wave only limits the rank of the two output matrices. We apply this method to learn the features from a set of facial images and compare the performance of the D-Wave to two classical tools. This method is able to learn facial features and accurately reproduce the set of facial images. The performance of the D-Wave is mixed. It outperforms the two classical codes in a benchmark when only a short amount of computational time is allowed (200-20,000 microseconds), but these results suggest heuristics that would likely outperform the D-Wave in this benchmark.</p>
    <p><a href="http://www.lanl.gov/expertise/profiles/view/daniel-o'malley" rel="nofollow external" class="bo">Daniel O’Malley</a> is a scientist in the Computational Earth Science group at Los Alamos National Laboratory (LANL). Prior to that, he held postdoctoral positions at LANL and in the Department of Earth, Atmospheric and Planetary Sciences at Purdue University. He studied at Purdue University, receiving a B.S. degree in computer science and mathematics (2004), an M.S. in mathematics (2006) and a Ph.D. in applied mathematics (2011). His research interests include computational science (with an emphasis on subsurface flow and transport), quantum computing, uncertainty quantification, and machine learning. He has won numerous awards including a Director’s Postdoctoral Fellowship from LANL (2014), the InterPore-Fraunhofer Award for Young Researchers from the International Society for Porous Media (2012), a Charles C. Chappelle Fellowship from Purdue University (2004), and the Meyer E. Jerison Memorial Award in Analysis from the Department of Mathematics at Purdue University (2004).</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/nonnegative-binary-matrix-factorization-d-wave-quantum-annealer-umbc/" rel="nofollow external" class="bo">talk: Nonnegative Binary Matrix Factorization on a D-Wave Quantum Annealer, 1:30 2/15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>    CHMPR Distinguished Lecture Series   Nonnegative Binary Matrix Factorization with a D-Wave Quantum Annealer   Dr. Daniel O’Malley  Los Alamos National Laboratory   1:30 15 February 2018,...</Summary>
  <Website>https://www.csee.umbc.edu/2018/02/nonnegative-binary-matrix-factorization-d-wave-quantum-annealer-umbc/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73852/guest@my.umbc.edu/c41f6eebdb50d1d4840cfdf3cbefb6e0/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>data-science</Tag>
  <Tag>machine-learning</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>1</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 12 Feb 2018 09:16:41 -0500</PostedAt>
  <EditAt>Mon, 12 Feb 2018 09:16:41 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="73839" important="true" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73839">
    <Title>First GBM and Resume Workshop</Title>
    <Tagline>Join ISSA, ISCOM, and the Career Center</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">Hello everyone, <div><br></div>
          <div>I hope everyone is having a great start to the semester. Our first General Body Meeting is this <strong>Monday 2/12 at 12 pm in ITE 227</strong>. </div>
          <div><br></div>
          <div>Come join ISSA and ISCOM to hear about events this semester and participate in a resume workshop with the Career Center before the Career Fair.</div>
          <div><br></div>
          <div>I hope to see you all there!</div>
          </div>
      ]]>
    </Body>
    <Summary>Hello everyone,     I hope everyone is having a great start to the semester. Our first General Body Meeting is this Monday 2/12 at 12 pm in ITE 227.      Come join ISSA and ISCOM to hear about...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73839/guest@my.umbc.edu/f6bd4dad5fc4515b9f84574c6adaaf80/api/pixel</TrackingUrl>
    <Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/issa</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="original">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
    <Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Sun, 11 Feb 2018 14:57:25 -0500</PostedAt>
    <EditAt>Sun, 11 Feb 2018 15:05:34 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="73777" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73777">
  <Title>UMBC&#8217;s Haibin Zhang shares tips to secure data in the cloud</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1><strong>UMBC’s Haibin Zhang shares tips to secure data in the cloud</strong></h1>
    <p>As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and general users have voiced concerns about cloud security. In a new <a href="https://theconversation.com/us" rel="nofollow external" class="bo"><em>Conversation</em></a> article recently published by <em>Scientific American</em>, <a href="https://www.csee.umbc.edu/~hbzhang/" rel="nofollow external" class="bo"><strong>Haibin Zhang</strong>,</a> assistant professor of computer science and electrical engineering, explains precautions consumers can take to protect their files in the cloud.</p>
    <p>Zhang explains that data stored and secured using commercial cloud storage systems is encrypted, which means that without the key, the information looks like a series of meaningless characters. Encryption keys have the potential to be misused, if they end up in the wrong hands, which can compromise the security of files stored in a cloud.</p>
    <p>“Just like regular keys, if someone else has them, they might be stolen or misused without the data owner knowing,” says Zhang. “And some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>Zhang notes that some cloud services allow customers to maintain their encryption key themselves, which give the consumer the control in ensuring that their data remains safe. Other services keep the encryption keys internally and manage the security for their customers. He says that while each option has benefits, it is important to recognize that “some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>To keep data secure in the cloud, Zhang suggests using enhanced security features offered by cloud storage companies and taking additional precautions that are available to individual customers. He recommends that people use a cloud storage service that allows customers to encrypt their data before uploading it for storage, and to rely on services that have been “validated by independent security researchers.”</p>
    <p>Read “How secure is your data when it’s stored in the cloud?” in <a href="https://theconversation.com/how-secure-is-your-data-when-its-stored-in-the-cloud-90000" rel="nofollow external" class="bo"><em>The Conversation </em></a>for Zhang’s additional recommendations on securing data on the cloud. The piece also appeared in <a href="https://www.scientificamerican.com/article/how-secure-is-your-data-when-it-rsquo-s-stored-in-the-cloud/" rel="nofollow external" class="bo"><em>Scientific American</em></a>, and has so far been read nearly 20,000 times.</p>
    <p><em>Adapted from a UMBC <a href="https://news.umbc.edu/umbcs-haibin-zhang-shares-tips-to-secure-data-in-the-cloud/" rel="nofollow external" class="bo">News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>. Photo by Yuri Samoilov, <a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow external" class="bo">CC by 2.0</a>.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/" rel="nofollow external" class="bo">UMBC’s Haibin Zhang shares tips to secure data in the cloud</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>UMBC’s Haibin Zhang shares tips to secure data in the cloud   As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and...</Summary>
  <Website>https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73777/guest@my.umbc.edu/b7224817e9459dd61aed30fb58c1ed96/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>faculty-and-staff</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 07 Feb 2018 14:14:06 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="73736" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73736">
    <Title>SANS CyberTalent Fair</Title>
    <Tagline>Free Virtual Career Fair for Cybersecurity!</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <span>The Feb. 8th </span><span>SANS CyberTalent Fair is fast approaching, and you can register NOW for this virtual event that connects jobseekers and employers in cybersecurity. Just visit </span><a href="https://sans.us11.list-manage.com/track/click?u=00243ee7acff1d8552a18177c&amp;id=085a65a4b2&amp;e=99888d7933" rel="nofollow external" class="bo">https://app.brazenconnect.com/a/sans/e/Gz2Md</a><br><span> </span><br><span>Some of the great organizations already signed up include Bridgewater Associates, Stroz Friedberg, An Aon Company, NTT Security, ASRC Federal, TransUnion, the US Postal Service, and more! This online career fair will run from 11AM - 5PM </span><span>Eastern Time (accessible via computer, tablet, and mobile device) and will provide employers and jobseekers in cybersecurity with the opportunity to engage one another in a unique online setting via chat, job postings, etc.</span><br><span> </span><br><span>The SANS CyberTalent Fair is open to interested jobseekers at no cost. Please visit </span><a href="https://sans.us11.list-manage.com/track/click?u=00243ee7acff1d8552a18177c&amp;id=ee3bcd6552&amp;e=99888d7933" rel="nofollow external" class="bo">https://app.brazenconnect.com/a/sans/e/Gz2Md</a>
          </div>
      ]]>
    </Body>
    <Summary>The Feb. 8th SANS CyberTalent Fair is fast approaching, and you can register NOW for this virtual event that connects jobseekers and employers in cybersecurity. Just...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73736/guest@my.umbc.edu/7a750904da28eebc8f39fbd061329f0f/api/pixel</TrackingUrl>
    <Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/issa</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="original">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
    <Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 06 Feb 2018 22:31:40 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="73680" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73680">
    <Title>Free Screenings of the AlphaGo movie at UMBC, 7-9pm Tue 2/13 and 2-4pm Fri 2/16</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/alphago_screenings-3.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/alphago_screenings-3-1024x556.png" alt="" width="1024" height="556" style="max-width: 100%; height: auto;"></a></h1>
          <h1><strong>Free Screenings of the AlphaGo movie at UMBC</strong></h1>
          <p>UMBC will hold two free, public screenings of the award-winning documentary film <a href="https://www.alphagomovie.com/" rel="nofollow external" class="bo">AlphaGo</a>, one 7:00-9:00pm Tuesday evening, February 13 and another 2:00-4:00pm Friday, February 16. Both will be held in lecture hall 5 (EMGR 027) in the UMBC Engineering Building (maps: <a href="http://about.umbc.edu/files/2017/09/2017-campus-map.pdf" rel="nofollow external" class="bo">campus</a>, <a href="https://www.google.com/maps/@39.2543099,-76.7142417,17.86z" rel="nofollow external" class="bo">google)</a>.  Each screening will be followed by comments and discussion by several faculty members.</p>
          <p>AlphaGo is the first computer program to defeat a Go world champion, and arguably the strongest Go player in history. It was developed by <a href="https://deepmind.com/" rel="nofollow external" class="bo">DeepMind</a>, a London-based company that specializes in AI and machine learning that was acquired by Google in 2014.</p>
          <blockquote><p>“On March 9, 2016, the worlds of Go and artificial intelligence collided in South Korea for an extraordinary best-of-five-game competition, coined The DeepMind Challenge Match. Hundreds of millions of people around the world watched as a legendary Go master took on an unproven AI challenger for the first time in history…Directed by Greg Kohs with an original score by Academy Award nominee, Hauschka, AlphaGo chronicles a journey from the halls of Oxford, through the backstreets of Bordeaux, past the coding terminals of Google DeepMind in London, and ultimately, to the seven-day tournament in Seoul. As the drama unfolds, more questions emerge: What can artificial intelligence reveal about a 3000-year-old game? What can it teach us about humanity?”</p></blockquote>
          <p><a href="https://en.wikipedia.org/wiki/Go_(game)" rel="nofollow external" class="bo">Go</a> has been considered to be one of the most challenging games for AI systems to master because of its enormous search space and the difficulty of evaluating board positions and moves. AlphaGo’s success is especially significant in that it is an example of the powerful new <a href="https://en.wikipedia.org/wiki/Deep_learning" rel="nofollow external" class="bo">deep learning</a> approaches based on neural networks.</p>
          <p>Please join us at one  of the screenings this exciting film and take part in the discussions that follow.</p>
          <p>The post <a href="https://www.csee.umbc.edu/2018/02/alphago-file-screening-umbc-deep-learning-go-free-public/" rel="nofollow external" class="bo">Free Screenings of the AlphaGo movie at UMBC, 7-9pm Tue 2/13 and 2-4pm Fri 2/16</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
          </div>
      ]]>
    </Body>
    <Summary>Free Screenings of the AlphaGo movie at UMBC   UMBC will hold two free, public screenings of the award-winning documentary film AlphaGo, one 7:00-9:00pm Tuesday evening, February 13 and another...</Summary>
    <Website>https://www.csee.umbc.edu/2018/02/alphago-file-screening-umbc-deep-learning-go-free-public/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73680/guest@my.umbc.edu/feaffb712a8ec0e6c05480485edc67c9/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>events</Tag>
    <Tag>news</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 05 Feb 2018 13:42:06 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="73666" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73666">
  <Title>talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity-1024x536.jpg" alt="cybersecurity" style="max-width: 100%; height: auto;"></a></p>
    <p><em>The UMBC Cyber Defense Lab presents</em></p>
    <h1><strong>Results from the January 2018 SFS Research Study at UMBC</strong></h1>
    <h3>
    <strong>Enis Golaszewski<br>
    Department of Information Systems</strong><br><strong>University of Maryland, Baltimore County</strong>
    </h3>
    <h4><strong>12:00–1:00pm, Friday, 9 February 2018, ITE 228 (or nearby)</strong></h4>
    <p>January 22-26, 2018, UMBC SFS scholars worked collaboratively to analyze the security of a targeted aspect of the UMBC computer system.  The focus of this year’s study was the WebAdmin module that enables users to perform various functions on their accounts, including changing the password.  Students identified vulnerabilities involving failure to sanitize user input properly and suggested mitigations.  Participants comprised BS, MS, MPS, and PhD students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College and Prince George’s Community College to complete their four-year degrees at UMBC. We hope that other universities can benefit from our motivational and educational strategy of cooperating with the university’s IT staff to engage students in active project-based learning centering on focused questions about the university computer system.</p>
    <p><em>This project was supported in part by the National Science Foundation under SFS grant 1241576.</em></p>
    <p><a href="https://www.linkedin.com/in/ennis-golaszewski-88742179/" rel="nofollow external" class="bo"><strong>Enis Golaszewski</strong></a> (*protected email*) is a PhD student and SFS scholar in computer science working with Dr. Sherman on blockchain, protocol analysis, and the security of software-defined networks.</p>
    <p><strong>Host:</strong> Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/" rel="nofollow external" class="bo">talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents   Results from the January 2018 SFS Research Study at UMBC   Enis Golaszewski  Department of Information Systems University of Maryland, Baltimore County...</Summary>
  <Website>https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73666/guest@my.umbc.edu/cd5d03b0a23642f36aaa3b109d08f568/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>students</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 04 Feb 2018 21:08:32 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="73667" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73667">
  <Title>talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" alt="hardware cybersecurity" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Towards Hardware Cybersecurity</strong></h1>
    <h3><strong><a href="https://ece.gmu.edu/~hhomayou/goal.html" rel="nofollow external" class="bo">Professor Houman Homayoun</a><br>
    George Mason University<br></strong></h3>
    <h4><strong><span>11:00am-12:00pm Tuesday, 20 Febuary 2018</span>, ITE 325, UMBC</strong></h4>
    <p>Electronic system security, trust and reliability has become an increasingly critical area of concern for modern society. Secure hardware systems, platforms, as well as supply chains are critical to industry and government sectors such as national defense, healthcare, transportation, and finance.</p>
    <p>Traditionally, authenticity and integrity of data has been protected with various security protocol at the software level with the underlying hardware assumed to be secure, and reliable. This assumption however is no longer true with an increasing number of attacks reported on the hardware. Counterfeiting electronic components, inserting hardware trojans, and cloning integrated circuits are just few out of many malicious byproducts of hardware vulnerabilities, which need to be urgently addressed.</p>
    <p>In the first part of this talk I will address the security and vulnerability challenges in the horizontal integrated hardware development process. I will then present the concept of hybrid spin-transfer torque CMOS look up table based design which is our latest effort on developing a cost-effective solution to prevent physical reverse engineering attacks.</p>
    <p>In the second part of my talk I will present how information at the hardware level can be used to address some of the major challenges of software security vulnerabilities monitoring and detection methods. I will first discuss these challenges and will then show how the use of data at the hardware architecture level in combination with an effective machine learning based predictor helps protecting systems against various classes of hardware vulnerability attacks.</p>
    <p>I will conclude the talk by emphasizing the importance of this emerging area and proposing a research agenda for the future.</p>
    <p><a href="https://ece.gmu.edu/~hhomayou" rel="nofollow external" class="bo">Dr. Houman Homayoun</a> is an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. He also holds a courtesy appointment with the Department of Computer Science as well as Information Science and Technology Department. He is the director of GMU’s Accelerated, Secure, and Energy-Efficient Computing Laboratory (ASEEC).  Prior to joining GMU, Houman spent two years at the University of California, San Diego, as NSF Computing Innovation (CI) Fellow awarded by the CRA-CCC. Houman graduated in 2010 from University of California, Irvine with a Ph.D. in Computer Science. He was a recipient of the four-year University of California, Irvine Computer Science Department chair fellowship. Houman received the MS degree in computer engineering in 2005 from University of Victoria and BS degree in electrical engineering in 2003 from Sharif University of Technology. Houman conducts research in hardware security and trust, big data computing, and heterogeneous computing, where he has published more than 80 technical papers in the prestigious conferences and journals on the subject. Since 2012 he leads ten research projects, a total of $7.2 million in funding, supported by DARPA, AFRL, NSF, NIST, and GM on the topics of hardware security and trust, big data computing, heterogeneous architectures, and biomedical computing. Houman received the 2016 GLSVLSI conference best paper award for developing a manycore accelerator for wearable biomedical computing. Since 2017 he has been serving as an Associate Editor of IEEE Transactions on VLSI. He is currently serving as technical program co-chair of 2018 GLSVLSI conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/" rel="nofollow external" class="bo">talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>Towards Hardware Cybersecurity   Professor Houman Homayoun  George Mason University    11:00am-12:00pm Tuesday, 20 Febuary 2018, ITE 325, UMBC   Electronic system security, trust and reliability...</Summary>
  <Website>https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73667/guest@my.umbc.edu/3d18c5bb71e9949bd3b97011a7f48228/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>data-science</Tag>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 04 Feb 2018 19:08:51 -0500</PostedAt>
  <EditAt>Sat, 17 Feb 2018 19:08:51 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="73661" important="true" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73661">
    <Title>Come See Us at Involvement Fest!</Title>
    <Body>
      <![CDATA[
          <div class="html-content">Happy Sunday Everyone!<div><br></div>
          <div>Hope you had a great first week of classes. ISSA will be at Involvement Fest from 12 - 2 pm. Come say hi to our officers and find out about some of the events we have planned this semester!</div>
          <div><br></div>
          <div>For our first event, we will be cohosting a Resume Workshop with ISCOM and the Career Center on Feb. 12th during free hour!</div>
          <div><br></div>
          <div>Hope to see you all there!</div>
          </div>
      ]]>
    </Body>
    <Summary>Happy Sunday Everyone!    Hope you had a great first week of classes. ISSA will be at Involvement Fest from 12 - 2 pm. Come say hi to our officers and find out about some of the events we have...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73661/guest@my.umbc.edu/4939f5067b7c90ee15db59e109356870/api/pixel</TrackingUrl>
    <Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/issa</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="original">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
    <Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 04 Feb 2018 16:28:09 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="73004" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/73004">
  <Title>Global Game Jam, UMBC, 26-28 January 2018</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/01/ggj18_umbc.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/01/ggj18_umbc.jpg" alt="" width="1000" height="523" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Global Game Jam at UMBC</strong></h1>
    <p>For the 10th(!) year in a row, UMBC is the Baltimore host site for the <a href="http://www.globalgamejam.org" rel="nofollow external" class="bo">Global Game Jam</a>!</p>
    <p><em>Where</em>: Engineering (ENG) building on the <a href="http://www.umbc.edu" rel="nofollow external" class="bo">UMBC</a> campus<br><em>When</em>: 5 PM January 26 – 5 PM January 28, 2018<br><em>Cost</em>: Free, but advance registration is required (register at <a href="http://globalgamejam.org/2015/jam-sites/umbc" rel="nofollow external" class="bo">globalgamejam.org</a>)</p>
    <h2>What is a Game Jam?</h2>
    <p>In a game jam, participants come together to make a video game. Each participant joins a small team at the jam, and over a couple of day period creates a new, unique and creative video game according to the rules of the jam.</p>
    <p>Game Jams are a great way to meet other developers, beef up your resume, or just learn what it takes to make a game. Teams need designers who can come up with a creative game idea according to the jam constraints, artists, programmers and testers, so there is something to do for participants at all levels of experience.</p>
    <h2>So what is the Global Game Jam?</h2>
    <p>The <a href="http://www.globalgamejam.org" rel="nofollow external" class="bo">Global Game Jam</a> takes place in the same 48 hours all over the world! The first year there were 53 host sites in the US, Canada, Brazil, Costa Rica, Venezuela, Belgium, Denmark, England, France, Germany, Ireland, Israel, Lithuania, The Netherlands, Norway, Scotland, Spain, Turkey, Wales, Japan, Australia, New Zealand, and South Africa. Last year had hundreds of host sites across the world.</p>
    <p>The Global Game Jam will start 5 PM local time Friday, January 26th and end 5 PM local time Sunday, January 28th, 2018. All participants in the Global Game Jam will be constrained by the same theme and set of rules. After the theme is announced, participants will have the chance to brainstorm game ideas and pitch them to other participants to form development teams. After a couple of mad days of game development, all the games are demoed and submitted to the global game jam site.</p>
    <p>Even if you don’t participate, you can track the action on twitter #ggj18 and #umbcggj, and try out the game submissions after the event is over.</p>
    <p>For the full list of sites, more Global Game Jam information, and information on the keynote speaker and other exciting developments, be sure to visit the main <a href="http://www.globalgamejam.org" rel="nofollow external" class="bo">Global Game Jam site</a>.</p>
    <h2>UMBC Site Information</h2>
    <p>The UMBC Global Game Jam site will close from 11 PM to 7 AM each Friday and Saturday night. Non-local participants should plan accordingly.</p>
    <p>We’ll have a mix of computers and development platforms:</p>
    <ul>
    <li>Windows</li>
    <li>Mac</li>
    <li>WiFi (with your own laptop)</li>
    </ul>
    <p>These have a mix of the following software (not all software on all platforms)</p>
    <ul>
    <li>Visual Studio</li>
    <li>Unity</li>
    <li>Unreal Engine</li>
    <li>Maya</li>
    <li>NVIDIA PhysX</li>
    <li>Adobe Creative Suite</li>
    </ul>
    <h2>What you should bring</h2>
    <p>Yourself. Your creativity.</p>
    <p>Don’t come with a pre-planned team. Teams will be formed on-site after the game pitches are made. Also, don’t bring pre-made content (art, code, sounds, etc.) that is not publically available. The idea is not to see how well you anticipate the constraints, it is to see what each team can create during the Jam!</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/01/global-game-jam-umbc-26-28-january-2018/" rel="nofollow external" class="bo">Global Game Jam, UMBC, 26-28 January 2018</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>Global Game Jam at UMBC   For the 10th(!) year in a row, UMBC is the Baltimore host site for the Global Game Jam!   Where: Engineering (ENG) building on the UMBC campus When: 5 PM January 26 – 5...</Summary>
  <Website>https://www.csee.umbc.edu/2018/01/global-game-jam-umbc-26-28-january-2018/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/73004/guest@my.umbc.edu/4199369af33729edb636d4a7ba686d70/api/pixel</TrackingUrl>
  <Tag>events</Tag>
  <Tag>game-track</Tag>
  <Tag>hackathon</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>3</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 02 Jan 2018 23:29:17 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="72956" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/72956">
    <Title>Professors Banerjee &amp; Robucci on developing wearable sensors for people with limited mobility</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2017/12/wearbles.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/12/wearbles.png" style="max-width: 100%; height: auto;"></a></p>
          <p>UMBC’s new <a href="https://research.umbc.edu/public-research-for-public-good/" rel="nofollow external" class="bo">Public Research for Public Good</a> site features videos that highlight faculty research that provides real impact on the communities they are working with. In <a href="https://youtu.be/wCaaYPAd6_8" rel="nofollow external" class="bo">one</a>, CSEE Professors <a href="https://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> and <a href="https://eclipse.umbc.edu/robucci/" rel="nofollow external" class="bo">Ryan Robucci</a> discuss their research on developing wearable sensors to help people with limited mobility, allowing them to more easily interact with things in their environment. The sensors are built out of conductive fabric that can be sewn into sheets or clothing. The uniqueness of their project stems from the the team assembled to carry it out, which includes faculty and students who design low-level hardware, implement interactive software systems, rehabilitation specialists and end users.</p>
          <p></p>
          <div class="embed-container"><iframe src="https://www.youtube.com/embed/wCaaYPAd6_8" frameborder="0" webkitallowfullscreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowfullscreen="allowFullScreen">[Video]</iframe></div>
          <p>The post <a href="https://www.csee.umbc.edu/2017/12/professors-banerjee-robucci-on-developing-wearable-sensors-for-people-with-limited-mobility/" rel="nofollow external" class="bo">Professors Banerjee &amp; Robucci on developing wearable sensors for people with limited mobility</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC’s new Public Research for Public Good site features videos that highlight faculty research that provides real impact on the communities they are working with. In one, CSEE Professors Nilanjan...</Summary>
    <Website>https://www.csee.umbc.edu/2017/12/professors-banerjee-robucci-on-developing-wearable-sensors-for-people-with-limited-mobility/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/72956/guest@my.umbc.edu/df2c2642e0da6f5c5aa064557edd36d4/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>7</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 21 Dec 2017 15:14:45 -0500</PostedAt>
    <EditAt>Thu, 21 Dec 2017 15:14:45 -0500</EditAt>
  </NewsItem>
</News>
