<?xml version="1.0"?>
<News hasArchived="true" page="6053" pageCount="10614" pageSize="10" timestamp="Mon, 04 May 2026 17:40:09 -0400" url="https://dev.my.umbc.edu/posts.xml?mode=activity&amp;page=6053">
  <NewsItem contentIssues="false" id="60366" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60366">
    <Title>A doctoral candidate in the Washington Post</Title>
    <Body>
      <![CDATA[
          <div class="html-content">Justin Velez-Hagan, a doctoral candidate in Economic Policy , in the Washington Post. See <a href="https://www.washingtonpost.com/news/wonk/wp/2016/05/23/where-the-minimum-wage-might-fall-for-some-americans/" rel="nofollow external" class="bo">Article</a>.</div>
      ]]>
    </Body>
    <Summary>Justin Velez-Hagan, a doctoral candidate in Economic Policy , in the Washington Post. See Article.</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60366/guest@my.umbc.edu/e86a27075c237f274f6d42e4a9aa6896/api/pixel</TrackingUrl>
    <Group token="economics">The Department of Economics</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/economics</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/images/avatars/group/1/xsmall.png?1777560846</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/images/avatars/group/1/original.png?1777560846</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/images/avatars/group/1/xxlarge.png?1777560846</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/images/avatars/group/1/xlarge.png?1777560846</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/images/avatars/group/1/large.png?1777560846</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/images/avatars/group/1/medium.png?1777560846</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/images/avatars/group/1/small.png?1777560846</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/images/avatars/group/1/xsmall.png?1777560846</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/images/avatars/group/1/xxsmall.png?1777560846</AvatarUrl>
    <Sponsor>The Department of Economics</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 25 May 2016 10:02:02 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="60361" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60361">
  <Title>Ridge Global and OptioLabs Partner to Offer Effective</Title>
  <Tagline>Cybersecurity Products and Solutions</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"> <div><h1><strong>Ridge Global and OptioLabs Partner to Offer Effective Cybersecurity Products and Solutions</strong></h1><div><p><em>Tom Ridge, First U.S. Secretary of Homeland Security and Former Governor of Pennsylvania, Joins OptioLabs Board of Advisors</em></p></div></div> <div><div>April 27, 2016 08:00 AM Eastern Daylight Time</div><div><p>BALTIMORE--(<span><span><a href="http://www.businesswire.com/" rel="nofollow external" class="bo">BUSINESS WIRE</a></span></span>)--OptioLabs, a security insight solution provider for the mobile enterprise, and Ridge Global, a leader in helping organizations become cyber resilient, today announced a strategic partnership to bring innovative cybersecurity products and services to the market. The partnership offers a unique marriage of both organizations’ tremendous talent pools, positioning highly talented minds in mobile security and cyber risk management to provide a full spectrum of cybersecurity solutions for enterprises facing global cyber threats. In addition to the partnership, Governor Tom Ridge, Chairman and founder of Ridge Global, joined the OptioLabs Board of Advisors.</p><blockquote><p>“While there may not be a ‘silver bullet’ that can address all of today’s growing security threats, taking a comprehensive approach to assessing and responding to those threats is the next best thing”</p><a href="http://www.businesswire.com/news/home/20160427005445/en#" rel="nofollow external" class="bo">Tweet this</a></blockquote><p>Bringing together some of the industry’s leading risk and mobility security experts helps to ensure all security bases are covered for large and mid-size enterprises looking to reduce their risk and increase their security posture. Governor Ridge has assembled a team of globally recognized experts who offer clients strategic counsel on identifying, preparing for and mitigating cyber risk. Coupled with OptioLabs’ renowned mobile security experts, each with over 20 years of experience, this strategic alliance introduces a comprehensive approach to combating today’s global cyber threats.</p><p>"While there may not be a ‘silver bullet’ that can address all of today’s growing security threats, taking a comprehensive approach to assessing and responding to those threats is the next best thing,” said CEO of OptioLabs, Gregg Smith. “We take the protection of our clients’ information very seriously and have teamed up with Ridge Global to help us stay at the cutting-edge of innovation. The background of Ridge Global speaks for itself, and we look forward to incorporating their expertise with our mobile architecture to offer clients encompassing and effective security solutions."</p><p>The pressure of dealing with cyber attacks is a constant challenge, one that most enterprises, regardless of size, are not equipped to handle. By combining forces, Ridge Global and OptioLabs are able to offer an all-inclusive approach to security that addresses everything from securing mobile environments, conducting security testing on networks, applications and devices, cyber risk assessments, executive education, technical training for security personnel and cyber insurance. Organizations will now have access to high quality security solutions that provide protection from every angle. Further enhancing the significance of this partnership is the agile nature of both companies which will provide customers with rapid response in order to meet their needs.</p><p>Ridge Global is continually evaluating cybersecurity tool sets to address evolving threats and provide clients with access to the latest and best solutions. The company offers quick, comprehensive risk evaluation using The Ridge Methodology<span>TM</span> that is used to develop customized plans to meet each organization’s unique needs, to help ensure best-in-class protection, insurance, education and incident- response services.</p><p>“At a time when mobile devices have become ubiquitous, the team at OptioLabs has developed a mobile security architecture to keep your data safe,” said Gov. Ridge. “Where in the past we were solely concerned about protecting data inside the office, the reality is more and more data is being stored on our smart phones. I was immediately impressed with the people at OptioLabs and am delighted to initiate this new partnership that will provide our clients with even greater cyber resiliency.”</p><p>OptioLabs brings a new approach to data security compliance by offering a suite of services that tackles all the various security needs of an organization to increase its security posture. From protecting against malware attacks and securing mobile data, to eavesdropper prevention and demonstrating compliance, OptioLabs allows enterprises and OEMs alike to better protect data and privacy. Specifically, OptioLabs protects the mobile enterprise through the combination of its OptioServices and Security Insight Platform that enables context-sensitive threat response – protecting enterprise data across all platforms by intelligently correlating human behavior and digital threat patterns from multiple sources at machine speed. Through its work with OEMs, OptioLabs also ensures important industry standards for security products are met prior to market launch. For more information on OptioLabs’ OptioServices, OptioInsight, OptioCore and OptioAware, please visit: <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com%2Fproducts-services%2F&amp;esheet=51329218&amp;newsitemid=20160427005445&amp;lan=en-US&amp;anchor=http%3A%2F%2Fwww.optiolabs.com%2Fproducts-services%2F&amp;index=1&amp;md5=e0f06a82b3fb393cb12c940c5a1ace98" rel="nofollow external" class="bo">http://www.optiolabs.com/products-services/</a>.</p><p><strong>About Ridge Global</strong></p><p>Ridge Global was founded by Tom Ridge, the first U.S. Secretary of Homeland Security and 43rd Governor of Pennsylvania, to help organizations decrease security risks. He has assembled a team of globally recognized experts who offer clients strategic counsel on identifying, preparing for and mitigating cyber risk. Ridge Global offers the latest technology, is continually evaluating cyber security tool sets in order to make the latest technology available to clients and is recognized as an international thought-leader on cyber security. The company is headquartered in Washington, D.C. with offices in Pittsburgh, Atlanta, and Tel Aviv. To learn more, visit<a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.ridgeglobal.com&amp;esheet=51329218&amp;newsitemid=20160427005445&amp;lan=en-US&amp;anchor=www.ridgeglobal.com&amp;index=2&amp;md5=16ab6017738eccd209dd39752a9691e5" rel="nofollow external" class="bo">www.ridgeglobal.com</a>.</p><p><strong>About OptioLabs</strong></p><p>OptioLabs protects the mobile Enterprise with a Security Insight Platform that enables context-sensitive threat response at machine speed. OptioLabs develops innovative security solutions for leading mobile OEMs, Wireless Carriers, Enterprise and Government organizations. OptioLabs is headquartered in Baltimore Maryland and has an office in Nashville, Tennessee. More information can be found at <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com&amp;esheet=51329218&amp;newsitemid=20160427005445&amp;lan=en-US&amp;anchor=www.optiolabs.com&amp;index=3&amp;md5=fb24261e0e962eecafcca9d26aaa0c30" rel="nofollow external" class="bo">www.optiolabs.com</a>.</p><p><strong>About Allied Minds</strong></p><p>Allied Minds (LSE: ALM) is an innovative U.S. science and technology development and commercialization company. Operating since 2006, Allied Minds forms, funds, manages and builds products and businesses based on innovative technologies developed at leading U.S. universities and federal research institutions. Allied Minds serves as a diversified holding company that supports its businesses and product development with capital, central management and shared services. More information about the Boston-based company can be found at <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.alliedminds.com&amp;esheet=51329218&amp;newsitemid=20160427005445&amp;lan=en-US&amp;anchor=www.alliedminds.com&amp;index=4&amp;md5=380328766f151b2bacc44d374a57c788" rel="nofollow external" class="bo">www.alliedminds.com</a>.</p><p><em><strong>Allied Minds Forward-Looking Statement</strong></em></p><p><em>This press release contains statements that are or may be forward-looking statements, including statements that relate to the company’s future prospects, developments and strategies. The forward-looking statements are based on current expectations and are subject to known and unknown risks and uncertainties that could cause actual results, performance and achievements to differ materially from current expectations, including, but not limited to, those risks and uncertainties described in the risk factors included in the company’s regulatory filings. These forward-looking statements are based on assumptions regarding the present and future business strategies of the company and the environment in which it will operate in the future. Each forward-looking statement speaks only as at the date of this press release. Except as required by law, regulatory requirement, the Listing Rules and the Disclosure and Transparency Rules, neither the company nor any other party intends to update or revise these forward-looking statements, whether as a result of new information, future events or otherwise.</em></p></div><div><h2>Contacts</h2><p>SRA Communications<br>Steve Aaron, 717-554-8614<br><a href="mailto:Steve@SRAcommunications.com" rel="nofollow external" class="bo">Steve@SRAcommunications.com</a><br>or<br>LaunchTech Communications<br>Kate Davis, 410-698-5211<br><a href="mailto:Kate@GoLaunchTech.com" rel="nofollow external" class="bo">Kate@GoLaunchTech.com</a></p></div></div></div>
]]>
  </Body>
  <Summary>Ridge Global and OptioLabs Partner to Offer Effective Cybersecurity Products and Solutions   Tom Ridge, First U.S. Secretary of Homeland Security and Former Governor of Pennsylvania, Joins...</Summary>
  <Website>http://www.businesswire.com/news/home/20160427005445/en</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60361/guest@my.umbc.edu/e63f19432f384d05a4ff8813a0ce577b/api/pixel</TrackingUrl>
  <Group token="bwtech">bwtech@UMBC Research and Technology Park</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/bwtech</GroupUrl>
  <AvatarUrl>https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/original.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/large.png?1760034935</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/medium.png?1760034935</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/small.png?1760034935</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxsmall.png?1760034935</AvatarUrl>
  <Sponsor>bwtech@UMBC</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 17:12:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="60360" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60360">
  <Title>OptioLabs Wins 2016 Cybersecurity Excellence Award</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h1><strong>OptioLabs Wins 2016 Cybersecurity Excellence Award</strong></h1><div><strong><br></strong></div><div> <div><div><p><em>OptioCore Singled Out for Excellence in Embedded Security, OptioAware Named a Finalist in Mobile Security</em></p></div></div> <div><div>May 03, 2016 09:00 AM Eastern Daylight Time</div><div><p>BALTIMORE--(<span><span><a href="http://www.businesswire.com/" rel="nofollow external" class="bo">BUSINESS WIRE</a></span></span>)--OptioLabs, a Security Insight Platform for the mobile enterprise, today announced that the Cybersecurity Excellence Awards honored OptioCore as the winner in its <em>Embedded Security</em> category, and OptioAware, previously PrivateEye, was named a finalist in its <em>Mobile Security</em> category. The 2016 Cybersecurity Excellence Awards, which honor individuals and companies that demonstrate excellence, innovation and leadership in information security, were hotly contested with over 100 finalists. The awards are produced in cooperation with the Information Security Community on LinkedIn, tapping into the experience of over 304,000+ cybersecurity professionals to recognize the world’s best cybersecurity products, individuals and organizations.</p><blockquote><p>“Enterprises often demand more security for their devices than traditional security solutions can deliver”</p><a href="http://www.businesswire.com/news/home/20160503005201/en#" rel="nofollow external" class="bo">Tweet this</a></blockquote><p>“Enterprises often demand more security for their devices than traditional security solutions can deliver,” said Gregg Smith, CEO of OptioLabs. “OptioCore and OptioAware offer enterprises the protection they need whether for mobile devices or internal systems. We are thrilled to continue to receive industry recognition for our approach to combating the modern risk of data loss through mobile devices and insider threats. These two honors further validate the success we are having in protecting our customers from today’s ever-evolving threats and risk vectors.”</p><p><a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com%2Fproduct-overview%2Foptio-core-mobile-malware-security%2F&amp;esheet=51333026&amp;newsitemid=20160503005201&amp;lan=en-US&amp;anchor=OptioCore&amp;index=1&amp;md5=584171ea58b0e74fca2e7dc751e614d5" rel="nofollow external" class="bo">OptioCore</a> is a policy-driven, embedded software solution that enables mobile device OEMs to offer more secure Android devices that can intelligently adapt to changing environments and user behavior. Built directly into the mobile OS, OptioCore delivers meaningful security capabilities and benefits to mobile device OEMs and Enterprise customers.</p><p><a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com%2Fproduct-overview%2Foptioaware%2F&amp;esheet=51333026&amp;newsitemid=20160503005201&amp;lan=en-US&amp;anchor=OptioAware&amp;index=2&amp;md5=6d7b7c4c05a9b31a7be3af051e766dfc" rel="nofollow external" class="bo">OptioAware</a> is an Enterprise data security and compliance solution that protects data in use against insider threats by detecting suspicious behavior and stopping human threats at the point of use. Protecting the last “two feet” of space between your computer screen and your surroundings is what we believe to be the next level of security protection that is needed to protect sensitive information.</p><p>Acknowledged by the Cybersecurity Excellence Awards for its innovative approach to protecting against malware attacks and securing mobile data, OptioLabs’ technology allows organizations to protect their data and privacy easily and effectively. To learn more about OptioCore and OptioAware, please visit <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com%2Fproducts-services%2F&amp;esheet=51333026&amp;newsitemid=20160503005201&amp;lan=en-US&amp;anchor=www.optiolabs.com%2Fproducts-services%2F&amp;index=3&amp;md5=be289d1c565dd699a5b2b10ec37cecf8" rel="nofollow external" class="bo">www.optiolabs.com/products-services/</a>.</p><p><strong>About OptioLabs</strong></p><p>OptioLabs protects the mobile Enterprise with a Security Insight Platform that enables context-sensitive threat response at machine speed. OptioLabs develops innovative security solutions for leading mobile OEMs, Wireless Carriers, Enterprise and Government organizations. OptioLabs is headquartered in Baltimore, Maryland and has an office in Nashville, Tennessee. More information can be found at <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.optiolabs.com&amp;esheet=51333026&amp;newsitemid=20160503005201&amp;lan=en-US&amp;anchor=www.optiolabs.com&amp;index=4&amp;md5=dff4d3609cb71fc61b2173ba50119ea2" rel="nofollow external" class="bo">www.optiolabs.com</a>.</p><p><strong>About Allied Minds</strong></p><p>Allied Minds (LSE: ALM) is an innovative U.S. science and technology development and commercialization company. Operating since 2006, Allied Minds forms, funds, manages and builds products and businesses based on innovative technologies developed at leading U.S. universities and federal research institutions. Allied Minds serves as a diversified holding company that supports its businesses and product development with capital, central management and shared services. More information about the Boston-based company can be found at <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=http%3A%2F%2Fwww.alliedminds.com&amp;esheet=51333026&amp;newsitemid=20160503005201&amp;lan=en-US&amp;anchor=www.alliedminds.com&amp;index=5&amp;md5=5e65d7032cd68c118b76d7371c634126" rel="nofollow external" class="bo">www.alliedminds.com</a>.</p><p><em><strong>Allied Minds Forward-Looking Statement</strong></em></p><p><em>This press release contains statements that are or may be forward-looking statements, including statements that relate to the company’s future prospects, developments and strategies. The forward-looking statements are based on current expectations and are subject to known and unknown risks and uncertainties that could cause actual results, performance and achievements to differ materially from current expectations, including, but not limited to, those risks and uncertainties described in the risk factors included in the company’s regulatory filings. These forward-looking statements are based on assumptions regarding the present and future business strategies of the company and the environment in which it will operate in the future. Each forward-looking statement speaks only as at the date of this press release. Except as required by law, regulatory requirement, the Listing Rules and the Disclosure and Transparency Rules, neither the company nor any other party intends to update or revise these forward-looking statements, whether as a result of new information, future events or otherwise.</em></p></div><div><h2>Contacts</h2><p>LaunchTech Communications<br>Kate Davis, 410-698-5211<br><a href="mailto:kate@golaunchtech.com" rel="nofollow external" class="bo">kate@golaunchtech.com</a></p></div></div></div></div>
]]>
  </Body>
  <Summary>OptioLabs Wins 2016 Cybersecurity Excellence Award         OptioCore Singled Out for Excellence in Embedded Security, OptioAware Named a Finalist in Mobile Security      May 03, 2016 09:00 AM...</Summary>
  <Website>http://www.businesswire.com/news/home/20160503005201/en</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60360/guest@my.umbc.edu/9a200e7f7dfe677eb96e6d2cad0b8efa/api/pixel</TrackingUrl>
  <Group token="bwtech">bwtech@UMBC Research and Technology Park</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/bwtech</GroupUrl>
  <AvatarUrl>https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/original.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/large.png?1760034935</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/medium.png?1760034935</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/small.png?1760034935</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxsmall.png?1760034935</AvatarUrl>
  <Sponsor>bwtech@UMBC</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 17:11:25 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="60359" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60359">
  <Title>Grip Boost: Get a Grip</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><h4>Grip Boost: Get a Grip</h4><div>Engineering PhDs from UMDs Chemical Engineering Department teamed up with former Terps' and Ravens' Tight End Matt Furstenburg and Entrepreneur Businessman Harry Geller to tackle one of the biggest problems with football gloves - the rapid decline in tackiness/grip of the gloves.<div><br><div><div><div><div><div><div class="embed-container"><iframe src="http://www.youtube.com/embed/iVYEkVEWlvo?wmode=opaque" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div></div></div></div></div></div></div></div>
]]>
  </Body>
  <Summary>Grip Boost: Get a Grip  Engineering PhDs from UMDs Chemical Engineering Department teamed up with former Terps' and Ravens' Tight End Matt Furstenburg and Entrepreneur Businessman Harry Geller to...</Summary>
  <Website>http://www.umdrightnow.umd.edu/video/grip-boost-get-grip</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60359/guest@my.umbc.edu/f2efbccd711da1f65611c585faea7c71/api/pixel</TrackingUrl>
  <Group token="bwtech">bwtech@UMBC Research and Technology Park</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/bwtech</GroupUrl>
  <AvatarUrl>https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/original.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xlarge.png?1760034935</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/large.png?1760034935</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/medium.png?1760034935</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/small.png?1760034935</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xsmall.png?1760034935</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/410/afff9420ec03574fa84c6bb85b54a3e3/xxsmall.png?1760034935</AvatarUrl>
  <Sponsor>bwtech@UMBC</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 17:09:25 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="60358" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60358">
  <Title>Featured Course: Cultural Anthropology</Title>
  <Tagline>Learn what culture really is with ANTH 211!</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><span>We all know what culture is, but we have a hard time describing it. That is what Anthropology tries to do. Anthropologists want to know the </span><span>why</span><span> behind rituals, family social structures, food, and everything that is an expression of culture (which is basically </span><span>everything)</span><span>. So, while this is a seemly simple question, it is actually pretty hard to answer, but hopefully </span><a href="https://highpoint-prd.ps.umbc.edu/app/catalog/classsection/UMBC1/2166/1044" rel="nofollow external" class="bo"><span>ANTH 211: Cultural Anthropology</span></a> <span>will help.</span></p><p><span>In addition to the discussion about the definition of culture, students will evaluate cultural- ecological systems within the context of war, mental illness, and other topics. Luckily, this course is open in both Session 1 and Session 2. It also fulfills both the Culture and Social Science GEP, and is part of the <a href="http://www.umbc.edu/summer/csj" rel="nofollow external" class="bo"><span>Culture &amp; Social Justice</span></a> course offerings.</span></p><h3><a href="https://highpoint-prd.ps.umbc.edu/app/catalog/classsection/UMBC1/2166/1044" rel="nofollow external" class="bo">Register Now!</a></h3><p><a href="http://www.umbc.edu/summer/csj" rel="nofollow external" class="bo"><img src="http://gritgoing.umbc.edu/wp-content/uploads/2016/03/DPS2016-006_vF-color-1024x295.png" alt="Culture &amp; Social Justice" width="450" height="130" style="max-width: 100%; height: auto;"></a></p></div>
]]>
  </Body>
  <Summary>We all know what culture is, but we have a hard time describing it. That is what Anthropology tries to do. Anthropologists want to know the why behind rituals, family social structures, food, and...</Summary>
  <Website>https://highpoint-prd.ps.umbc.edu/app/catalog/classsection/UMBC1/2166/1044</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60358/guest@my.umbc.edu/93ed0159758217395f01b47262b4ac2d/api/pixel</TrackingUrl>
  <Tag>course</Tag>
  <Tag>featured</Tag>
  <Group token="summerwinter">Summer &amp;amp; Winter Sessions</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/summerwinter</GroupUrl>
  <AvatarUrl>https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/xsmall.png?1738583645</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/original.png?1738583645</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/xxlarge.png?1738583645</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/xlarge.png?1738583645</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/large.png?1738583645</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/medium.png?1738583645</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/small.png?1738583645</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/xsmall.png?1738583645</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/443/2c0a14f47c0bfaff93c1357e41161244/xxsmall.png?1738583645</AvatarUrl>
  <Sponsor>Summer Session 2016</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/xxlarge.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/xlarge.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/large.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/medium.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/small.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/xsmall.jpg?1464117979</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/358/6eb072014caf5a9f8540de61f7389f01/xxsmall.jpg?1464117979</ThumbnailUrl>
  <PawCount>15</PawCount>
  <CommentCount>1</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 15:29:12 -0400</PostedAt>
  <EditAt>Tue, 24 May 2016 15:29:33 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="60357" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60357">
  <Title>Rooms for rent</Title>
  <Tagline>Rooms available in a house.</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">My friend and I rent a house close to UMBC. Not a townhouse or an apartment, a stand-alone house.  We are losing roomates and are looking for people to move in from August 2016-August 2017. Rent is $360 a month. Bills and utilities fluctuate from $60 in summer to $100 in winter. So total cost of living is $420-$460 a month. That's roughly $5280 for the year which is much cheaper than on campus.  You get your own bedroom and there are two full bathrooms. We are guys and prefer to have guys move in. Email me for any questions<div><br></div><div><a href="mailto:Tev1@umbc.edu">Tev1@umbc.edu</a></div></div>
]]>
  </Body>
  <Summary>My friend and I rent a house close to UMBC. Not a townhouse or an apartment, a stand-alone house.  We are losing roomates and are looking for people to move in from August 2016-August 2017. Rent...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60357/guest@my.umbc.edu/3bb41a25db6fa6a1e41df7b98e57a430/api/pixel</TrackingUrl>
  <Group token="random">Random</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/random</GroupUrl>
  <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/xsmall.png?1434550835</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/original.png?1434550835</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/xxlarge.png?1434550835</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/xlarge.png?1434550835</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/large.png?1434550835</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/medium.png?1434550835</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/small.png?1434550835</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/xsmall.png?1434550835</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/083/3569ced5d21506feef9e1ce0cd9e0178/xxsmall.png?1434550835</AvatarUrl>
  <Sponsor>Random</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>1</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 15:15:36 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="60356" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60356">
    <Title>Managing Cloud Storage Obliviously</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><div><a href="http://twitter.com/share?url=http%3A%2F%2Febiquity.umbc.edu%2Fblogger%2F2016%2F05%2F24%2Fmanaging-cloud-storage-obliviously%2F&amp;text=Managing%20Cloud%20Storage%20Obliviously&amp;related=ebiquity&amp;lang=en&amp;count=vertical&amp;counturl=http%3A%2F%2Febiquity.umbc.edu%2Fblogger%2F2016%2F05%2F24%2Fmanaging-cloud-storage-obliviously%2F" rel="nofollow external" class="bo">Tweet</a></div><p><img src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2016/05/cloud_analytics.jpg" alt="" width="510" height="268" style="max-width: 100%; height: auto;"></p>
          <div>Vaishali Narkhede, Karuna Pande Joshi, Tim Finin, Seung Geol Choi, Adam Aviv and Daniel S. Roche, <a href="http://ebiquity.umbc.edu/paper/html/id/737/Managing-Cloud-Storage-Obliviously" rel="nofollow external" class="bo">Managing Cloud Storage Obliviously</a>, International Conference on Cloud Computing, IEEE Computer Society, June 2016.</div>
          <p>Consumers want to ensure that their enterprise data is stored securely and obliviously on the cloud, such that the data objects or their access patterns are not revealed to anyone, including the cloud provider, in the public cloud environment. We have created a detailed ontology describing the oblivious cloud storage models and role based access controls that should be in place to manage this risk. We have developed an algorithm to store cloud data using oblivious data structure defined in this paper. We have also implemented the ObliviCloudManager application that allows users to manage their cloud data by validating it before storing it in an oblivious data structure. Our application uses role-based access control model and collection based document management to store and retrieve data efficiently. Cloud consumers can use our system to define policies for storing data obliviously and manage storage on untrusted cloud platforms even if they are unfamiliar with the underlying technology and concepts of oblivious data structures.</p></div>
      ]]>
    </Body>
    <Summary>Tweet     Vaishali Narkhede, Karuna Pande Joshi, Tim Finin, Seung Geol Choi, Adam Aviv and Daniel S. Roche, Managing Cloud Storage Obliviously, International Conference on Cloud Computing, IEEE...</Summary>
    <Website>http://ebiquity.umbc.edu/blogger/2016/05/24/managing-cloud-storage-obliviously/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60356/guest@my.umbc.edu/608cbb5efc9a42a93575d114d75d616a/api/pixel</TrackingUrl>
    <Tag>cloud-computing</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>privacy</Tag>
    <Tag>security</Tag>
    <Tag>semantic-web</Tag>
    <Group token="ebiquity">Ebiquity Research Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
    <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
    <Sponsor>ebiquity research group</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 24 May 2016 14:29:55 -0400</PostedAt>
    <EditAt>Tue, 24 May 2016 14:29:55 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="121140" important="false" status="posted" url="https://dev.my.umbc.edu/posts/121140">
  <Title>What&#8217;s a &#8220;cyberbomb?&#8221; UMBC cybersecurity experts explain in Scientific American</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><img width="150" height="150" src="https://umbc.edu/wp-content/uploads/2016/05/Anupam-Joshi_2-e1464096794991-150x150.jpg" alt="" style="max-width: 100%; height: auto;"><p><span>U.S. Deputy Defense Secretary Robert Work recently spoke about cyberwarfare and U.S. efforts to fight online security threats, leaving analysts wondering about the nature of today’s battles in cyberspace. UMBC’s </span><strong>Anupam Joshi</strong><span> and </span><strong>Rick Forno</strong> <span> shed light on this world in a new </span><a href="http://www.scientificamerican.com/article/how-u-s-cyber-bombs-against-terrorists-really-work/" rel="nofollow external" class="bo"><em><span>Scientific American</span></em></a><span> article that explains how online tactics known as “cyberbombs” work to prevent potential attacks, or could potentially be directed at U.S. targets.</span></p>
    <p><span>Joshi is director of UMBC’s Center for Cybersecurity and professor and chair of the department of computer science and electrical engineering, and Forno serves as assistant director of the UMBC Center for Cybersecurity and director of UMBC’s graduate program in cybersecurity.</span></p>
    <p><span>Cyberattacks can disrupt essential components of infrastructure people use every day, from cell phone networks to electric network generators, Joshi and Forno explain. They point out that “a ‘cyberbomb’ is not a single weapon,” but rather a collection of computer hardware and software </span><span>that can be used to protect against cyber threats. </span><span>This work might involve a broad range of professionals, including technological experts, military strategists, researchers, policy analysts, and lawyers, and as technology changes so do cyber weapons and tactics. </span></p>
    <p><span>“We can analyze the underlying technologies and look at the global strategic considerations of those of those seeking to wage cyber warfare,” Joshi and Forno write. “That work allows us to offer ideas about cyber weapons and how they might be used.”</span></p>
    <p><span>Read the full article, “America is ‘dropping cyberbombs’</span><span>—</span><span>but how do they work?” originally published in </span><em><span><a href="https://theconversation.com/america-is-dropping-cyberbombs-but-how-do-they-work-58476" rel="nofollow external" class="bo">The Conversation</a>. </span></em><span>The original article was also mentioned in </span><em><span><a href="http://www.techrepublic.com/article/malware-goes-to-war-potential-tools-uses-and-targets-of-cyberweapons/" rel="nofollow external" class="bo">Tech Republic</a>.</span></em></p>
    <p><em>Images: Anupam Joshi presenting during <a href="https://umbc.edu/school-of-public-policy-hosts-forum-on-cybersecurity-concerns-in-local-governments/" rel="nofollow external" class="bo">cybersecurity forum</a> hosted by the School of Public Policy. Photo by Marlayna Demond ’11 for UMBC. </em></p></div>
]]>
  </Body>
  <Summary>U.S. Deputy Defense Secretary Robert Work recently spoke about cyberwarfare and U.S. efforts to fight online security threats, leaving analysts wondering about the nature of today’s battles in...</Summary>
  <Website>https://umbc.edu/stories/u-s-using-cyberbombs-to-protect-against-online-threats-umbc-cybersecurity-experts-explain/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/121140/guest@my.umbc.edu/bed633abac4289c94f81c6f7071e15d4/api/pixel</TrackingUrl>
  <Tag>coeit</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>science-and-technology</Tag>
  <Group token="umbc-news-magazine">UMBC News &amp;amp; Magazine</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/umbc-news-magazine</GroupUrl>
  <AvatarUrl>https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/original.png?1748556657</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxlarge.png?1748556657</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xlarge.png?1748556657</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/large.png?1748556657</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/medium.png?1748556657</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/small.png?1748556657</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxsmall.png?1748556657</AvatarUrl>
  <Sponsor>UMBC News &amp; Magazine</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 13:36:43 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="60354" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60354">
  <Title>We Hosted an Event About Masculinity and Sexual Assault&#160;and Nobody Came</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img src="https://womenscenteratumbc.files.wordpress.com/2015/08/daniel-profile-pic.jpg?w=102&amp;h=68" alt="Daniel Profile Pic" width="102" height="68" style="max-width: 100%; height: auto;"> <em>A blog post and reflection by staff member Daniel Willey</em></p>
    <h5>The following post contains mentions of rape and sexual assault. Hyperlinks marked with * indicate that the article contains detailed accounts of assault in some form.</h5>
    <p><span>This past April during Sexual Assault Awareness Month, the Women’s Center hosted an program called “What About the Men?” The event was held on during Monday free hour, and it was billed as “a multimedia discussion on masculinity, sexual assault, and <a href="http://www.slate.com/articles/double_x/doublex/2014/04/male_rape_in_america_a_new_study_reveals_that_men_are_sexually_assaulted.html" rel="nofollow external" class="bo">m</a></span><a href="http://www.slate.com/articles/double_x/doublex/2014/04/male_rape_in_america_a_new_study_reveals_that_men_are_sexually_assaulted.html" rel="nofollow external" class="bo">ale survivors</a>.<span>*”</span></p>
    <p><span>I wanted to talk about how societal ideas about masculinity (like sexual prowess, social dominance, financial stability, risk-taking, and the “Man Card”) create an environment that encourages — or is at least passively complicit in — sexual violence against women, and isolates and invalidates male survivors of sexual violence. </span></p>
    <p><span>And nobody came.</span></p>
    <p><span>Okay, not </span><em><span>nobody.</span></em> <span>Jess and Megan and Shira were there, and four community members stopped in to see what was happening. We actually had a really great discussion and I’m glad those people were there to have that important conversation. But I want to talk about the people that weren’t there.</span><strong> I want to talk about showing up and speaking out for male survivors. I want to talk about accountability, masculinity, and how sexual assault is everyone’s problem.</strong></p>
    <p><span>So, let’s go back a bit and talk about masculinity. </span></p>
    <p><a href="http://goodmenproject.com/featured-content/megasahd-escape-the-act-like-a-man-box/?utm_source=huffingtonpost.com&amp;utm_medium=referral&amp;utm_campaign=pubexchange_article" rel="nofollow external" class="bo">The Man Box</a><span> is an activity we do in <a href="http://womenscenter.umbc.edu/groups/rebuilding-manhood/" rel="nofollow external" class="bo">Rebuilding Manhood</a> to get everyone thinking about hegemonic masculinity. Hegemonic masculinity is basically society’s idea of what a man ‘should’ be and do. It’s an idea we all agree to and go along with, whether we agree with it or completely conform to it or not. Inside the Man Box, participants write words or phrases that fit within this dominant idea of masculinity, including: trucks, steak, beer, sports, outdoors, strong, confident, protector, power, leader, man up, boys don’t cry, don’t show emotion, wears the pants, provide for your family, sex with women, good at sex, and good at math and science.</span></p>
    <div><img src="https://womenscenteratumbc.files.wordpress.com/2016/05/img_9581-2.jpg?w=335&amp;h=251" alt="IMG_9581 (2)" width="335" height="251" style="max-width: 100%; height: auto;"><p>Mito and Dan go over the Man Box</p></div>
    <p><span>On the outside of the box are words and phrases used for men who step outside the limitations of the Man Box. When we do this activity, everyone is hesitant to write the words on the outside. Once a brave soul (or sometimes the facilitator) writes the first swear word, we see “bitch” “pussy” “gay” “fag” “pansy” “whipped” appear around the outside of the Man Box. </span><strong>The words outside the Man Box keep men trapped within the b</strong><strong>ox. They are the consequences of not living up to the expectations set forth by all of us. </strong></p>
    <p><span>I talk about the Man Box because when it comes to conversations about men’s violence against women, the most common response is, “</span><a href="http://time.com/79357/not-all-men-a-brief-history-of-every-dudes-favorite-argument/" rel="nofollow external" class="bo">Not all men are like that.</a><span>” To quote </span><a href="http://bust.com/feminism/8564-inside-the-man-box-tony-porter-on-masculinity-and-violence.html" rel="nofollow external" class="bo">Tony Porter</a><span>*, “There’s not a lot of men [perpetrating violence], but there is a lot of violence. So what is it that allows these men to do what they do in the presence of all these good men?” The answer is the Man Box. </span></p>
    <p><span>It’s up to men to help other men get out of the man box and to discourage violent behavior. To <em>not</em> speak up and actively work to support women and a healthier concept of masculinity is to be complicit in the violence. It can be hard because laughing at rape joke or giving your friend the thumbs up and a condom as he guides a drunk person upstairs is part of the fee for staying in the man box. </span><strong>But if you’re not willing to pay the price of losing your man card to prevent rape or assault, you are part of the problem. </strong><span>When you say “</span><a href="http://jezebel.com/your-guide-to-not-all-men-the-best-meme-on-the-interne-1573535818" rel="nofollow external" class="bo">Not All Men</a><span>,” you’re giving all men a pass to say “that’s not my problem.” It </span><em>is</em><span> your problem. </span></p>
    <p><span>When very few people showed interest in the What About The Men event, not only did it show how many people think sexual violence is not their problem, but it also became an example of a problem I hoped to address in the event: </span><strong>People don’t support male survivors in the same way as other survivors because we have a false image who and what a survivor is. </strong></p>
    <p>Now, let’s be real and admit <strong>survivors aren’t really supported at all</strong>. Even the “perfect victim” (i.e. <span>a straight woman who wasn’t drunk, was dressed conservatively, didn’t know the person, didn’t consent to something else, etc etc) won’t get the support they deserve. But to society, a sexual assault survivor represents vulnerability and violation — something hegemonic masculinity just <em>isn’t — </em>and therefore it is totally unfathomable that a man could be survivor. At most, we can maybe comprehend boys being victimized at a young age, but not adult men. When I was doing research for the event, I found that most of the resources (like support groups and even interviews with psychologists specializing in the field) were targeted for male survivors of </span><em><span>childhood</span></em><span> sexual assault. None of them addressed sexual assault as an adult, and often they focused on the young age at which the assault occurred in to reassure survivors that they could still be men.</span></p>
    <p><span><img src="https://womenscenteratumbc.files.wordpress.com/2016/05/picture1.jpg?w=254&amp;h=300" alt="Picture1" width="254" height="300" style="max-width: 100%; height: auto;"><img src="https://womenscenteratumbc.files.wordpress.com/2016/05/picture3.png?w=217&amp;h=300" alt="Picture3" width="217" height="300" style="max-width: 100%; height: auto;"></span><img src="https://womenscenteratumbc.files.wordpress.com/2016/05/picture2.jpg?w=562" alt="Picture2" style="max-width: 100%; height: auto;"></p>
    <p><span>So, what? Men who experience sexual assault as an adult are no longer men? Were they never men to begin with? Are they gay now? Does sexual assault just not happen to men? </span><em><span><a href="http://everydayfeminism.com/2015/12/facts-male-rape-survivors/" rel="nofollow external" class="bo">No, of course not. </a></span></em><span>But because we see men as always wanting sex, as powerful and strong and dominant, we can’t imagine men as survivors unless it was during childhood. We also can’t imagine that sexual assault can be perpetrated by women, but in a recent study<span> <a href="http://www.slate.com/articles/double_x/doublex/2014/04/male_rape_in_america_a_new_study_reveals_that_men_are_sexually_assaulted.html" rel="nofollow external" class="bo">46% of male survivors reported a female perpetrator.</a></span> Maybe we can wrap our heads around a male perpetrator, </span><a href="http://thoughtcatalog.com/anonymous/2013/10/i-was-raped-by-a-woman-and-then-dated-her-for-two-years/" rel="nofollow external" class="bo">but a woman*?</a><span> No way. </span><a href="http://www.cnn.com/2013/10/09/living/chris-brown-female-on-male-rape/" rel="nofollow external" class="bo">He’s supposed to like it</a><span>*.</span></p>
    <p><span>Toxic ideas like this leave male survivors feeling isolated. Many feel like they can’t talk about it. Many don’t know they can claim words like “assault” “victim” “survivor” or “rape” to describe their experience. And if</span><a href="https://sapac.umich.edu/article/53" rel="nofollow external" class="bo"> men can’t talk about rape</a><span>, male survivors have nobody to speak up and say “</span><a href="http://www.pandys.org/malesurvivors.html" rel="nofollow external" class="bo">Hey. It happened to me, too</a><span>.” </span></p>
    <p><span>We called this event “<a href="http://everydayfeminism.com/2016/05/when-masculinity-fails-men/" rel="nofollow external" class="bo">What About The Men</a>” (if you click on just one link from this whole blog, it should be this one) </span><span>because every time we or anyone else does anything about sexual assault, someone goes “Hey, men get raped too!” They’re totally right, but usually these people are using male survivors as a way to derail conversations about men as perpetrators. They’re not focusing on how toxic masculinity ignores and reprimands male survivors. They just want to absolve toxic masculinity of its responsibility for sexual violence against <em>all genders</em>. I wanted to use that time and space to really address that question: What About the Men?</span></p>
    <p><strong>We all need to show up more for <a href="https://1in6.org/" rel="nofollow external" class="bo">male survivors</a></strong><span><strong>.</strong> As much as I am upset with our community for not stepping up to be accountable for sexual assault and support male survivors, we at the Women’s Center need to be accountable too. This is the first event we’ve hosted with the focus of male survivors in the last five years, and possibly the only one ever. This is a feminist issue because the power structures of patriarchy and rape culture will continue to put men in positions of power and dominance, whether they use it against others or have it used against them. We all need to do better. </span></p>
    <p><span>If you’re interested in more issues related to masculinity or are in search of a safe space to talk about masculinity, keep an eye out for Rebuilding Manhood and other Women’s Center programming. If you need to talk one-on-one with someone who can provide a safe and affirming environment, schedule a meeting with </span><a href="http://umbc.box.com/meetjess" rel="nofollow external" class="bo">Jess</a><span> or </span><a href="http://umbc.box.com/meetmegan" rel="nofollow external" class="bo">Megan</a><span> or stop by the Women’s Center, or contact the <a href="http://vav.umbc.edu/contact-us/" rel="nofollow external" class="bo">Voices Against Violence</a> coordinator. </span></p>
    <p>More online resources:</p>
    <p><a href="http://gmdvp.org/gmdvp/" rel="nofollow external" class="bo">For Gay or Bisexual Men</a></p>
    <p><a href="https://rainn.org/get-information/types-of-sexual-assault/male-sexual-assault" rel="nofollow external" class="bo">Commonly Asked Questions</a></p><br>   </div>
]]>
  </Body>
  <Summary> A blog post and reflection by staff member Daniel Willey   The following post contains mentions of rape and sexual assault. Hyperlinks marked with * indicate that the article contains detailed...</Summary>
  <Website>https://womenscenteratumbc.wordpress.com/2016/05/24/we-hosted-an-event-about-masculinity-and-sexual-assault-and-nobody-came/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60354/guest@my.umbc.edu/2ebc9534a96ef0dc2bb2208611f3157f/api/pixel</TrackingUrl>
  <Tag>issues</Tag>
  <Tag>masculinity</Tag>
  <Tag>programs</Tag>
  <Tag>sexual-assault</Tag>
  <Tag>sexual-assault-awareness-month</Tag>
  <Tag>uncategorized</Tag>
  <Group token="womenscenter">Women's, Gender, &amp;amp; Equity Center</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/womenscenter</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/xsmall.png?1750974263</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/original.png?1750974263</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/xxlarge.png?1750974263</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/xlarge.png?1750974263</AvatarUrl>
  <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/large.png?1750974263</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/medium.png?1750974263</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/small.png?1750974263</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/xsmall.png?1750974263</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/125/78272a4842689b30dbf74672182b78f8/xxsmall.png?1750974263</AvatarUrl>
  <Sponsor>Women's Center</Sponsor>
  <PawCount>111</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Tue, 24 May 2016 12:15:00 -0400</PostedAt>
  <EditAt>Tue, 24 May 2016 12:15:00 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="60353" important="false" status="posted" url="https://dev.my.umbc.edu/posts/60353">
    <Title>OCSS is running on regular hours.</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><span>Hey commuters! We hope that you are enjoying your summer break. Just as a reminder, the OCSS office is running on regular schedule. Stop by if you need to purchase a bus pass, need information on off campus housing, bus routes, or just to say hi!</span><div><span><br></span></div><div><span>M-F 8:30am-5:00pm</span></div></div>
      ]]>
    </Body>
    <Summary>Hey commuters! We hope that you are enjoying your summer break. Just as a reminder, the OCSS office is running on regular schedule. Stop by if you need to purchase a bus pass, need information on...</Summary>
    <Website>https://www.facebook.com/UMBCOffCampusStudentServices/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60353/guest@my.umbc.edu/8786df6217577aeed284d4956dff8041/api/pixel</TrackingUrl>
    <Group token="ocss">Commuter Connections</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ocss</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/xsmall.png?1770828767</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/original.png?1770828767</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/xxlarge.png?1770828767</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/xlarge.png?1770828767</AvatarUrl>
    <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/large.png?1770828767</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/medium.png?1770828767</AvatarUrl>
    <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/small.png?1770828767</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/xsmall.png?1770828767</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/369/e9220286d22558b24422af119b418d0c/xxsmall.png?1770828767</AvatarUrl>
    <Sponsor>Off-Campus Student Services</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/xxlarge.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/xlarge.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/large.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/medium.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/small.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/xsmall.jpg?1464101002</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/060/353/210ed2c24fbaa59224acb861638cb7d4/xxsmall.jpg?1464101002</ThumbnailUrl>
    <PawCount>5</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 24 May 2016 10:45:27 -0400</PostedAt>
  </NewsItem>
</News>
