{"68608":{"#nid":"68608","#data":{"type":"external_news","title":"NSF Announces New Expeditions in Computing Awards","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s project, led by Jim Rehg (IC) and intended to use computers to help screen more young children for autism, will help \u0022push the frontiers of computing,\u0022 according to the NSF.\u0026nbsp;\u003Cem\u003ESource: DrDobbs.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:32:37","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Emily Wright","field_article_url":"","publication_url":"http:\/\/www.drdobbs.com\/tools\/226900067;jsessionid=DK35JC2E5FPU5QE1GHOSKHWATMY32JVN?cid=RSSfeed_DDJ_DevelopmentTools","dateline":{"date":"2010-08-24T00:00:00-04:00","iso_date":"2010-08-24T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68609":{"#nid":"68609","#data":{"type":"external_news","title":"Researchers Developing Computerized Tool for Autism Diagnosis, Care","body":[{"value":"\u003Cp\u003EA team including Gregory Abowd (IC) is developing an autism diagnosis tool with three technological components: a \u0022smart\u0022 video camera, timing devices to measure heart rate and other biometrics, and data evaluation software.\u0026nbsp;\u003Cem\u003ESource: iHealthBeat.org\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:38:13","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"cyber risk","field_article_url":"","publication_url":"http:\/\/www.ihealthbeat.org\/articles\/2010\/8\/23\/researchers-developing-computerized-tool-for-autism-diagnosis-care.aspx","dateline":{"date":"2010-08-24T00:00:00-04:00","iso_date":"2010-08-24T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68610":{"#nid":"68610","#data":{"type":"external_news","title":"Watching the Suspicious Behavior of Spam","body":[{"value":"\u003Cp\u003EFor years, network operators have fought spam by examining what messages say. Nick \u0026shy;Feamster (CS), a member of Technology Review\u0027s TR35 for 2010, had a better idea.\u003Cem\u003ESource: Technology Review\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:40:06","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"CREST D-Map","field_article_url":"","publication_url":"http:\/\/www.technologyreview.com\/TR35\/Profile.aspx?Cand=T\u0026TRID=958","dateline":{"date":"2010-08-27T00:00:00-04:00","iso_date":"2010-08-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68611":{"#nid":"68611","#data":{"type":"external_news","title":"Tweens \u0026 Technology: The Tiny Power Shoppers","body":[{"value":"\u003Cp\u003EResearch by Ph.D. student Sarita Yardi (IC) shows that kids are adopting technology faster than ever before, fueling a consumer demographic not just on video games but mobile phones, Internet accounts and other electronic devices and services.\u0026nbsp;\u003Cem\u003ESource: Financial Post\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:57:11","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Tonga","field_article_url":"","publication_url":"http:\/\/www.financialpost.com\/news\/tiny+power+shoppers\/3452047\/story.html","dateline":{"date":"2010-08-30T00:00:00-04:00","iso_date":"2010-08-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68612":{"#nid":"68612","#data":{"type":"external_news","title":"New Research Applies Computing to Detecting Autism","body":[{"value":"\u003Cp\u003EA $10 million NSF Expeditions project, led by Jim Rehg (IC), will apply the new discipline of computational behavioral science to the task of detecting autism in very young children.\u003Cem\u003ESource: Campus Technology\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:58:55","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"cs junior design capstone expo","field_article_url":"","publication_url":"http:\/\/campustechnology.com\/articles\/2010\/09\/01\/new-research-applies-computing-to-detecting-autism.aspx","dateline":{"date":"2010-09-02T00:00:00-04:00","iso_date":"2010-09-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68613":{"#nid":"68613","#data":{"type":"external_news","title":"Inflated Performance?","body":[{"value":"\u003Cp\u003E\u201cI don\u2019t believe that the speedups people report from their GPU ports are inflated,\u201d Rich Vuduc (CSE) said at the 2010 SciDAC conference. \u201cHowever, these speedups also don\u2019t magically occur just because you put a GPU into your system.\u0022\u0026nbsp;\u003Cem\u003ESource: ISGTW.org\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 21:35:08","changed_gmt":"2016-10-08 02:24:59","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Brain Awareness Week","field_article_url":"","publication_url":"http:\/\/www.isgtw.org\/?pid=1002730","dateline":{"date":"2010-09-07T00:00:00-04:00","iso_date":"2010-09-07T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68511":{"#nid":"68511","#data":{"type":"external_news","title":"Flexible Routing in the Cloud","body":[{"value":"\u003Cp\u003EA transit portal (TP) could help cloud-based applications route traffic much more efficiently. Ph.D. student Vytautus Valancius (CS) is leading a multi-institutional team investigating the TP option for managing network latency.\u0026nbsp;\u003Cem\u003ESource: Computing Now\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:49:56","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Aerospace and Acoustics","field_article_url":"","publication_url":"http:\/\/www.computer.org\/portal\/web\/computingnow\/archive\/news067","dateline":{"date":"2010-08-17T00:00:00-04:00","iso_date":"2010-08-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68481":{"#nid":"68481","#data":{"type":"external_news","title":"Flash on College Websites May Pose Security Risk","body":[{"value":"\u003Cp\u003EMustaque Ahamad (CS), director of the Georgia Tech Information Security Center, says Flash software has holes that can leave websites open to cyber attack.\u0026nbsp;\u003Cem\u003ESource: Chronicle of Higher Education\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-22 17:49:40","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"You in The News","field_article_url":"","publication_url":"http:\/\/chronicle.com\/blogPost\/Flash-on-College-Web-Sites-May\/25384\/","dateline":{"date":"2010-07-13T00:00:00-04:00","iso_date":"2010-07-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68493":{"#nid":"68493","#data":{"type":"external_news","title":"HP Bestows 3rd Annual Research Innovation Awards","body":[{"value":"\u003Cp\u003EKarsten Schwan (CS), who now has received the award three years running, is one of 65 researchers from around the world to receive funding aimed at conducting breakthrough collaborative research with HP.\u0026nbsp;\u003Cem\u003ESource: HPCwire\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 15:25:34","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Brett Aiello","field_article_url":"","publication_url":"http:\/\/www.hpcwire.com\/industry\/academia\/HP-Announces-Recipients-of-Third-Annual-Innovation-Research-Awards-97948689.html","dateline":{"date":"2010-07-13T00:00:00-04:00","iso_date":"2010-07-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68512":{"#nid":"68512","#data":{"type":"external_news","title":"Step 1: Post Elusive Proof. Step 2: Watch Fireworks.","body":[{"value":"\u003Cp\u003EPassions have run high in the online debate, argued significantly on Dick Lipton\u0027s (CS) blog, surrounding an HP researcher\u0027s 100-page \u0022P=NP\u0022 proof. The discussion shows the Internet\u0027s value as a tool for intellectual collaboration.\u0026nbsp;\u003Cem\u003ESource: The New York Times\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:52:25","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Extension of Self","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/08\/17\/science\/17proof.html?_r=1\u0026ref=todayspaper","dateline":{"date":"2010-08-17T00:00:00-04:00","iso_date":"2010-08-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68494":{"#nid":"68494","#data":{"type":"external_news","title":"The Ongoing War Against Cybercrime","body":[{"value":"\u003Cp\u003ELegislators and organizations are more aware of identity theft than ever before, but personal vigilance is still an individual\u0027s best defense against cyber criminals, says Jon Giffin (CS).\u0026nbsp;\u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 15:41:22","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/2010\/TECH\/web\/07\/11\/protecting.personal.data\/","dateline":{"date":"2010-07-13T00:00:00-04:00","iso_date":"2010-07-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68606":{"#nid":"68606","#data":{"type":"external_news","title":"NSF Awards $10M to Develop Computing Techniques for Measuring and Analyzing Child Behavior","body":[{"value":"\u003Cp\u003EA Georgia Tech-led team received $10 million to develop novel computing techniques for assessing children\u0027s behavior. The technologies could enable new approaches for identifying children at risk for developmental disorders and potentially improve treatment.\u003Cem\u003ESource: GT Research News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:16:56","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Military Family Support","field_article_url":"","publication_url":"http:\/\/www.gatech.edu\/newsroom\/release.html?nid=60509","dateline":{"date":"2010-08-19T00:00:00-04:00","iso_date":"2010-08-19T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68495":{"#nid":"68495","#data":{"type":"external_news","title":"Qualcomm Unveils AR Platform for Google Android Phones","body":[{"value":"\u003Cp\u003EMobile phone technology has only recently been able to meet the computing demands of augmented reality, says Blair MacIntyre (IC), who will direct a new AR lab in at Georgia Tech in collaboration with Qualcomm.\u0026nbsp;\u003Cem\u003ESource: UK Telegraph\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 15:54:16","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"assisted reproductive technology","field_article_url":"","publication_url":"http:\/\/www.telegraph.co.uk\/technology\/news\/7868707\/Qualcomm-unveils-augmented-reality-platform-for-Google-Android-phones.html","dateline":{"date":"2010-07-13T00:00:00-04:00","iso_date":"2010-07-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68496":{"#nid":"68496","#data":{"type":"external_news","title":"Researchers Tout New Weapon in Internet Censorship Arms Race","body":[{"value":"\u003Cp\u003ENick Feamster, Santosh Vempala and grad student Sam Burnett (CS) have created a new tool that allows users to send messages through heavily censored networks by embedding them in user-generated content, such as Flickr photos or Tweets.\u0026nbsp;\u003Cem\u003ESource: Network World\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 15:56:12","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"korean speech-quiz contest","field_article_url":"","publication_url":"http:\/\/www.networkworld.com\/community\/node\/63481","dateline":{"date":"2010-07-13T00:00:00-04:00","iso_date":"2010-07-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68607":{"#nid":"68607","#data":{"type":"external_news","title":"Spotting Autism With Computers","body":[{"value":"\u003Cp\u003EWithin two years, Gregory Abowd and Jim Rehg (IC) hope to unveil the prototype for an automated system that could help millions more children receive early screening for autism.\u0026nbsp;\u003Cem\u003ESource: Atlanta Journal-Constitution\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-28 18:18:58","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.ajc.com\/news\/atlanta\/tech-hopes-to-develop-595947.html","dateline":{"date":"2010-08-23T00:00:00-04:00","iso_date":"2010-08-23T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68500":{"#nid":"68500","#data":{"type":"external_news","title":"Has the Robot\u0027s Day Finally Arrived?","body":[{"value":"\u003Cp\u003EAndrea Thomaz (IC) says the students in her Socially Intelligent Machines lab are motivated in part by the prospect of lifetime employment in the exploding field of robotics.\u003Cem\u003ESource: PCWorld\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:27:46","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"college student of the year","field_article_url":"","publication_url":"http:\/\/www.pcworld.com\/article\/201066\/has_the_robots_day_finally_arrived.html?tk=rss","dateline":{"date":"2010-07-26T00:00:00-04:00","iso_date":"2010-07-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"667","name":"robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68501":{"#nid":"68501","#data":{"type":"external_news","title":"Send in the Robots","body":[{"value":"\u003Cp\u003ERobots are answering the call in a growing number of applications, from counterterrorism to surgery to food processing to home health care. \u0022They are enabling us to do things we have never done before,\u0022 says Henrik Christensen of the Center for Robotics \u0026amp; Intelligent Machines.\u0026nbsp;\u003Cem\u003ESource: The New York Times\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:29:26","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Extension of Self","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/07\/18\/weekinreview\/18goodnews.html?_r=3\u0026pagewanted=all\u0026scp=5\u0026sq=robots\u0026st=cse","dateline":{"date":"2010-07-26T00:00:00-04:00","iso_date":"2010-07-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"667","name":"robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68502":{"#nid":"68502","#data":{"type":"external_news","title":"GT Student Pens New Book for Kids","body":[{"value":"\u003Cp\u003ESenior Computational Media major Tim van de Vall is the author and illustrator of \u0022The Monkey Hole,\u0022 a new chlidren\u0027s book with a subtle political twist for adults.\u0026nbsp;\u003Cem\u003ESource: NeighborNewspapers.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:31:17","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Penning trap","field_article_url":"","publication_url":"http:\/\/neighbornewspapers.com\/detail\/161737.html?category_id=6","dateline":{"date":"2010-07-26T00:00:00-04:00","iso_date":"2010-07-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68503":{"#nid":"68503","#data":{"type":"external_news","title":"Personal Robots: Newest CS1 Teaching Tool","body":[{"value":"\u003Cp\u003EThrough Georgia Tech\u0027s Institute for Personal Robots in Education (IPRE), more than 1,000 students nationwide have put their intro computer science skills to the test with a personal robot. Research shows the approach may lead students to spend more time programming.\u0026nbsp;\u003Cem\u003ESource: Communications of the ACM\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:34:01","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Fulmer Prize","field_article_url":"","publication_url":"http:\/\/cacm.acm.org\/news\/96557-personal-robots-newest-cs1-teaching-tool\/fulltext","dateline":{"date":"2010-07-27T00:00:00-04:00","iso_date":"2010-07-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68504":{"#nid":"68504","#data":{"type":"external_news","title":"Study To Analyze Whether Tweets Are All Noise","body":[{"value":"\u003Cp\u003EPh.D. student Kurt Luther (IC) is part of a three-university study that will use Twitter followers\u0027 perceptions of their friends\u0027 posts to answer the question, \u0022Who gives a Tweet?\u0022\u003Cem\u003ESource: InformationWorldReview.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:36:13","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Children\u2019s Healthcare of Atlant","field_article_url":"","publication_url":"http:\/\/www.iwr.co.uk\/social-media\/3010374\/A-study-launched-to-analyse-whether-Tweets-are-all-noise","dateline":{"date":"2010-07-28T00:00:00-04:00","iso_date":"2010-07-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68505":{"#nid":"68505","#data":{"type":"external_news","title":"The Limits of GPUs","body":[{"value":"\u003Cp\u003EIn a presentation at HotPar 2010, Rich Vuduc (CSE) illustrated that GPUs may not be \u0022orders of magnitude\u0022 faster than CPUs after all. Vuduc\u0027s presentation is summarized for a technical audience.\u0026nbsp;\u003Cem\u003ESource: RealWorldTech.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:37:29","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Kayla Stoy","field_article_url":"","publication_url":"http:\/\/www.realworldtech.com\/page.cfm?ArticleID=RWT072610001641\u0026p=6","dateline":{"date":"2010-07-28T00:00:00-04:00","iso_date":"2010-07-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"167322","name":"supercomputing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68506":{"#nid":"68506","#data":{"type":"external_news","title":"Developer Preview of AR Browser Kamra Now Available","body":[{"value":"\u003Cp\u003EThe open standards browser Kamra, produced by Blair MacIntyre\u0027s (IC) Augmented Environments Lab, offers users multiple, simultaneous augmented content overlayed on top of a live video scene.\u0026nbsp;\u003Cem\u003ESource: GizMag.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 16:52:07","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"ida yoshinaga","field_article_url":"","publication_url":"http:\/\/www.gizmag.com\/kamra-augmented-reality-browser-developer-preview-available\/15922\/","dateline":{"date":"2010-08-04T00:00:00-04:00","iso_date":"2010-08-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68507":{"#nid":"68507","#data":{"type":"external_news","title":"Malware Threat Outpaces Antivirus Software","body":[{"value":"\u003Cp\u003EThe bad guys may be getting the upper hand in devising computer viruses and other malware that evade detection by antivirus software. Paul Royal of GTISC said last year malicious code was inserted into an ad on USAToday.com, infecting browsers who were simply reading the news.\u0026nbsp;\u003Cem\u003ESource: Yahoo News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:01:43","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"kendo","field_article_url":"","publication_url":"http:\/\/news.yahoo.com\/s\/livescience\/20100803\/sc_livescience\/malwarethreatoutpacesantivirussoftware","dateline":{"date":"2010-08-04T00:00:00-04:00","iso_date":"2010-08-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68508":{"#nid":"68508","#data":{"type":"external_news","title":"Hiding Files In Flickr Pics Will Fool Censors","body":[{"value":"\u003Cp\u003EPh.D. student Sam Burnett (CS) is on the team that created the anti-censorship tool Collage, which can hide messages in user-generated content. A Collage prototype is due out Friday, Aug. 13.\u0026nbsp;\u003Cem\u003ESource: NewScientist.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:16:38","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"mental health resources for coworkers","field_article_url":"","publication_url":"http:\/\/www.newscientist.com\/article\/dn19284-hiding-files-in-flickr-pics-will-fool-web-censors.html","dateline":{"date":"2010-08-10T00:00:00-04:00","iso_date":"2010-08-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68509":{"#nid":"68509","#data":{"type":"external_news","title":"Million-Dollar Problem Cracked?","body":[{"value":"\u003Cp\u003EThe \u0022P=NP\u0022 problem is one of the most basic in computer science, and in a new, 100-page paper, an HP Labs researcher claims to have solved it. Richard Lipton (CS) has dropped everything to test the claim, writing about it on his\u0026nbsp;\u003Ca href=\u0022http:\/\/rjlipton.wordpress.com\/\u0022 target=\u0022_blank\u0022\u003Eblog\u003C\/a\u003E, which is named for the very same problem.\u0026nbsp;\u003Cem\u003ESource: Nature.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:19:37","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.nature.com\/news\/2010\/100810\/full\/news.2010.398.html","dateline":{"date":"2010-08-12T00:00:00-04:00","iso_date":"2010-08-12T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"68510":{"#nid":"68510","#data":{"type":"external_news","title":"Collage Combats Censorship by Hiding Text in Images","body":[{"value":"\u003Cp\u003EOne advantage to the anti-censorship tool Collage, developed by Nick Feamster, Santosh Vempala and grad student Sam Burnett (CS), is it allows users some deniability by hiding messages in typically innocuous content.\u0026nbsp;\u003Cem\u003ESource: PCMag.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-06-23 17:45:19","changed_gmt":"2016-10-08 02:24:57","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Christopher Ballenger","field_article_url":"","publication_url":"http:\/\/www.pcmag.com\/article2\/0,2817,2367825,00.asp","dateline":{"date":"2010-08-16T00:00:00-04:00","iso_date":"2010-08-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66005":{"#nid":"66005","#data":{"type":"external_news","title":"BrainLab Looks for Keys for Locked-In Patients","body":[{"value":"\u003Cp\u003EIn this video interview, Melody Moore Jackson (IC) talks about BrainLab\u0027s search for biometric interfaces that can help those with severe neurological disabilities relearn how to move and communicate.\u0026nbsp;\u003Cem\u003ESource: TechDrawl\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:51:20","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Naeemi","field_article_url":"","publication_url":"http:\/\/www.youtube.com\/watch?v=q9H7Qb0dyw4","dateline":{"date":"2010-06-04T00:00:00-04:00","iso_date":"2010-06-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66006":{"#nid":"66006","#data":{"type":"external_news","title":"Drinks on 5th With Chris Klaus","body":[{"value":"\u003Cp\u003EIn the 1990s, College of Computing board member Chris Klaus \u0022killed\u0022 (in a very good way) the IT security industry with Internet Security Systems; can he do the same with online gaming? Three-part video interview.\u0026nbsp;\u003Cem\u003ESource: TechDrawl\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:54:28","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Naeemi","field_article_url":"","publication_url":"http:\/\/techdrawl.com\/News-Post\/Fresh-Voices\/Drinks-On-Fifth-Chris-Klaus-Act-I","dateline":{"date":"2010-06-04T00:00:00-04:00","iso_date":"2010-06-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2356","name":"gaming"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66007":{"#nid":"66007","#data":{"type":"external_news","title":"Kamra: First Open, Standards-Based Mobile Browser","body":[{"value":"\u003Cp\u003EBlair MacIntyre (IC) heads the development team for Kamra, a web browser that overlays information from multiple website channels simultaneously onto an iPhone.\u0026nbsp;\u003Cem\u003ESource: Wireless Weblog\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 16:00:56","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Georgia Cyber Center","field_article_url":"","publication_url":"http:\/\/www.wireless-weblog.com\/50226711\/kamra_the_first_open_standardsbased_mobile_browser.php","dateline":{"date":"2010-06-08T00:00:00-04:00","iso_date":"2010-06-08T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1597","name":"Augmented Reality"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66008":{"#nid":"66008","#data":{"type":"external_news","title":"Kids Experiment With \u0027Video Playdates\u0027","body":[{"value":"\u003Cp\u003EChildren playing \u0022together\u0022 via webcam enjoy richer interaction than those watching televsion or playing video games with set rules, says Ph.D. candidate Yana Larosh (IC).\u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 16:10:21","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/2010\/TECH\/innovation\/06\/11\/video.playdate\/","dateline":{"date":"2010-06-14T00:00:00-04:00","iso_date":"2010-06-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66009":{"#nid":"66009","#data":{"type":"external_news","title":"Intel Pivots to Supercomputing Defense","body":[{"value":"\u003Cp\u003EGPU maker NVidia may have a head start on Intel when it comes to manufacturing chips for the next generation of supercomputers, says Richard Fujimoto (CSE).\u0026nbsp;\u003Cem\u003ESource: FoxBusiness.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 16:13:26","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"kyoko masuda","field_article_url":"","publication_url":"http:\/\/www.foxbusiness.com\/story\/markets\/industries\/technology\/larrabee-retreat-intel-pivots-supercomputer-defense\/?utm_campaign=Feed%3A+foxbusiness%2Ftechnology+(Text+-+Industries+-+Technology)\u0026utm_medium=feed\u0026utm_source=feedburner","dateline":{"date":"2010-06-15T00:00:00-04:00","iso_date":"2010-06-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66010":{"#nid":"66010","#data":{"type":"external_news","title":"How Does a Terminator Know When to Not Terminate?","body":[{"value":"\u003Cp\u003ELast year Ron Arkin (IC) completed a three-year study for the U.S. Army that tried to develop an \u0022ethical governor\u0022 for autonomous robots used in battle.\u0026nbsp;\u003Cem\u003ESource: Discover Magazine (subscription required for full text)\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 16:15:40","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/discovermagazine.com\/2010\/may\/14-how-does-terminator-know-when-to-not-terminate","dateline":{"date":"2010-06-17T00:00:00-04:00","iso_date":"2010-06-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66028":{"#nid":"66028","#data":{"type":"external_news","title":"New Tech Moves Beyond Mouse, Keyboard \u0026 Screen","body":[{"value":"\u003Cp\u003E\u201cNatural interfaces\u201d like motion-controlled computing and contact lens screens are no longer science fiction, though Beth Mynatt (IC) says \u201cold\u201d standbys like keyboards will probably be around a while.\u0026nbsp;\u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-09 11:47:41","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/2010\/TECH\/innovation\/06\/18\/natural.user.interface.mouse\/","dateline":{"date":"2010-06-18T00:00:00-04:00","iso_date":"2010-06-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66030":{"#nid":"66030","#data":{"type":"external_news","title":"Skribit Founder Joins Notifo as Co-Founder","body":[{"value":"\u003Cp\u003ESkribit founder and College of Computing alumnus Paul Stamatiou (CM \u002708) and fellow grad Chad Etzel (CS \u002702) have joined real-time mobile notification outfit Notifo.\u0026nbsp;\u003Cem\u003ESource: ReadWriteWeb.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-09 11:59:37","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"3d imaging","field_article_url":"","publication_url":"http:\/\/www.readwriteweb.com\/archives\/skribit_founder_joins_notifo_as_co-founder.php?utm_campaign=Feed%3A+readwriteweb+(ReadWriteWeb)\u0026utm_medium=feed\u0026utm_source=feedburner","dateline":{"date":"2010-06-18T00:00:00-04:00","iso_date":"2010-06-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65993":{"#nid":"65993","#data":{"type":"external_news","title":"IT Workers Teach, Learn in Georgia High Schools","body":[{"value":"\u003Cp\u003EIn Georgia, unemployed IT professionals and computing teachers are joining forces to help boost the number and diversity of the state\u0027s computer science students, thanks to the College of Computing\u0027s Operation Reboot.\u0026nbsp;\u003Cem\u003ESource: Government Technology\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 14:59:25","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"sidewalk","field_article_url":"","publication_url":"http:\/\/www.govtech.com\/gt\/762659","dateline":{"date":"2010-05-17T00:00:00-04:00","iso_date":"2010-05-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65995":{"#nid":"65995","#data":{"type":"external_news","title":"Meet Simon, the Social Robot","body":[{"value":"\u003Cp\u003ESimon the Robot, a product of Andrea Thomaz\u0027 (IC) lab, is one example of social robots, which not only assist humans in everyday tasks but can interact with them, as well.\u003Cem\u003ESource: SmartPlanet.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:14:58","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Ting Zheng","field_article_url":"","publication_url":"http:\/\/www.smartplanet.com\/people\/blog\/pure-genius\/meet-simon-the-social-robot\/3676\/?tag=content;col1","dateline":{"date":"2010-05-18T00:00:00-04:00","iso_date":"2010-05-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65996":{"#nid":"65996","#data":{"type":"external_news","title":"Military Robots Seen as Lifesavers","body":[{"value":"\u003Cp\u003EAutonomous robot soldiers in combat may be years away, but robotic technologies that can handle other dangerous duties--such as transporting supplies in hostile regions--exist now, says Henrik Christensen (IC).\u0026nbsp;\u003Cem\u003ESource: NPR\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:18:49","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"2022 Diversity Champion awards","field_article_url":"","publication_url":"http:\/\/www.npr.org\/templates\/story\/story.php?storyId=126973580","dateline":{"date":"2010-05-20T00:00:00-04:00","iso_date":"2010-05-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65998":{"#nid":"65998","#data":{"type":"external_news","title":"Study Shows New Way to Stop Blood Clots","body":[{"value":"\u003Cp\u003ECSE graduate student Jared Gossett is part of study that seeks to reduce risk of heart attack and stroke by inhibiting actions of a protein called fibrinogen, which is integral to blood clotting.\u0026nbsp;\u003Cem\u003ESource: GT Research News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:24:54","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Military Family Support","field_article_url":"","publication_url":"http:\/\/gtresearchnews.gatech.edu\/fibrin-assembly\/","dateline":{"date":"2010-05-20T00:00:00-04:00","iso_date":"2010-05-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65999":{"#nid":"65999","#data":{"type":"external_news","title":"Grow Your Own AR Garden","body":[{"value":"\u003Cp\u003EBlair MacIntyre (IC), one of the world\u0027s pioneers of augmented reality, sketches out the current state of the field in this half-hour episode of Bloomberg TV\u0027s \u0022Innovators.\u0022\u0026nbsp;\u003Cem\u003ESource: Bloomberg.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:26:22","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.bloomberg.com\/avp\/avp.htm?N=innovators\u0026T=Bloomberg%20Innovators%20Episode%206\u0026clipSRC=FLASH\/innovators\/innovators_episode6_reality.flv","dateline":{"date":"2010-05-24T00:00:00-04:00","iso_date":"2010-05-24T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66312":{"#nid":"66312","#data":{"type":"external_news","title":"Kraken Botnet Making a Resurgence","body":[{"value":"\u003Cp\u003EThe Kraken botnet--one of the Internet\u0027s largest and most difficult to detect in 2008--is rearing its ugly head again, says GTISC\u0027s Paul Royal.\u0026nbsp;\u003Cem\u003ESource: Dark Reading\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-26 14:16:49","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Career Educator","field_article_url":"","publication_url":"http:\/\/www.darkreading.com\/vulnerability_management\/security\/antivirus\/showArticle.jhtml?articleID=225701438","dateline":{"date":"2010-07-01T00:00:00-04:00","iso_date":"2010-07-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66002":{"#nid":"66002","#data":{"type":"external_news","title":"Willow Garage Gets Robots in Researchers\u0027 Hands","body":[{"value":"\u003Cp\u003EThe College of Computing\u0027s Aware Home is one of 11 research initiatives around the world that will receive an open-source PR2 robot for two years from Willow Garage.\u0026nbsp;\u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:35:13","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/2010\/TECH\/innovation\/05\/27\/cnet.willow.garage.robots\/","dateline":{"date":"2010-05-28T00:00:00-04:00","iso_date":"2010-05-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66313":{"#nid":"66313","#data":{"type":"external_news","title":"Will Qualcomm\u2019s Augmented Reality Play Augment Its Business?","body":[{"value":"\u003Cp\u003EThe leading wireless chip maker hopes its new AR Game Studio at Georgia Tech will drive interest in mobile gaming and, yes, help the company sell more chips.\u0026nbsp;\u003Cem\u003ESource: Bloomberg.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-26 14:18:38","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.businessweek.com\/technology\/content\/jul2010\/tc2010071_433105.htm","dateline":{"date":"2010-07-02T00:00:00-04:00","iso_date":"2010-07-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66003":{"#nid":"66003","#data":{"type":"external_news","title":"Are Terminators Real?","body":[{"value":"\u003Cp\u003EAs lethally armed robots become increasingly vital to the world\u0027s most advanced militaries, Ron Arkin (IC) is studying how autonomous machines could be programmed to fight ethically.\u0026nbsp;\u003Cem\u003ESource: Discovery News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:37:12","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Delta Jacket","field_article_url":"","publication_url":"http:\/\/news.discovery.com\/tech\/are-terminators-real.html","dateline":{"date":"2010-05-28T00:00:00-04:00","iso_date":"2010-05-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66314":{"#nid":"66314","#data":{"type":"external_news","title":"Georgia Tech, Qualcomm Form Game Studio","body":[{"value":"\u003Cp\u003EBlair MacIntyre (IC) will lead the Qualcomm Augmented Reality Game Studio, intended to lead advances in mobile gaming and interactive media.\u0026nbsp;\u003Cem\u003ESource: Atlanta Business Chronicle\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-26 14:26:28","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"breakthrough cases","field_article_url":"","publication_url":"http:\/\/atlanta.bizjournals.com\/atlanta\/stories\/2010\/06\/28\/daily41.html?surround=lfn","dateline":{"date":"2010-07-02T00:00:00-04:00","iso_date":"2010-07-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66004":{"#nid":"66004","#data":{"type":"external_news","title":"Saving Lives With Ethical (Robot) Soldiers","body":[{"value":"\u003Cp\u003EMilitary robots would have no inherent right of self-defense, says Ron Arkin (IC), and could even be programmed to allow \u201cguilt\u201d to influence future actions (podcast).\u0026nbsp;\u003Cem\u003ESource: National Academy of Engineering\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-06 15:40:08","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"mary kathryn tippett","field_article_url":"","publication_url":"http:\/\/www.nae.edu\/NAE\/pubundcom.nsf\/webviews\/Engineering+Innovation+Podcast+and+Radio+Series+By+Topic:?OpenDocument\u0026RestrictToCategory=Electronics\u0026count=50000","dateline":{"date":"2010-06-02T00:00:00-04:00","iso_date":"2010-06-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66315":{"#nid":"66315","#data":{"type":"external_news","title":"Students, Meet Your New Teacher, Mr. Robot","body":[{"value":"\u003Cp\u003EPart of a new generation of social robots, Simon--from the lab of Andrea Thomaz (IC)--learns through verbal conversations with humans, who can ask, \u0022Simon, do you have any questions?\u0022\u0026nbsp;\u003Cem\u003ESource: The New York Times\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-26 14:31:29","changed_gmt":"2016-10-08 02:24:30","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Extension of Self","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/07\/11\/science\/11robots.html?_r=3","dateline":{"date":"2010-07-12T00:00:00-04:00","iso_date":"2010-07-12T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65620":{"#nid":"65620","#data":{"type":"external_news","title":"Aware Home Getting a \u0027Rosie the Robot\u0027 Helper","body":[{"value":"\u003Cp\u003EA Personal Robot 2 (PR2) donated by Willow Garage will be put to work in the Aware Home Research Initiative, which will study how the robots could assist older adults in the household.\u0026nbsp;\u003Cem\u003ESource: IEEE Spectrum\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 14:19:27","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"\u00a0Linda Wills","field_article_url":"","publication_url":"http:\/\/spectrum.ieee.org\/automaton\/robotics\/robotics-software\/050410-willow-garage-giving-away-11-pr2-robots-worth-over-4-million","dateline":{"date":"2010-05-05T00:00:00-04:00","iso_date":"2010-05-05T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65624":{"#nid":"65624","#data":{"type":"external_news","title":"HRL Receives Award to Develop Assistive Robotics for Older Adults","body":[{"value":"Charlie Kemp, director of the Healthcare Robotics Lab along with his research team has been awarded the use of the PR2, a personal robot, to develop open source applications for assistive robotics. Kemp\u2019s Healthcare Robotics Lab was one of 11 chosen from a pool of 78 submissions that included the foremost names in robotics research, such as MIT CSAIL, Stanford and UC Berkeley. Willow Garage is spending over $4.4 million for the PR2 Beta program.Kemp will be placing the PR2 in the \u0022Aware Home\u0022 to study how robots can help with homecare and creative assistive capabilities for older adults. Their research includes developing easier ways for adults to interact with robots, and enabling robots to interact with everyday objects like drawers, lamps, and light switches. The Sponsor of the PR2 Competition was Willow Garage, a company that develops hardware and open source software for personal robotics applications. The awards were announced at the 2010 IEEE International Conference on Robotics and Automation (ICRA) held in Anchorage, Alaska from May 3rd \u2013 8th.\u0026nbsp;Other Investigators on this proposal include, Profs. Wendy Rogers (Psychology), Jim Rehg (Interactive Computing), Andrea Thomaz (Interactive Computing) and Brian Jones (Director, Aware Home Research Initiative).\u003Cp\u003E\u003C\/p\u003E\u003Cp\u003ECharlie Kemp, director of the Healthcare Robotics Lab along with his research team has been awarded the use of the PR2, a personal robot, to develop open source applications for assistive robotics. Kemp\u2019s Healthcare Robotics Lab was one of 11 chosen from a pool of 78 submissions that included the foremost names in robotics research, such as MIT CSAIL, Stanford and UC Berkeley. Willow Garage is spending over $4.4 million for the PR2 Beta program.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EKemp will be placing the PR2 in the \u0022Aware Home\u0022 to study how robots can help with homecare and creative assistive capabilities for older adults. Their research includes developing easier ways for adults to interact with robots, and enabling robots to interact with everyday objects like drawers, lamps, and light switches. The Sponsor of the PR2 Competition was Willow Garage, a company that develops hardware and open source software for personal robotics applications. The awards were announced at the 2010 IEEE International Conference on Robotics and Automation (ICRA) held in Anchorage, Alaska from May 3rd \u2013 8th.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EOther Investigators on this proposal include, Profs. Wendy Rogers (Psychology), Jim Rehg (Interactive Computing), Andrea Thomaz (Interactive Computing) and Brian Jones (Director, Aware Home Research Initiative).\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 14:31:47","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"S.C.","field_article_url":"","publication_url":"http:\/\/www.willowgarage.com\/blog\/2010\/06\/07\/spotlight-georgia-tech","dateline":{"date":"2010-05-07T00:00:00-04:00","iso_date":"2010-05-07T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"152","name":"Robotics"}],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65625":{"#nid":"65625","#data":{"type":"external_news","title":"Robot Masters the Art of Opening Doors and Drawers","body":[{"value":"\u003Cp\u003EProfessor Charlie Kemp and Advait Jain at Georgia Tech\u0027s\u0026nbsp;\u003Ca href=\u0022http:\/\/hg.gatech.edu\/hrl\/index.shtml\u0022 target=\u0022_blank\u0022\u003EHealthcare Robotics Laboratory\u003C\/a\u003E\u0026nbsp;have programmed a robot to autonomously approach and open doors and drawers.\u003C\/p\u003E\u003Cp\u003EIt does that using omni-directional wheels and compliant arms, and the only information it needs is the location and orientation of the handles. The researchers discussed their results at the IEEE International Conference on Robotics and Automation, held May 3rd \u2013 8th in Anchorage, Alaska, where they presented a paper, \u0022Pulling Open Doors and Drawers: Coordinating an Omni-Directional Base and a Compliant Arm with Equilibrium Point Control.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 14:35:11","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"MS in Analytics","field_article_url":"","publication_url":"http:\/\/spectrum.ieee.org\/automaton\/robotics\/medical-robots\/050610-georgia-tech-robot-masters-art-of-opening-doors-and-drawers","dateline":{"date":"2010-05-07T00:00:00-04:00","iso_date":"2010-05-07T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2157","name":"Charlie Kemp"},{"id":"10485","name":"CHR"},{"id":"2155","name":"healthcare robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65631":{"#nid":"65631","#data":{"type":"external_news","title":"U.S. News \u0026 World Report","body":[{"value":"\u003Cp\u003EWith $2.5 million in NSF funding, Operation Reboot is pairing up unemployed IT professionals with high school CS teachers, helping both learn valuable new skills.\u003Cem\u003ESource: U.S. News \u0026amp; World Report\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 14:48:37","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"equitable learning","field_article_url":"","publication_url":"http:\/\/www.usnews.com\/science\/articles\/2010\/05\/10\/operation-reboot-it-professionals-become-computer-science-teachers.html","dateline":{"date":"2010-05-11T00:00:00-04:00","iso_date":"2010-05-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65632":{"#nid":"65632","#data":{"type":"external_news","title":"Solution for African Health Data is BLIS","body":[{"value":"\u003Cp\u003EThe Basic Laboratory Information System (BLIS), conceived in the College\u0027s Computing for Good class and developed by master\u0027s student Ruban Monu, is undergoing a pilot implementation in four African nations.\u0026nbsp;\u003Cem\u003ESource: The Post (Cameroon)\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 14:50:13","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"protecting warfighters","field_article_url":"","publication_url":"http:\/\/www.thepostwebedition.com\/Content.aspx?ItemID=3423\u0026ModuleID=11","dateline":{"date":"2010-05-11T00:00:00-04:00","iso_date":"2010-05-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"7806","name":"computing for good"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65634":{"#nid":"65634","#data":{"type":"external_news","title":"Georgia Tech Students to Sweep Health IT Coding Challenge","body":[{"value":"A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). \u0026nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.A team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). \u0026nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.The event was co-hosted by FIU, Open Health Tools (OHT) \u2013 an open source community for Health IT and the American Academy of Family Physicians National Research Network. \u0026nbsp;Sponsored by Medicity, the GT Flatliners comprised Ph.D. student Klara Benda and master\u2019s students Adrian Courreges, Monosij Dutta-Roy and Hassan Khan. The NHIN Challenge asked teams to create innovative stylesheets to display the information in a Continuity of Care Document (CCD) to a primary care physician taking calls from patients after office hours. The idea is to develop a CCD visualization tool that facilitates an efficient and effective phone consultation between the on-call doctor and an unfamiliar patient. Not only did the solutions have to interpret and display data error-free; they also had to facilitate the most efficient use of the physician\u2019s time. The Flatliners, competing against professionals in the Health IT field, came up with the following solutions \u2013 a problem-based approach, a multi-context approach and a rapid-access approach:\u2022 Problem Oriented Approach (winner): arranged the clinical data by problem so that the physician could hone in on relevant information to the particular problem the patient is presenting.\u2022 Multi-Context Approach (second place): provided a highly flexible visual display that allows the physician to arrange information according to his or her particular \u0022mental model\u0022 for handling a particular problem.\u2022 Rapid Access Approach (third place): provided quick and easy direct navigation among all of the clinical areas in which data is stored in the CCD.\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EA team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). \u0026nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EA team of students from the College of Computing at Georgia Tech, calling themselves the Georgia Tech Flatliners, recently participated in, and took the first three prizes, at the National Health Information Network (NHIN) Code-a-thon Challenge held at Florida International University (FIU). \u0026nbsp;The Flatliners were enrolled in the Health Informatics class taught by HSI Associate Director, Mark Braunstein, MD, also a Professor of the Practice, in the College of Computing.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe event was co-hosted by FIU, Open Health Tools (OHT) \u2013 an open source community for Health IT and the American Academy of Family Physicians National Research Network. \u0026nbsp;Sponsored by Medicity, the GT Flatliners comprised Ph.D. student Klara Benda and master\u2019s students Adrian Courreges, Monosij Dutta-Roy and Hassan Khan. The NHIN Challenge asked teams to create innovative stylesheets to display the information in a Continuity of Care Document (CCD) to a primary care physician taking calls from patients after office hours. The idea is to develop a CCD visualization tool that facilitates an efficient and effective phone consultation between the on-call doctor and an unfamiliar patient. Not only did the solutions have to interpret and display data error-free; they also had to facilitate the most efficient use of the physician\u2019s time. The Flatliners, competing against professionals in the Health IT field, came up with the following solutions \u2013 a problem-based approach, a multi-context approach and a rapid-access approach:\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u2022 Problem Oriented Approach (winner): arranged the clinical data by problem so that the physician could hone in on relevant information to the particular problem the patient is presenting.\u003C\/p\u003E\u003Cp\u003E\u2022 Multi-Context Approach (second place): provided a highly flexible visual display that allows the physician to arrange information according to his or her particular \u0022mental model\u0022 for handling a particular problem.\u003C\/p\u003E\u003Cp\u003E\u2022 Rapid Access Approach (third place): provided quick and easy direct navigation among all of the clinical areas in which data is stored in the CCD.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/hit.fiu.edu\/challenge.htm\u0022 title=\u0022http:\/\/hit.fiu.edu\/challenge.htm\u0022\u003Ehttp:\/\/hit.fiu.edu\/challenge.htm\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/albums.phanfare.com\/isolated\/btHbwEHy\/1\/4656319#imageID=98661806\u0022 title=\u0022http:\/\/albums.phanfare.com\/isolated\/btHbwEHy\/1\/4656319#imageID=98661806\u0022\u003Ehttp:\/\/albums.phanfare.com\/isolated\/btHbwEHy\/1\/4656319#imageID=98661806\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-04-18 15:11:18","changed_gmt":"2016-10-08 02:24:27","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Ashleyville","field_article_url":"","publication_url":"http:\/\/www.gatech.edu\/newsroom\/release.html?nid=55581","dateline":{"date":"2010-05-11T00:00:00-04:00","iso_date":"2010-05-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"9259","name":"coding"},{"id":"2679","name":"it"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65091":{"#nid":"65091","#data":{"type":"external_news","title":"Spanish Authorities Bust 3 in Botnet Ring","body":[{"value":"\u003Cp\u003EThe Mariposa botnet had become one of the biggest weapons in cybercrime, infecting as many as 12.7 million PCs. With Georgia Tech\u0027s help, the Spanish government has arrested the ringleaders.\u0026nbsp;\u003Cem\u003ESource: Associated Press\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:37:16","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"management of technology and innovation","field_article_url":"","publication_url":"http:\/\/hosted.ap.org\/dynamic\/stories\/U\/US_TEC_BOTNET_BUSTED?CTIME=2010-03-02-14-26-32\u0026SECTION=HOME\u0026SITE=AP\u0026TEMPLATE=DEFAULT","dateline":{"date":"2010-03-04T00:00:00-05:00","iso_date":"2010-03-04T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65196":{"#nid":"65196","#data":{"type":"external_news","title":"Surround Vision Gives TV Viewers Off-Camera Window","body":[{"value":"\u003Cp\u003ESurround Video, which allows viewers to see off-camera action by pointing a smartphone beyond a TV screen, \u0022hits a balance between the capabilities of current technology and the long-term vision of immersive video,\u0022 says Blair MacIntyre (IC).\u0026nbsp;\u003Cem\u003ESource: NewScientist.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:50:30","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"mental health resources for coworkers","field_article_url":"","publication_url":"http:\/\/www.newscientist.com\/article\/dn18781-surround-vision-gives-tv-viewers-offcamera-window.html","dateline":{"date":"2010-04-15T00:00:00-04:00","iso_date":"2010-04-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1597","name":"Augmented Reality"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65092":{"#nid":"65092","#data":{"type":"external_news","title":"Accused Spanish Hackers Used a Kit","body":[{"value":"\u003Cp\u003EThe Mariposa botnet criminals, arrested this week in Spain with the help of the Georgia Tech Information Security Center, used a kit to build their botnet and would not need to be skilled hackers.\u0026nbsp;\u003Cem\u003ESource: CIO Today.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:39:55","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cio-today.com\/story.xhtml?full_skip=1\u0026story_id=71989","dateline":{"date":"2010-03-04T00:00:00-05:00","iso_date":"2010-03-04T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65197":{"#nid":"65197","#data":{"type":"external_news","title":"Telecomm Group Looking at Smartphone Security","body":[{"value":"\u003Cp\u003ETwo College of Computing research centers are working with the Telecommunications Industry Association to identify security standards for smartphones.\u0026nbsp;\u003Cem\u003ESource: TechJournal South\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:51:51","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Aditya Garg","field_article_url":"","publication_url":"http:\/\/www.techjournalsouth.com\/2010\/04\/telecommunications-standards-group-looking-at-smart-device-security\/","dateline":{"date":"2010-04-15T00:00:00-04:00","iso_date":"2010-04-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65093":{"#nid":"65093","#data":{"type":"external_news","title":"Accused Spanish Hackers Used a Kit","body":[{"value":"\u003Cp\u003EThe Mariposa botnet criminals, arrested this week in Spain with the help of the Georgia Tech Information Security Center, used a kit to build their botnet and would not need to be skilled hackers.\u0026nbsp;\u003Cem\u003ESource: CIO Today.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:41:36","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cio-today.com\/story.xhtml?full_skip=1\u0026story_id=71989","dateline":{"date":"2010-03-04T00:00:00-05:00","iso_date":"2010-03-04T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65094":{"#nid":"65094","#data":{"type":"external_news","title":"Monster Botnet Held 800K People\u0027s Details","body":[{"value":"\u003Cp\u003EA fourth \u0022zombie administrator\u0022 of the Mariposa botnet could be based in Venezuela, say the Spanish authorities who last week arrested three ringleaders with Georgia Tech\u0027s help.\u003Cem\u003ESource: The Register\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:42:54","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"yearlong program","field_article_url":"","publication_url":"http:\/\/www.theregister.co.uk\/2010\/03\/04\/mariposa_police_hunt_more_botherders\/","dateline":{"date":"2010-03-08T00:00:00-05:00","iso_date":"2010-03-08T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65095":{"#nid":"65095","#data":{"type":"external_news","title":"Is Chasing Cybercrooks Worth It?","body":[{"value":"\u003Cp\u003EGoing after the bad guys isn\u0027t the only way to take a bite out of cybercrime, says Mustaque Ahamad (CS). Remote monitoring of computers\u0027 anti-virus software is another valuable option.\u0026nbsp;\u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:44:41","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/edition.cnn.com\/2010\/TECH\/03\/05\/cyberattack.prosecute\/","dateline":{"date":"2010-03-08T00:00:00-05:00","iso_date":"2010-03-08T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65097":{"#nid":"65097","#data":{"type":"external_news","title":"An International Perspective on Service Robotics","body":[{"value":"\u003Cp\u003ESpeaking at International Expert Days in Lauffin, Germany, Henrik Christensen and Mike Stilman (IC) shared their ideas on service robotics, a U.S. robotics roadmap, humanoid robot motion and more.\u0026nbsp;\u003Cem\u003ESource: Everything Robotic\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:46:28","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"nineteeth century","field_article_url":"","publication_url":"http:\/\/everything-robotic.blogspot.com\/2010\/03\/contraindications-of-service-robotics.html","dateline":{"date":"2010-03-10T00:00:00-05:00","iso_date":"2010-03-10T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65152":{"#nid":"65152","#data":{"type":"external_news","title":"Online Threat Shuts Minneapolis School","body":[{"value":"\u003Cp\u003EThe Internet \u0022makes it easier for unskilled vandals to hide behind anonymity,\u0022 says Jon Giffin (CS). \u0022It\u0027s just the modern equivalent of someone calling in a bomb scare.\u0022\u0026nbsp;\u003Cem\u003ESource: TwinCities.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-24 14:36:41","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Tracking Aerosol Convection Interactions Experiment","field_article_url":"","publication_url":"http:\/\/www.twincities.com\/ci_14658322?nclick_check=1","dateline":{"date":"2010-03-13T00:00:00-05:00","iso_date":"2010-03-13T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"132","name":"Institute Leadership"}],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65154":{"#nid":"65154","#data":{"type":"external_news","title":"Tech Style: Wearable Computing Fashions","body":[{"value":"\u003Cp\u003EGraduate student Scott Gilliland (CS) talks about the tools and technology behind wearable computing in this Daily Planet video (see 4:07 mark).\u0026nbsp;\u003Cem\u003ESource: Discovery Channel\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-24 15:06:07","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Application Cycle","field_article_url":"","publication_url":"http:\/\/watch.discoverychannel.ca\/daily-planet\/march-2010\/daily-planet---march-03-2010\/#clip272477","dateline":{"date":"2010-03-15T00:00:00-04:00","iso_date":"2010-03-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65155":{"#nid":"65155","#data":{"type":"external_news","title":"Bill Could Restrict Funds for Nations Ignoring Cybercrime","body":[{"value":"\u003Cp\u003EA bipartisan Senate bill introduced this week is a key first step to prodding other nations to help fight a growing threat, says Sy Goodman (CS).\u0026nbsp;\u003Cem\u003ESource: SC Magazine\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-24 15:18:12","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Research on Careers in Science Lab","field_article_url":"","publication_url":"http:\/\/www.scmagazineus.com\/bill-could-restrict-funds-for-nations-ignoring-cybercrime\/article\/166449\/?utm_campaign=Feed%3A+SCMagazineNews+(SC+Magazine+News)\u0026utm_medium=feed\u0026utm_source=feedburner","dateline":{"date":"2010-03-25T00:00:00-04:00","iso_date":"2010-03-25T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65156":{"#nid":"65156","#data":{"type":"external_news","title":"\u0027LifeNet\u0027 Offers Improved Disaster Communications","body":[{"value":"\u003Cp\u003ESantosh Vempala (CS) talks about the development plans for LifeNet, an ad hoc networking solution scheduled for wider testing this summer.\u0026nbsp;\u003Cem\u003ESource: WABE\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-24 15:47:51","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"2022 benefits","field_article_url":"","publication_url":"http:\/\/www.publicbroadcasting.net\/wabe\/news.newsmain\/article\/0\/1\/1628449\/Atlanta\/","dateline":{"date":"2010-03-26T00:00:00-04:00","iso_date":"2010-03-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"7806","name":"computing for good"},{"id":"1144","name":"networking"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65157":{"#nid":"65157","#data":{"type":"external_news","title":"Toward a Private, Networked Life","body":[{"value":"\u003Cp\u003EThrough social media, today\u0027s teens share more of themselves than any generation before. Amy Bruckman (IC) says, in the long run, that could lead to more tolerance. Story in French.\u0026nbsp;\u003Cem\u003ESource: Le Monde\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-24 15:51:34","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Flex LED project","field_article_url":"","publication_url":"http:\/\/www.lemonde.fr\/technologies\/article\/2010\/03\/26\/vers-une-vie-privee-en-reseau_1324942_651865_1.html","dateline":{"date":"2010-03-26T00:00:00-04:00","iso_date":"2010-03-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"168898","name":"social network"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65186":{"#nid":"65186","#data":{"type":"external_news","title":"LifeNet Aims for Wireless Network Innovation","body":[{"value":"\u003Cp\u003EThe ad hoc system designed for disaster relief situations relies on a \u0022flexible routing\u0022 protocol to make devices both clients and routers, says Santosh Vempala (CS).\u0026nbsp;\u003Cem\u003ESource: Network World\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:20:26","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"korean speech-quiz contest","field_article_url":"","publication_url":"http:\/\/www.networkworld.com\/news\/2010\/032610-georgia-tech-lifenet.html?hpg1=bn","dateline":{"date":"2010-03-29T00:00:00-04:00","iso_date":"2010-03-29T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65189":{"#nid":"65189","#data":{"type":"external_news","title":"Creativity Explodes on Chatroulette","body":[{"value":"\u003Cp\u003EOne of the most interesting things about Chatroulette is the artistic directions people take with it, says Ph.D. candidate Sarita Yardi. \u0022You have an instant audience.\u0022\u0026nbsp;\u003Cem\u003ESource: Cnet.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:35:44","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/news.cnet.com\/8301-13772_3-20001226-52.html","dateline":{"date":"2010-03-29T00:00:00-04:00","iso_date":"2010-03-29T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65190":{"#nid":"65190","#data":{"type":"external_news","title":"Hackers Could Target Pacemakers","body":[{"value":"\u003Cp\u003EIf future devices will have enhanced security, planning needs to start now, says Mustaque Ahamad (CS). \u0022Most of the security researchers agree that security cannot be added on,\u0022 he said.\u0026nbsp;\u003Cem\u003ESource: ABCNews.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:38:14","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/abcnews.go.com\/Health\/HeartFailureNews\/security-experts-hackers-pacemakers\/story?id=10255194\u0026page=1","dateline":{"date":"2010-04-01T00:00:00-04:00","iso_date":"2010-04-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"8677","name":"health information technology"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65191":{"#nid":"65191","#data":{"type":"external_news","title":"Gaming Degrees Grow in Popularity, Application","body":[{"value":"\u003Cp\u003EGaming may drive research in the Augmented Environments Lab, but its director, Blair MacIntyre (IC), says there are many other important applications.\u0026nbsp;\u003Cem\u003ESource: NPR.org\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:40:20","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.npr.org\/templates\/player\/mediaPlayer.html?action=1\u0026id=125588087\u0026islist=false\u0026m=125594164\u0026t=1","dateline":{"date":"2010-04-06T00:00:00-04:00","iso_date":"2010-04-06T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65090":{"#nid":"65090","#data":{"type":"external_news","title":"GT Helps Spain Take Down Botnet","body":[{"value":"\u003Cp\u003EGeorgia Tech Information Security Center (GTISC) researchers helped Spanish authorities detect and dismantle a massive botnet network, called Mariposa, that infected computers linked to 13 million unique IP addresses.\u0026nbsp;\u003Cem\u003ESource: ComputerWorld\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-23 14:32:17","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Jill Gostin","field_article_url":"","publication_url":"http:\/\/www.computerworld.com\/s\/article\/9164838\/Spanish_police_take_down_massive_Mariposa_botnet?source=rss_news","dateline":{"date":"2010-03-03T00:00:00-05:00","iso_date":"2010-03-03T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"65194":{"#nid":"65194","#data":{"type":"external_news","title":"Are Robots Alive?","body":[{"value":"\u003Cp\u003E\u0022Some say robots are alive because they can have emergent intelligence,\u0022 says Ayanna Howard (IC). \u0022They can emerge behaviors and therefore ... they have semblance of being alive, just like people.\u0022\u0026nbsp;\u003Cem\u003ESource: Discovery News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-03-28 14:47:26","changed_gmt":"2016-10-08 02:24:24","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Delta Jacket","field_article_url":"","publication_url":"http:\/\/news.discovery.com\/tech\/are-robots-alive.html","dateline":{"date":"2010-04-09T00:00:00-04:00","iso_date":"2010-04-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62881":{"#nid":"62881","#data":{"type":"external_news","title":"Good Ideas Department?: Teaching Robots to Deceive","body":[{"value":"\u003Cp\u003EAlan Wagner (IC) discusses the how he helped teach robots to deceive \nand responds to questions about why robot deception is necessary.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:59:09","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"JAG","field_article_url":"","publication_url":"http:\/\/blogs.wsj.com\/digits\/2010\/10\/25\/good-ideas-department-teaching-robots-to-deceive\/","dateline":{"date":"2010-10-26T00:00:00-04:00","iso_date":"2010-10-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10604","name":"Deception"},{"id":"1356","name":"robot"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62883":{"#nid":"62883","#data":{"type":"external_news","title":"Robot teachers invade South Korean classrooms","body":[{"value":"\u003Cp\u003ESouth Korea is using telepresence robots to teach children English. \nTucker Balch (IC) comments that \u0022it may be better to have a telepresence\n robot from a highly skilled teacher than to have just an average \nteacher in the classroom.\u0022\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 17:01:22","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Gwendell Thomas","field_article_url":"","publication_url":"http:\/\/articles.cnn.com\/2010-10-22\/tech\/south.korea.robot.teachers_1_robot-english-teachers?_s=PM:TECH","dateline":{"date":"2010-10-26T00:00:00-04:00","iso_date":"2010-10-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"3050","name":"distance learning"},{"id":"1356","name":"robot"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62934":{"#nid":"62934","#data":{"type":"external_news","title":"Blood Simulation on Jaguar Takes Gordon Bell Prize","body":[{"value":"\u003Cp\u003EA team from Georgia Tech, NYU, and Oak Ridge National Lab used \n196,000 of Jaguar\u0027s 224,000 processor cores to simulate 200 million\n red blood cells and their interaction with plasma in the circulatory \nsystem.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-23 11:24:07","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Brett Aiello","field_article_url":"","publication_url":"http:\/\/www.hpcwire.com\/offthewire\/Blood-Simulation-on-Jaguar-Takes-Gordon-Bell-Prize-109907029.html","dateline":{"date":"2010-11-23T00:00:00-05:00","iso_date":"2010-11-23T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"11341","name":"Gordon Bell Prize"},{"id":"167322","name":"supercomputing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62900":{"#nid":"62900","#data":{"type":"external_news","title":"Nerdiness Turns Women Off to Computer Science","body":[{"value":"\u003Cp\u003EA new University of Washington study suggests that traditional \n\u0022nerdy\u0022 images of computer scientists, along with the paraphernalia that\n accompanies those images (think \u0022Star Trek\u0022), keep more women from \nentering the field. Mark Guzdial, professor in Interactive Computing and\n director of Georgia Computes!, agrees but says a little truth can \ndispel a lot of stereotypes. \u003Cem\u003ESource: Discovery.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2010-11-22 12:12:10","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/news.discovery.com\/human\/nerds-women-computer-science.html","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10469","name":"Mark Guzdial"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62884":{"#nid":"62884","#data":{"type":"external_news","title":"Supercomputing Meets Social Media","body":[{"value":"\u003Cp\u003EGraphCT, software developed by Georgia Tech\u0027s David Bader (CSE), uses\n a super computer to map the twitter network data to a graph and uses \nmetrics to assign importance to interactions. This allows us to see the \nimpact and significance of tweets. \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 17:03:40","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Brett Aiello","field_article_url":"","publication_url":"http:\/\/www.hpcwire.com\/blogs\/Supercomputing-Meets-Social-Media-105493293.html","dateline":{"date":"2010-10-26T00:00:00-04:00","iso_date":"2010-10-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"167325","name":"supercomputer"},{"id":"11053","name":"tweets"},{"id":"314","name":"twitter"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62953":{"#nid":"62953","#data":{"type":"external_news","title":"Study Groups Move Online, Attract Students Worldwide","body":[{"value":"\u003Cp\u003E\u0022We are empowering the student community to take care of itself,\u0022 says Ashwin Ram (\u003Cem\u003EInteractive Computing\u003C\/em\u003E), co-founder of OpenStudy, which provides 350 online study groups for independent learners around the globe. \u003Cem\u003ESource: AJC.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-11-23 21:13:15","changed_gmt":"2016-10-08 02:24:15","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.ajc.com\/news\/atlanta\/study-groups-move-online-752264.html","dateline":{"date":"2010-11-23T00:00:00-05:00","iso_date":"2010-11-23T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62902":{"#nid":"62902","#data":{"type":"external_news","title":"Wanted: \u0027Cyber Ninjas\u0027","body":[{"value":"\u003Cp\u003EComputer security is one of the hottest job fields around right now, \nwith demand for trained experts exceeding current supply. The College of\n Computing\u0027s online master\u0027s program in information security is intended\n to meet the world\u0027s growing call for \u0022cyber ninjas.\u0022 \u003Cem\u003ESource: The New York Times\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2010-11-22 12:14:51","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Extension of Self","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/01\/03\/education\/edlife\/03cybersecurity.html","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62885":{"#nid":"62885","#data":{"type":"external_news","title":"Supercomputer Digests Twitter in Real-Time","body":[{"value":"\u003Cp\u003EA supercomputer, the 128-CPU Cray XMT, using custom software \nco-created by David Bader (CSE) can digest an entire day\u0027s worth of \ntwitter feeds in under an hour. \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 17:10:23","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"CREST D-Map","field_article_url":"","publication_url":"http:\/\/www.technologyreview.com\/blog\/mimssbits\/25913\/?ref=rss","dateline":{"date":"2010-10-26T00:00:00-04:00","iso_date":"2010-10-26T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"167325","name":"supercomputer"},{"id":"314","name":"twitter"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63061":{"#nid":"63061","#data":{"type":"external_news","title":"New Supercomputer Criteria","body":[{"value":"\u003Cp\u003EDavid Bader \u003Cem\u003E(CompSci \u0026amp; Eng)\u003C\/em\u003E and colleagues helped create a\n set of new benchmarks, called Graph500, to clock supercomputing speeds,\n but owners of some of the world\u2019s fastest machines are balking at the \nnew tests.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-12-03 16:49:26","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"ISyE Graduate Rankings","field_article_url":"","publication_url":"http:\/\/www.mb.com.ph\/articles\/289193\/when-being-nice-doesnt-pay","dateline":{"date":"2010-11-29T00:00:00-05:00","iso_date":"2010-11-29T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"167322","name":"supercomputing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62903":{"#nid":"62903","#data":{"type":"external_news","title":"Augmented Reality: Nearly But Not Quite","body":[{"value":"\u003Cp\u003EWhile a wave of AR apps has appeared for iPhone and Google Android, \naugmented reality currently is limited by the precision of its GPS \ntechnology. Blair MacIntyre, associate professor and director of the \nAugmented Environments Lab in Interactive Computing, suggests \ncrowdsourcing as the solution for AR\u0027s geo-locational shortcomings. \u003Cem\u003ESource: Orange-Business.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2010-11-22 12:17:00","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Kashlan triplets","field_article_url":"","publication_url":"http:\/\/www.orange-business.com\/en\/mnc2\/footer\/news\/enterprise_briefing\/december2009\/new-analysis.jsp","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1600","name":"Blair MacIntrye"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62880":{"#nid":"62880","#data":{"type":"external_news","title":"Technology Said To Thwart Voice Phishing Scams","body":[{"value":"\u003Cp\u003E Vijay Balasubramaniyan (CS) comments on how the voice authentication technology VoIP can identify trusted callers.\u003Cem\u003E\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:57:08","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Anh-Vu Pham","field_article_url":"","publication_url":"http:\/\/www.eetimes.com\/electronics-news\/4210106\/Technology-said-to-thwart-voice-phishing-scams","dateline":{"date":"2010-10-27T00:00:00-04:00","iso_date":"2010-10-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"11078","name":"telephone scammers"},{"id":"2685","name":"voip"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63062":{"#nid":"63062","#data":{"type":"external_news","title":"War Machines: Recruiting Robots for Combat","body":[{"value":"\u003Cp\u003ERon Arkin \u003Cem\u003E(Interactive Computing)\u003C\/em\u003E comments on researchers\u2019 \nability to create ethical robots that conform to the laws of war and the\n military rules of escalation.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-12-03 16:50:44","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Would never be part of any organization that would have me as a member","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/11\/28\/science\/28robot.html?_r=2","dateline":{"date":"2010-11-29T00:00:00-05:00","iso_date":"2010-11-29T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1496","name":"Ethics"},{"id":"525","name":"military"},{"id":"2352","name":"robots"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62904":{"#nid":"62904","#data":{"type":"external_news","title":"The Future of Brain-Controlled Devices","body":[{"value":"\u003Cp\u003EIn the hit movie \u0022Avatar,\u0022 a paraplegic Marine finds his legs again \nthrough a chamber that links his brain directly to a surrogate alien via\n computer. Science fiction? Perhaps, but direct brain interfaces are \nbecoming more sophisticated every day. \u0022We don\u0027t know what the limits \nare yet,\u0022 says Melody Moore Jackson, associate professor and director of\n the BrainLab in Interactive Computing. \u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2010-11-22 12:27:04","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/2009\/TECH\/12\/30\/brain.controlled.computers\/index.html","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10480","name":"Melody Moore Jackson"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63063":{"#nid":"63063","#data":{"type":"external_news","title":"New Social Software Tries to Make Studying Feel Like Facebook","body":[{"value":"\u003Cp\u003EGeorgia Tech and Emory\u0027s OpenStudy is termed the \u0022Match.com\u0022 of the \nonline study world, but some worry what may happen to the popularity of \nthe site, if students cannot find a date. \u003Ca title=\u0022OpenStudy\u0022 href=\u0022http:\/\/www.youtube.com\/watch?v=IeLDJkCzCiY\u0022 target=\u0022_blank\u0022\u003EAswin Ram (\u003Cem\u003EInteractive Computing\u003C\/em\u003E) discusses why students use OpenStudy\u003C\/a\u003E.\u003Cem\u003E \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-12-03 16:56:30","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"wiggling robots","field_article_url":"","publication_url":"http:\/\/chronicle.com\/article\/New-Social-Software-Tries-to\/125542\/","dateline":{"date":"2010-11-29T00:00:00-05:00","iso_date":"2010-11-29T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"11113","name":"OpenStudy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62905":{"#nid":"62905","#data":{"type":"external_news","title":"A Robot Named Shimon Wants To Jam With You","body":[{"value":"\u003Cp\u003ELast month, an improvisational jazz musician named Shimon hooked up \nto jam online with some iPhone-wielding Japanese through an application \ncalled ZoozBeat. Shimon, by the way, is a robot. He\u0027s programmed to \nimprovise in the style of jazz great Thelonious Monk, says creator Gil \nWeinberg, adjunct associate professor in Interactive Computing. \u003Cem\u003ESource: NPR.org\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2010-11-22 12:31:58","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.npr.org\/templates\/story\/story.php?f=2\u0026ft=1\u0026storyId=121763193\u0026utm_campaign=Feed%3A+NprProgramsATC+(NPR+Programs%3A+All+Things+Considered)\u0026utm_medium=feed\u0026utm_source=feedburner","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1939","name":"Gil Weinberg"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63064":{"#nid":"63064","#data":{"type":"external_news","title":"Point-Counterpoint: Learning with Social Media","body":[{"value":"\u003Cp\u003ECombining social media with learning, using sites like OpenStudy, \nincreases students\u0027 level of engagement by allowing them to interact \nmore with the material and other students.\u003Cem\u003E \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-12-03 16:59:31","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"all of whom have significant administrative experience on top of their scholarly accomplishments. Bhatti was nominated by senior leadership for this intensive","field_article_url":"","publication_url":"http:\/\/www.theramonline.com\/news\/point-counterpoint-learning-with-social-media-1.2419170","dateline":{"date":"2010-12-02T00:00:00-05:00","iso_date":"2010-12-02T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63399":{"#nid":"63399","#data":{"type":"external_news","title":"Robots to Shape Wars of Future","body":[{"value":"\u003Cp\u003EMr. Spock can relate to certain advantages of having robots in the \ncombat zone: They are free of human emotion, which can distort judgment,\n and they don\u0027t express anger or frustration. But Ron Arkin, Regents\u0027 \nProfessor and director of the Mobile Robot Laboratory in Interactive \nComputing, envisions robots designed with some capabilities\u2014if not \nexactly feelings\u2014that would be constructive: Remorse, compassion, and \nyes, guilt. \u003Cem\u003ESource: USA Today\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 14:22:08","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"sustainable fuels","field_article_url":"","publication_url":"http:\/\/www.usatoday.com\/tech\/science\/2009-12-28-robot-weapons-guilt_N.htm","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"11106","name":"Ronald Arkin"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63078":{"#nid":"63078","#data":{"type":"external_news","title":"Arrest Made In Vegas May Rid The World of One-Third of All Spam","body":[{"value":"\u003Cp\u003ENick Feamster \u003Cem\u003E(Computer Science)\u003C\/em\u003E comments on the botnet named \nMega D, and how even though the creator of the botnet is in authorities \nhands, Mega D may still be alive and well. (audio story)\u0026nbsp;\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-12-07 10:48:37","changed_gmt":"2016-10-08 02:24:15","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"comedians","field_article_url":"","publication_url":"http:\/\/marketplace.publicradio.org\/display\/web\/2010\/12\/06\/tech-report-arrest-made-in-vegas\/?refid=0","dateline":{"date":"2010-12-07T00:00:00-05:00","iso_date":"2010-12-07T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10838","name":"botnets"},{"id":"168881","name":"spam"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63400":{"#nid":"63400","#data":{"type":"external_news","title":"Damage Control","body":[{"value":"\u003Cp\u003EOf all the security responsibilities facing the campus IT team, \nhandheld-device security may be the most difficult. Since mobile malware\n and other threats were cited as the top IT security concerns by the \n\u0022Emerging Cyber Threats Report for 2009,\u0022 published by the Georgia Tech \nInformation Security Center, smartphones have only become more \nubiquitous as conveniences--and targets. \u003Cem\u003ESource: CampusTechnology.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 14:27:39","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"emma bivings","field_article_url":"","publication_url":"http:\/\/campustechnology.com\/articles\/2010\/01\/01\/damage-control.aspx","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63258":{"#nid":"63258","#data":{"type":"external_news","title":"Kinect Hacks: American Sign Language Recognition","body":[{"value":"\u003Cp\u003EResearcher in Thad Starner\u0027s (\u003Cem\u003EInteractive Computing\u003C\/em\u003E) lab have paired up Microsoft\u0027s Kinect device with custom software that enables the Kinect to interpret a limited American Sign Language vocabulary with greater than 98 percent accuracy. \u003Cem\u003ESource: Joystiq.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-12-21 14:18:57","changed_gmt":"2016-10-08 02:24:15","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"female leader","field_article_url":"","publication_url":"http:\/\/www.joystiq.com\/2010\/12\/20\/kinect-hacks-american-sign-language-recognition\/","dateline":{"date":"2010-12-21T00:00:00-05:00","iso_date":"2010-12-21T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63294":{"#nid":"63294","#data":{"type":"external_news","title":"What Should a 21st Century University Look Like?","body":[{"value":"\u003Cp\u003E\u201cThe driving idea ... is to take a 100-year view of what universities will be like in the 21st century,\u201d says Rich DeMillo, former College of Computing dean and director of the new Center for 21st Century Universities. \u003Cem\u003ESource: Converge.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-12-22 15:05:30","changed_gmt":"2016-10-08 02:24:15","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"StartProto","field_article_url":"","publication_url":"http:\/\/www.convergemag.com\/policy\/Center-for-21st-Century-Universities.html","dateline":{"date":"2010-12-22T00:00:00-05:00","iso_date":"2010-12-22T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"6932","name":"educational research"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63297":{"#nid":"63297","#data":{"type":"external_news","title":"The Coming Wave of Augmented Reality","body":[{"value":"\u003Cp\u003EThe software\u0027s ready. The hardware\u0027s ready. And now the infrastructure is preparing for an impending boom in AR applications. Blair MacIntyre (\u003Cem\u003EInteractive Computing\u003C\/em\u003E), director of the Augmented Environments Lab, is ready to catch the wave (audio story). \u003Cem\u003ESource: American Public Radio\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-12-23 11:39:45","changed_gmt":"2016-10-08 02:24:15","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"Kristen Mahaver","field_article_url":"","publication_url":"http:\/\/marketplace.publicradio.org\/display\/web\/2010\/12\/22\/tech-report-the-coming-wave-of-augmented-reality\/","dateline":{"date":"2010-12-23T00:00:00-05:00","iso_date":"2010-12-23T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1597","name":"Augmented Reality"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63401":{"#nid":"63401","#data":{"type":"external_news","title":"Teach Students To Compute For Good","body":[{"value":"\u003Cp\u003E\u0022As an educator and a scientist, I believe we must foster the \naltruistic side of students and use computer science as a cutting-edge \ndiscipline to tackle real issues that affect all walks of life and from \nall corners of the globe,\u0022 writes Santosh Vempala, Distinguished \nProfessor in Computer Science, in an opinion essay about the College of \nComputing\u0027s \u0022Computing for Good\u0022 initiative. \u003Cem\u003ESource: AJC.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 14:51:22","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.ajc.com\/opinion\/teach-students-to-compute-267899.html","dateline":{"date":"2010-01-06T00:00:00-05:00","iso_date":"2010-01-06T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63402":{"#nid":"63402","#data":{"type":"external_news","title":"The Year in Robotics","body":[{"value":"\u003Cp\u003EAndrea Thomaz, assistant professor in Interactive Computing, was \nnamed one of 2009\u0027s top young innovators by Technology Review for her \nwork in creating robots with social skills, which can enable humans to \nteach the robots new information and skills through interaction rather \nthan simply programming. \u003Cem\u003ESource: TechnologyReview\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 15:44:47","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Switched Inductor Power IC Design","field_article_url":"","publication_url":"http:\/\/www.technologyreview.com\/computing\/24231\/?a=f","dateline":{"date":"2010-01-14T00:00:00-05:00","iso_date":"2010-01-14T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"11526","name":"Andrea Thomaz"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"63403":{"#nid":"63403","#data":{"type":"external_news","title":"Sampling Smiles In 206 Nations, 1 Year","body":[{"value":"\u003Cp\u003ECoca-Cola\u0027s new social media campaign, \u0022Open Happiness,\u0022 dispatches \n\u0022Happiness Ambassadors\u0022 around the world to everywhere Coke is sold, \nwith the mission to document what makes people happy. The company\u0027s goal\n is to generate buzz in social media like Twitter and Facebook (and, in \nturn, sell more Coke). But Amy Bruckman, associate professor in \nInteractive Computing, wonders if happiness is enough of a hook to lure \npeople in. \u003Cem\u003ESource: AJC.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 15:46:42","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.ajc.com\/search\/content\/printedition\/2010\/01\/17\/happy01171.html","dateline":{"date":"2010-01-19T00:00:00-05:00","iso_date":"2010-01-19T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"8472","name":"amy bruckman"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62868":{"#nid":"62868","#data":{"type":"external_news","title":"Search Engine Bridges Language Barrier","body":[{"value":"\u003Cp\u003ESteven Crain \u003Cem\u003E(Computer Science)\u003C\/em\u003E talks about diaTM, a \nmachine-learning model that learns the vernacular of the users and \napplies it to other more technical words to provide better search \nresults for medical terminology. \u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:26:30","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Judith Priddy","field_article_url":"","publication_url":"http:\/\/www.mediapost.com\/publications\/?art_aid=139694\u0026fa=Articles.showArticle","dateline":{"date":"2010-11-18T00:00:00-05:00","iso_date":"2010-11-18T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"9167","name":"machine learning"},{"id":"168883","name":"search engine optimization"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62876":{"#nid":"62876","#data":{"type":"external_news","title":"Super Accurate Video Games","body":[{"value":"\u003Cp\u003EKaren Liu (IC) explains how the new technology currently being worked\n on at Georgia Tech will change the way video gamers interact with their\n characters. Activate 3D allows you to use just your body movements to \nhave total control over your character. (video story)\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:46:07","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"McMillan Street","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/video","dateline":{"date":"2010-11-01T00:00:00-04:00","iso_date":"2010-11-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"3217","name":"video game"},{"id":"5875","name":"video game environments"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62877":{"#nid":"62877","#data":{"type":"external_news","title":"OpenStudy. The Match.com of Student Study Help","body":[{"value":"\u003Cp\u003EAshwin Ram (IC), Preetha Ram, and Chris Sprague (CS) created \nOpenStudy, a social networking site that connects you to students \nstudying the same subject as you that can help you study anytime you \nneed it.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:48:53","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Andrew McAvoy","field_article_url":"","publication_url":"http:\/\/thenextweb.com\/apps\/2010\/10\/28\/openstudy-the-match-com-of-student-study-help\/","dateline":{"date":"2010-11-01T00:00:00-04:00","iso_date":"2010-11-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"11113","name":"OpenStudy"},{"id":"167296","name":"social networking"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62878":{"#nid":"62878","#data":{"type":"external_news","title":"Lose Weight and Stay Healthy with Usable Health","body":[{"value":"\u003Cp\u003EUsable Health, co-founded by Jiten Chhabra (IC),\u0026nbsp; is a program that \ncan be customized to help you achieve your health goals, whether it\u0027s to\n lose weight, gain muscle, or just eat healthier.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:51:28","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Andrew McAvoy","field_article_url":"","publication_url":"http:\/\/thenextweb.com\/apps\/2010\/10\/27\/usable-health-make-better-food-choices-lose-weight-stay-healthy\/","dateline":{"date":"2010-11-01T00:00:00-04:00","iso_date":"2010-11-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"398","name":"health"},{"id":"11112","name":"lose weight"},{"id":"11111","name":"usable health"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62530":{"#nid":"62530","#data":{"type":"external_news","title":"Can Twitter Predict the Market?","body":[{"value":"\u003Cp\u003EBased on a study he did at the University of Illinois, Eric Gilbert (Interactive Computing) says Twitter posts can serve as \u0022something like a consumer confidence index for the digital age.\u0022 \u003Cem\u003ESource: SmartMoney\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-11-03 15:20:03","changed_gmt":"2016-10-08 02:24:12","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"behavioral sciences","field_article_url":"","publication_url":"http:\/\/www.smartmoney.com\/investing\/stocks\/can-twitter-predict-the-market\/","dateline":{"date":"2010-11-03T00:00:00-04:00","iso_date":"2010-11-03T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62567":{"#nid":"62567","#data":{"type":"external_news","title":"Showtime for OpenFlow at GENI advanced networking project event","body":[{"value":"\u003Cp\u003ENick Feamster and Russ Clark (both Computer Science) demonstrated \nlimited release versions of NEC\u0027s ProgrammableFlow multilayer switches \nat the GENI Engineering Conference (GEC9) in Washington, D.C. \u003Cem\u003ESource: Network World\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27154","created_gmt":"2010-11-05 12:09:49","changed_gmt":"2016-10-08 02:24:12","author":"Louise Russo","boilerplate_text":"","field_publication":"","publication":"korean speech-quiz contest","field_article_url":"","publication_url":"http:\/\/www.networkworld.com\/community\/node\/68221?hpg1=bn","dateline":{"date":"2010-11-05T00:00:00-04:00","iso_date":"2010-11-05T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10637","name":"nick feamster"},{"id":"11167","name":"Russ Clark"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62873":{"#nid":"62873","#data":{"type":"external_news","title":"Georgia Tech Security Summit Determines Primary Threats","body":[{"value":"\u003Cp\u003EMustaque Ahamad, director of Georgia Tech Information Security \nCenter, comments on the security issues that are the three greatest \nthreats according to the Emerging   Cyber Threats Report for 2011.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:38:40","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"affect theory","field_article_url":"","publication_url":"http:\/\/www.processor.com\/editorial\/article.asp?article=articles%2Fp3223%2F43p23%2F163923.asp\u0026guid=A4480045B5154A73B68B74735C6E6AF0\u0026searchtype=\u0026WordList=\u0026bJumpTo=True","dateline":{"date":"2010-11-08T00:00:00-05:00","iso_date":"2010-11-08T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62874":{"#nid":"62874","#data":{"type":"external_news","title":"Phone Apps Aim to Fight Harassment","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s doctoral candidate Jill Dimond (Human-Centered \nComputing) creates an Android application for Hollaback, a group that \nencourages women to report harassment immediately in order to alert \nothers and help police find the offenders.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:41:22","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Extension of Self","field_article_url":"","publication_url":"http:\/\/www.nytimes.com\/2010\/11\/08\/nyregion\/08hollaback.html?_r=1\u0026ref=nyregion","dateline":{"date":"2010-11-08T00:00:00-05:00","iso_date":"2010-11-08T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"4093","name":"harassment"},{"id":"168884","name":"smart phone applications"},{"id":"11195","name":"women\u0027s rights"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62872":{"#nid":"62872","#data":{"type":"external_news","title":"DARPA Begins Funding Plans That Are To Lead To An Exaflop Supercomputer In 2018","body":[{"value":"\u003Cp\u003EDavid\n Bader (Comp Sci \u0026amp; Eng) is working with NVIDIA Corp.\u0026nbsp; and the \nGeorgia Tech Research Institute to provide expertise to develop the next\n generation of extreme scale supercomputers.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:36:59","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"ossoff","field_article_url":"","publication_url":"http:\/\/nextbigfuture.com\/2010\/11\/darpa-begins-funding-plans-that-are-to.html","dateline":{"date":"2010-11-09T00:00:00-05:00","iso_date":"2010-11-09T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"167325","name":"supercomputer"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62871":{"#nid":"62871","#data":{"type":"external_news","title":"Robot Musician Jams with Humans","body":[{"value":"\u003Cp\u003EShimon, a robotic musician created by Gil Weinberg (\u003Cem\u003EInteractive Computing\u003C\/em\u003E), jams with human musicians at the USA Science and Engineering festival in Washington DC. (video story) \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:32:04","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.newscientist.com\/blogs\/nstv\/2010\/11\/robot-musician-jams-with-humans.html","dateline":{"date":"2010-11-12T00:00:00-05:00","iso_date":"2010-11-12T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1180","name":"Music"},{"id":"1356","name":"robot"},{"id":"11252","name":"robotic human interaction"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62265":{"#nid":"62265","#data":{"type":"external_news","title":"Augmented Reality Technology Fuses Physical \u0026 Virtual","body":[{"value":"\u003Cp\u003EAugmented reality apps don\u0027t need to stop at games or entertainment, says Blair MacIntyre (IC). \u201cIf you\u2019re teaching physics,\u0022 he says, \u0022why not build a little interactive 3-D physics simulation?\u0022 \u003Cem\u003ESource: San Diego Union-Tribune\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-19 14:07:39","changed_gmt":"2016-10-08 02:24:12","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"Military Graduate Research Assistant","field_article_url":"","publication_url":"http:\/\/www.signonsandiego.com\/news\/2010\/oct\/18\/technology-fuses-physical-and-virtual\/","dateline":{"date":"2010-10-19T00:00:00-04:00","iso_date":"2010-10-19T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62870":{"#nid":"62870","#data":{"type":"external_news","title":"The Deceitful Robot","body":[{"value":"\u003Cp\u003ETime Magazine names Alan Wagner (\u003Cem\u003EInteractive Computing\u003C\/em\u003E) and Ron Arkin\u0027s (\u003Cem\u003EInteractive Computing\u003C\/em\u003E) deceptive robot one of the 50 best inventions of 2010.\u0026nbsp;\u003Cem\u003E \u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:29:49","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"2023 U.S. News \u0026 World Report Best Colleges","field_article_url":"","publication_url":"http:\/\/www.time.com\/time\/specials\/packages\/article\/0,28804,2029497_2030615,00.html","dateline":{"date":"2010-11-15T00:00:00-05:00","iso_date":"2010-11-15T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10604","name":"Deception"},{"id":"1356","name":"robot"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62266":{"#nid":"62266","#data":{"type":"external_news","title":"Bruckman Says Facebook Not Designed for Privacy","body":[{"value":"\u003Cp\u003EAmy Bruckman (IC), a Farmville player herself, says removing your birthday from Facebook could prevent you from being an easy target for identity thieves (video). \u003Cem\u003ESource: Fox 5 Atlanta\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-19 14:08:53","changed_gmt":"2016-10-08 02:24:12","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"GAANN Fellows","field_article_url":"","publication_url":"http:\/\/www.myfoxatlanta.com\/dpp\/news\/facebook-says-apps-transmitted-user-information-101810","dateline":{"date":"2010-10-19T00:00:00-04:00","iso_date":"2010-10-19T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62869":{"#nid":"62869","#data":{"type":"external_news","title":"University Researchers Develop New Technology To Trace Fraudulent Voice Calls","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s Mustaque Ahamad (\u003Cem\u003EComputer Science\u003C\/em\u003E) and Patrick Traynor (\u003Cem\u003EComputer Science)\u003C\/em\u003E discuss PinDr0p, and how it\u0027s helping create a truly trustworthy caller ID.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-11-19 16:28:14","changed_gmt":"2016-10-08 02:24:12","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Career Educator","field_article_url":"","publication_url":"http:\/\/www.darkreading.com\/vulnerability_management\/security\/client\/showArticle.jhtml;jsessionid=OXI3SM0WFWHLHQE1GHPSKHWATMY32JVN?articleID=227700279","dateline":{"date":"2010-11-17T00:00:00-05:00","iso_date":"2010-11-17T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"11291","name":"PinDr0p"},{"id":"11078","name":"telephone scammers"},{"id":"3197","name":"Voice Over Internet Protocal"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62267":{"#nid":"62267","#data":{"type":"external_news","title":"Your Secrets Embedded in Smart Phone Pics","body":[{"value":"\u003Cp\u003EThink twice before uploading that picture from your phone to Facebook, says Blair MacIntyre (IC). Because smartphone pics contain geotags, bad guys (the smart ones, at least) could use them to track down where you live. \u003Cem\u003ESource: CBS Atlanta\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-19 14:10:13","changed_gmt":"2016-10-08 02:24:12","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cbsatlanta.com\/consumer\/25432580\/detail.html","dateline":{"date":"2010-10-19T00:00:00-04:00","iso_date":"2010-10-19T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"2678","name":"information security"},{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61005":{"#nid":"61005","#data":{"type":"external_news","title":"6 Game Design Schools to Watch","body":[{"value":"\u003Cp\u003EEven if the classes are hardcore technical, the College of Computing\u0027s Computational Media major is a program that will make you think outside the box when it comes to game design. \u003Cem\u003ESource: GamePro.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-09-16 10:00:47","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"Henry Stommel Award","field_article_url":"","publication_url":"http:\/\/www.gamepro.com\/article\/features\/216448\/6-game-design-schools-to-watch\/","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10013","name":"computational media"},{"id":"10658","name":"game design"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61417":{"#nid":"61417","#data":{"type":"external_news","title":"Yevgeniy Medynskiy (IC) introduces Salud! an online application that can not only track calories, but also other things such as","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s Mustaque Ahamad (CS) comments on the dangers of\nbotnets and how it can be more effective to hunt them at the network\nlevel.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-04 18:33:55","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Would never be part of any organization that would have me as a member","field_article_url":"","publication_url":"http:\/\/gadgetwise.blogs.nytimes.com\/2010\/09\/30\/comcast-to-monitor-customer-computers-for-malware\/?ei=5040\u0026partner=MOREOVERNEWS","dateline":{"date":"2010-10-04T00:00:00-04:00","iso_date":"2010-10-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10838","name":"botnets"},{"id":"7772","name":"malware"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61006":{"#nid":"61006","#data":{"type":"external_news","title":"Robots Taught How to Deceive","body":[{"value":"\u003Cp\u003E\u0022We have been concerned from the very beginning with the ethical implications,\u0022 says Ron Arkin (IC). \u0022We strongly encourage discussion about the appropriateness of deceptive robots.\u0022 \u003Cem\u003ESource: Wired UK\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-09-16 10:02:13","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"tri-gate transistor","field_article_url":"","publication_url":"http:\/\/www.wired.co.uk\/news\/archive\/2010-09\/13\/robots-taught-how-to-deceive","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"667","name":"robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61495":{"#nid":"61495","#data":{"type":"external_news","title":"GTRI Creates Cyber Technology and Information Security Laboratory","body":[{"value":"\u003Cp\u003EMustaque Ahamad (CS) discusses how GTISC is working together with\nGTRI to create cyber security solutions for real world problems.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-06 14:05:31","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"impacting the state","field_article_url":"","publication_url":"http:\/\/www.military-technologies.net\/2010\/10\/04\/gtri-creates-cyber-technology-and-information-security-laboratory\/","dateline":{"date":"2010-10-05T00:00:00-04:00","iso_date":"2010-10-05T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61007":{"#nid":"61007","#data":{"type":"external_news","title":"Glove Helps You Play Piano Like a Pro","body":[{"value":"\u003Cp\u003EThad Starner (IC) appears live on CNN to demonstrate his computerized glove that teaches wearers simple piano licks by delivering electrical impulses to the appropriate fingers to indicate which notes to play (video segment). \u003Cem\u003ESource: CNN.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-09-16 10:03:43","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"McMillan Street","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/video\/?\/video\/tech\/2010\/09\/15\/nr.big.i.music.touch.cnn","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"9766","name":"ubiquitous computing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61496":{"#nid":"61496","#data":{"type":"external_news","title":"Are Pencils a Thing of the Past?","body":[{"value":"\u003Cp\u003ETeachers are incorporating the latest technology to educate\nstudents, among these; teachers are suggesting Georgia Tech\u0027s OpenStudy\nas a study resource that expands beyond the borders of their own\nschools.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-06 14:08:41","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"early admit 2","field_article_url":"","publication_url":"http:\/\/liveshots.blogs.foxnews.com\/2010\/10\/02\/are-pencils-a-thing-of-the-past\/","dateline":{"date":"2010-10-05T00:00:00-04:00","iso_date":"2010-10-05T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61020":{"#nid":"61020","#data":{"type":"external_news","title":"Lebanon Says Google Search Manipulation Not Surprising","body":[{"value":"\u003Cp\u003EGuy Lebanon (CSE) says he\u0027s not surprised that an Atlanta PR firm\u0027s \nattempt to influence Google\u0027s search engine in connection with the state\n gubernatorial race was successful. Lebanon writes about the topic on \nhis \u003Ca href=\u0022http:\/\/smlv.cc.gatech.edu\/2010\/09\/16\/google-instant-and-new-avenues-for-search-engine-optimization\/\u0022\u003Eblog\u003C\/a\u003E.\n \u003Cem\u003ESource: AJC.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-16 14:29:55","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/blogs.ajc.com\/political-insider-jim-galloway\/2010\/09\/15\/seth-persilys-private-war-on-nathan-deals-reputation\/","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"168879","name":"search engine"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61497":{"#nid":"61497","#data":{"type":"external_news","title":"Cable Provider Issues Bad Bot Alerts","body":[{"value":"\u003Cp\u003EComcast is sending out bot alerts to customers in an effort to\nreduce the malicious programs on their servers. The Information\nSecurity Center at Georgia Tech estimates that the number of bot\ninfected computers could be in the tens to hundreds of millions.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-06 14:10:59","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Anglel Cabrera","field_article_url":"","publication_url":"http:\/\/www.technewsdaily.com\/cable-provider-issues-bad-bot-alerts-1366\/","dateline":{"date":"2010-10-05T00:00:00-04:00","iso_date":"2010-10-05T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"9223","name":"computer security"},{"id":"7772","name":"malware"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61021":{"#nid":"61021","#data":{"type":"external_news","title":"Researchers Turn Home Electrical Wiring Into Antenna for Sensor","body":[{"value":"\u003Cp\u003EA joint Georgia Tech-University of Washington study, led by Gregory \nAbowd\u0027s (IC) former Ph.D. student Shwetak Patel, showed that residential\n wiring can be used to transmit \ninformation to and from almost anywhere else from within. \u003Cem\u003ESource: \nInternational Business Times\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-16 14:32:28","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"dancing in odessa","field_article_url":"","publication_url":"http:\/\/www.ibtimes.com\/articles\/62678\/20100915\/sensing-wireless-devices-electrical-wiring-innovation-university-of-washington-snupi.htm","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"9766","name":"ubiquitous computing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62149":{"#nid":"62149","#data":{"type":"external_news","title":"Smartphones, Twitter, Facebook Face Emerging Cyber Threats","body":[{"value":"\u003Cp\u003EDiscusses the new cyber threat report from the Georgia Tech Information Security Center (GTISC) and what it means to mobile and social network users.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 09:44:32","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"dancing in odessa","field_article_url":"","publication_url":"http:\/\/uk.ibtimes.com\/articles\/70126\/20101008\/smartphones-twitter-facebook-bing-google-social-networking-orkut-adobe-microsoft-windows-ios-android.htm","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10838","name":"botnets"},{"id":"345","name":"cyber security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61022":{"#nid":"61022","#data":{"type":"external_news","title":"To Text or Not to Text During Emergencies","body":[{"value":"\u003Cp\u003ETexting during an emergency is similar to trying to enter an \neight-lane superhighway from a one-lane dirt-road entrance ramp, says \nPatrick Traynor (CS). \u0022The capacity to deliver that amount of critical \nmessages to one confined area simply doesn\u0027t exist.\u0022 \u003Cem\u003ESource: \nNextGov.com\u003C\/em\u003E \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-16 14:34:40","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.nextgov.com\/nextgov\/ng_20100914_5986.php?oref=topnews","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"2317","name":"crisis communications"},{"id":"168880","name":"SMS capabilities"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62151":{"#nid":"62151","#data":{"type":"external_news","title":"New Tool Blocks Downloads From Malicious Sites","body":[{"value":"\u003Cp\u003EWenke Lee (CS) describes how BLADE works by tracking how users interact with their browsers to distinguish downloads that were authorized versus downloads that were not. BLADE then stops and removes the downloads that were not authorized.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 10:07:29","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"snagit","field_article_url":"","publication_url":"http:\/\/it.slashdot.org\/story\/10\/10\/10\/194215\/New-Tool-Blocks-Downloads-From-Malicious-Sites?from=rss\u0026utm_source=feedburner\u0026utm_medium=feed\u0026utm_campaign=Feed%3A+Slashdot%2FslashdotIt+%28Slashdot%3A+IT%29","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10867","name":"Blade"},{"id":"10863","name":"drive-by download"},{"id":"7772","name":"malware"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61023":{"#nid":"61023","#data":{"type":"external_news","title":"Fooled You! Robots Learn How to Deceive","body":[{"value":"\u003Cp\u003EDeception could be an important tool in a battefield robot\u0027s arsenal,\n says a colleague of Ron Arkin\u0027s (IC) who helped develop algorithms that\n let robots determine whether to use deception against fellow robots or \nhumans. \u003Cem\u003ESource: Discovery News\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-16 14:37:46","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Delta Jacket","field_article_url":"","publication_url":"http:\/\/news.discovery.com\/tech\/fooled-you-robots-learn-how-to-deceive.html","dateline":{"date":"2010-09-16T00:00:00-04:00","iso_date":"2010-09-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"667","name":"robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62153":{"#nid":"62153","#data":{"type":"external_news","title":"Drive-By Malware Blocked By New Tool","body":[{"value":"\u003Cp\u003EGeorgia Tech and SRI researchers explain how BLADE cuts off drive-by downloads at the one point they all have to pass through - downloading and executing a file on the computer. By identifying the malware at this juncture, BLADE can prevent the install and delete the program.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 10:22:32","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"road closures","field_article_url":"","publication_url":"http:\/\/www.informationweek.com\/news\/security\/intrusion-prevention\/showArticle.jhtml?articleID=227700415\u0026subSection=News","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10867","name":"Blade"},{"id":"10863","name":"drive-by download"},{"id":"7772","name":"malware"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61040":{"#nid":"61040","#data":{"type":"external_news","title":"The Gloved One: Tech Researchers Hone Fingertip Musicianship","body":[{"value":"\u003Cp\u003EThad Starner (IC) and graduate student Tanya Markow are making music with a glove that teaches you sooner through muscle memory. (Video Story) \u003Cem\u003ESource: 11Alive\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-17 14:57:39","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/65.168.17.130\/MVSavedClips\/bd345f14-9b3e-48a8-be82-6a0d382c6fce.wmv","dateline":{"date":"2010-09-17T00:00:00-04:00","iso_date":"2010-09-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1180","name":"Music"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62155":{"#nid":"62155","#data":{"type":"external_news","title":"Hidden Truths","body":[{"value":"\u003Cp\u003ECollage, a system devised by Nick Feamster (CS) and his colleagues at Georgia Tech, hides messages in plain sight using sophisticated steganography.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 10:39:18","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"back-to-school","field_article_url":"","publication_url":"http:\/\/www.economist.com\/node\/17243251","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10970","name":"anti-censorship"},{"id":"10971","name":"hidden messages"},{"id":"168882","name":"steganography"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61071":{"#nid":"61071","#data":{"type":"external_news","title":"Feamster Designs a Better Spam Trap","body":[{"value":"\u003Cp\u003ENIck Feamster\u0027s (CS) SNARE catches incoming spam not by reading message \ncontent, but by examining behavior of the sender, which requires much \nless computing power (radio interview). \u003Cem\u003ESource: WTOP \u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-20 13:32:13","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"International Microelectronics Assembly and Packaging Society (IMAPS)","field_article_url":"","publication_url":"http:\/\/www.nae.edu\/radio","dateline":{"date":"2010-09-20T00:00:00-04:00","iso_date":"2010-09-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10674","name":"email filtering"},{"id":"10675","name":"network security"},{"id":"168881","name":"spam"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62157":{"#nid":"62157","#data":{"type":"external_news","title":"Emerging Cyberthreats Outlined in New Report","body":[{"value":"\u003Cp\u003EThe Georgia Tech Emerging Cyber Threats Report for 2011 states that there will be an increase in threats in three cyber security areas: physical systems, large-scale attacks by botnets, and mobile devices and social networking.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 10:52:32","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","field_article_url":"","publication_url":"http:\/\/www.cio-today.com\/story.xhtml?story_id=75523\u0026full_skip=1","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61251":{"#nid":"61251","#data":{"type":"external_news","title":"Deceptive robots hint at machine self-awareness","body":[{"value":"\u003Cp\u003EAlan Wagner (IC) and Ron Arkin (IC) aren\u0027t only proving that robots \nare capable of deceiving, they\u0027re proving that they can learn and reason\n about another entity. Begging the question: Can robots have theory of \nmind?\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-27 14:23:52","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"effective stress management","field_article_url":"","publication_url":"http:\/\/www.newscientist.com\/article\/mg20727794.800-deceptive-robots-hint-at-machine-selfawareness.html","dateline":{"date":"2010-09-27T00:00:00-04:00","iso_date":"2010-09-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10604","name":"Deception"},{"id":"2352","name":"robots"},{"id":"10753","name":"theory of mind"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62184":{"#nid":"62184","#data":{"type":"external_news","title":"Nutrition? There\u2019s An App For That","body":[{"value":"\u003Cp\u003EAndrea Grimes Parker (IC) speaks about the new app OrderUP!- a casual nutrition decision game- created by her and other Georgia Tech researchers.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-14 14:50:58","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Elfriede Jelinek","field_article_url":"","publication_url":"http:\/\/www.ibtimes.com\/articles\/71202\/20101012\/mobile-apps-nutrition-healthy-living-georgia-tech.htm","dateline":{"date":"2010-10-14T00:00:00-04:00","iso_date":"2010-10-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"2530","name":"application"},{"id":"398","name":"health"},{"id":"4131","name":"nutrition"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61370":{"#nid":"61370","#data":{"type":"external_news","title":"Signing Made Easy","body":[{"value":"\u003Cp\u003EOnly 25% of children who are deaf have parents who are fluent in sign\n language. Georgia Tech\u0027s Thad Starner (IC) and his colleague Jeff \nWilson (CS) have created video games and cell phone apps to help both \nparents and their children learn. (video story)\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-30 14:14:05","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"ice shelf collapse","field_article_url":"","publication_url":"http:\/\/www.nsf.gov\/news\/special_reports\/science_nation\/index.jsp","dateline":{"date":"2010-09-30T00:00:00-04:00","iso_date":"2010-09-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"3725","name":"children\u0027s learning"},{"id":"1754","name":"deaf"},{"id":"2483","name":"interactive computing"},{"id":"167327","name":"sign language"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66164":{"#nid":"66164","#data":{"type":"external_news","title":"Kraken Botnet Reemerges 318,000 Nodes Strong","body":[{"value":"\u003Cp\u003EThe Kraken botnet reappeared in April and has returned to at least half the size it was during its peak in 2008, says Paul Royal of the Georgia Tech Information Security Center.\u003Cem\u003ESource: SC Magazine\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-12 15:02:39","changed_gmt":"2016-10-08 02:24:09","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Research on Careers in Science Lab","field_article_url":"","publication_url":"http:\/\/www.scmagazineus.com\/kraken-botnet-re-emerges-318000-nodes-strong\/article\/173611\/","dateline":{"date":"2010-06-30T00:00:00-04:00","iso_date":"2010-06-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62214":{"#nid":"62214","#data":{"type":"external_news","title":"Mini Unmanned Aircraft Team Up with Porsche Named Sting","body":[{"value":"\u003Cp\u003ESting, the Robotics \u0026amp; Intelligent Machine (RIM) Center\u0027s Porsche Cayenne-turned-autonomous-robotic-SUV, teamed up with two unmanned aerial vehicles for an exercise at Robotics Rodeo 2010, held Oct. 12-15 at Georgia\u0027s Fort Benning. \u003Cem\u003ESource: Scientific American\u003C\/em\u003E\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-18 11:23:05","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"work family interactions","field_article_url":"","publication_url":"http:\/\/www.scientificamerican.com\/blog\/post.cfm?id=mini-unmanned-aircraft-embark-on-mi-2010-10-14","dateline":{"date":"2010-10-18T00:00:00-04:00","iso_date":"2010-10-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"667","name":"robotics"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61372":{"#nid":"61372","#data":{"type":"external_news","title":"More Join HP, Intel and Yahoo on Open Cirrus Cloud Test Bed","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s Center for Experimental Research has joined Open \nCirrus, the open source project for cloud computing research.\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-30 14:31:31","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"misinformation","field_article_url":"","publication_url":"http:\/\/www.pcworld.com\/businesscenter\/article\/206275\/more_join_hp_intel_and_yahoo_on_open_cirrus_cloud_test_bed.html","dateline":{"date":"2010-09-30T00:00:00-04:00","iso_date":"2010-09-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10807","name":"cloud computing"},{"id":"5155","name":"open source"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62218":{"#nid":"62218","#data":{"type":"external_news","title":"Botnets Increasingly Threaten Networks, Warns Georgia Tech","body":[{"value":"\u003Cp\u003EMore than 100 million computers worldwide have been infected by botnets, according to GTISC\u0027s Emerging Cyber Threats Report for 2011, but also on the rise are threats from USB devices and online app stores.\u003Cem\u003E Source: InfoSecurity.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-18 11:37:09","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"(IV) therapy","field_article_url":"","publication_url":"http:\/\/www.infosecurity-us.com\/view\/13226\/botnets-increasingly-threaten-computers-and-networks-warns-georgia-tech\/","dateline":{"date":"2010-10-18T00:00:00-04:00","iso_date":"2010-10-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61373":{"#nid":"61373","#data":{"type":"external_news","title":"Cloud Computing Test Bed Open Cirrus Announces Expansion","body":[{"value":"\u003Cp\u003EOpen Cirrus- a global, multiple data center, and open source test bed\n - is expanding, and Georgia Tech\u0027s Center for Experimental Research in \nComputer Systems (CERCS) is part of that expansion. CERCS will add tools\n and best practices that will further enable the advancement of cloud \ncomputing research.\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-30 14:33:33","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Graph Neural Networks","field_article_url":"","publication_url":"http:\/\/it.tmcnet.com\/channels\/cloud-computing\/articles\/104960-cloud-computing-test-bed-open-cirrus-announces-expansion.htm","dateline":{"date":"2010-09-30T00:00:00-04:00","iso_date":"2010-09-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10807","name":"cloud computing"},{"id":"5155","name":"open source"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"62228":{"#nid":"62228","#data":{"type":"external_news","title":"OpenStudy, MITCourseWare to Help OCW Users Study Together","body":[{"value":"\u003Cp\u003EWhat do Intro to Computer Science, Single Variable Calculus and Chinese I have in common? They\u0027re the first three courses on MIT OpenCourseware to offer virtual study groups via OpenStudy, a joint Georgia Tech-Emory startup co-founded by Ashwin Ram (IC). \u003Cem\u003ESource: ReadWriteWeb\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-10-18 14:42:23","changed_gmt":"2016-10-08 02:24:09","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"Andson Biotech","field_article_url":"","publication_url":"http:\/\/www.readwriteweb.com\/archives\/openstudy_teams_up_with_mit_opencourseware_to_help.php","dateline":{"date":"2010-10-18T00:00:00-04:00","iso_date":"2010-10-18T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61374":{"#nid":"61374","#data":{"type":"external_news","title":"Only a Quarter of Parents to Deaf Kids Know Sign Language","body":[{"value":"\u003Cp\u003EThad Starner (IC) is helping change the statistics by creating \nprograms that help both deaf children and their parents. CopyCat is a \nvideo game that helps the children learn sign language, and SmartSign is\n a phone app that reminds parents how to sign words when they forget.\u0026nbsp;\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-30 14:37:02","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Lydia Kenney","field_article_url":"","publication_url":"http:\/\/news.softpedia.com\/news\/Only-a-Quarter-of-Parents-to-Deaf-Kids-Know-Sign-Language-158192.shtml","dateline":{"date":"2010-09-30T00:00:00-04:00","iso_date":"2010-09-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"5157","name":"applications"},{"id":"3725","name":"children\u0027s learning"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61375":{"#nid":"61375","#data":{"type":"external_news","title":"OpenStudy Harnesses the Power of Social Media","body":[{"value":"\u003Cp\u003ECreated by Ashwin Ram (IC) and his colleagues, OpenStudy is a website\n that is encouraging students to log on and study with students from \nanywhere at anytime.\u0026nbsp;\u003Cem\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-30 14:39:57","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Kathryn E Oliver","field_article_url":"","publication_url":"http:\/\/chimes.biola.edu\/content\/article\/2010\/sep\/26\/openstudy-social-media-academics\/","dateline":{"date":"2010-09-30T00:00:00-04:00","iso_date":"2010-09-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"167543","name":"social media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61019":{"#nid":"61019","#data":{"type":"external_news","title":"Google, Georgia Tech Develop Video Screen \u0027Retargeting\u0027","body":[{"value":"\u003Cp\u003EWorking with Google scientists, Irfan Essa (IC) and Ph.D. candidate Matthias\n Grundmann have developed an algorithm that can alter the aspect ratio \nof video images with negligible distortion or image loss. \u003Cem\u003ESource: \nInformationWeek\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-16 14:20:34","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"road closures","field_article_url":"","publication_url":"http:\/\/www.informationweek.com\/news\/infrastructure\/traffic_management\/showArticle.jhtml?articleID=227400397\u0026subSection=News","dateline":{"date":"2010-09-15T00:00:00-04:00","iso_date":"2010-09-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"124","name":"Digital Media"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"61416":{"#nid":"61416","#data":{"type":"external_news","title":"Track Your Diet, Exercise on Web","body":[{"value":"\u003Cp\u003EYevgeniy Medynskiy (IC) introduces Salud! an online application that\ncan not only track calories, but also other things such as protein\nintake or exercise performed. (video story)\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-10-04 18:29:45","changed_gmt":"2016-10-08 02:24:09","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"McMillan Street","field_article_url":"","publication_url":"http:\/\/www.cnn.com\/video\/data\/2.0\/video\/living\/2010\/09\/30\/nr.velshi.tracking.food.exercise.cnn.html","dateline":{"date":"2010-10-04T00:00:00-04:00","iso_date":"2010-10-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"5157","name":"applications"},{"id":"6063","name":"diet"},{"id":"398","name":"health"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"60539":{"#nid":"60539","#data":{"type":"external_news","title":"NVIDIA Names Georgia Tech a CUDA Center of Excellence","body":[{"value":"\u003Cp\u003EJeffrey Vetter (CSE) will serve as\nprincipal investigator of the center that looks to leverage Georgia Tech\n research involving the company\u0027s GPU across a range of application \nareas. \u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27262","created_gmt":"2010-08-23 14:59:02","changed_gmt":"2016-10-08 02:24:06","author":"Fletcher Moore","boilerplate_text":"","field_publication":"","publication":"CCRF","field_article_url":"","publication_url":"http:\/\/pressroom.nvidia.com\/easyir\/customrel.do?easyirid=A0D622CE9F579F09\u0026prid=654285\u0026releasejsp=release_157\u0026version=live","dateline":{"date":"2010-08-23T00:00:00-04:00","iso_date":"2010-08-23T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"60875":{"#nid":"60875","#data":{"type":"external_news","title":"Start-Up Aspires to Make the World \u0027One Big Study Group\u0027","body":[{"value":"\u003Cp\u003EAshwin Ram\u0027s (IC) startup OpenStudy helps users build their own personal study networks; when they have a question, the site pushes it out to their extended network. Three thousand users have joined in OpenStudy\u0027s first week.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27174","created_gmt":"2010-09-09 09:49:15","changed_gmt":"2016-10-08 02:24:06","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","publication":"You in The News","field_article_url":"","publication_url":"http:\/\/chronicle.com\/blogPost\/Start-Up-Aspires-to-Make-the\/26780\/?sid=wc\u0026utm_source=wc\u0026utm_medium=en","dateline":{"date":"2010-09-09T00:00:00-04:00","iso_date":"2010-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"10603","name":"collaborative learning"},{"id":"167296","name":"social networking"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"60962":{"#nid":"60962","#data":{"type":"external_news","title":"Robots Programmed to Deceive","body":[{"value":"\u003Cp\u003EGeogia Tech scientist Ronald Arkin (IC) and his team have conducted \nexperiments in robot deception for applications in which the ability to deceive could prove \nuseful for military or search \u0026amp; rescue robots. \u003Cem\u003ESource: UPI\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-14 11:17:58","changed_gmt":"2016-10-08 02:24:06","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"$65 million grant","field_article_url":"","publication_url":"http:\/\/www.upi.com\/Science_News\/2010\/09\/09\/UPI-NewsTrack-Health-and-Science-News\/UPI-60931284071246\/?pvn=1","dateline":{"date":"2010-09-09T00:00:00-04:00","iso_date":"2010-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"10606","name":"Military Operations"},{"id":"2352","name":"robots"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"60963":{"#nid":"60963","#data":{"type":"external_news","title":"Military Research Teaches Robots how to Deceive Each Other","body":[{"value":"\u003Cp\u003ECan algorithms based in interdependence theory and game theory allow a\n robot to deceive humans? Ron Arkin (IC) and colleagues are trying to \nfind out. \u003Cem\u003ESource: Popular Science\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-14 11:19:54","changed_gmt":"2016-10-08 02:24:06","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"VLSI symposium","field_article_url":"","publication_url":"http:\/\/www.popsci.com\/technology\/article\/2010-09\/deceptive-robots-learn-when-and-how-pull-fast-one","dateline":{"date":"2010-09-09T00:00:00-04:00","iso_date":"2010-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"8438","name":"algorithmic_game_theory"},{"id":"10606","name":"Military Operations"},{"id":"2352","name":"robots"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"60964":{"#nid":"60964","#data":{"type":"external_news","title":"Qualcomm Demos Augmented Reality Apps","body":[{"value":"\u003Cp\u003EBlair MacIntyre (IC) is working with Qualcomm to create augmented reality (AR) \nvision-based platforms in the AR \ngaming studios at Georgia Tech. \u003Cem\u003ESource: ZDNET\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27166","created_gmt":"2010-09-14 11:21:13","changed_gmt":"2016-10-08 02:24:06","author":"Juliet Helms","boilerplate_text":"","field_publication":"","publication":"Rui Zhang","field_article_url":"","publication_url":"http:\/\/www.zdnet.co.uk\/news\/mobile-apps\/2010\/09\/09\/qualcomm-demos-augmented-reality-apps-40090049\/","dateline":{"date":"2010-09-09T00:00:00-04:00","iso_date":"2010-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1597","name":"Augmented Reality"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66161":{"#nid":"66161","#data":{"type":"external_news","title":"GPU Computing II: Where the Truth Lies","body":[{"value":"\u003Cp\u003EAs the CPU vs. GPU wars heat up, research by Rich Vuduc (CSE) and colleagues shows the latter may not have quite the performance advantage some have said it does.\u0026nbsp;\u003Cem\u003ESource: HPCwire\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-12 14:49:12","changed_gmt":"2016-10-08 02:24:03","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"Brett Aiello","field_article_url":"","publication_url":"http:\/\/www.hpcwire.com\/blogs\/GPU-Computing-II-Where-the-Truth-Lies-97117894.html","dateline":{"date":"2010-06-25T00:00:00-04:00","iso_date":"2010-06-25T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66165":{"#nid":"66165","#data":{"type":"external_news","title":"Notorious Kraken Botnet Rises From the Ashes","body":[{"value":"\u003Cp\u003ECall it the Son of Kraken, as the \u0022zombie network\u0022 believed by some to be the largest in history has returned to nearly half its peak strength of 2008, says Paul Royal of GTISC.\u003Cem\u003ESource: The Register\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-12 15:07:04","changed_gmt":"2016-10-08 02:24:00","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"yearlong program","field_article_url":"","publication_url":"http:\/\/www.theregister.co.uk\/2010\/06\/29\/kraken_botnet_resurgence\/","dateline":{"date":"2010-07-01T00:00:00-04:00","iso_date":"2010-07-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"66163":{"#nid":"66163","#data":{"type":"external_news","title":"Working Toward a Smarter, Faster Cloud","body":[{"value":"\u003Cp\u003EGrad student Vytautas Valancius (CS) shows how cloud computing platforms can be optimized with custom data paths for applications with varying bandwidth demands.\u003Cem\u003ESource: Technology Review\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-05-12 14:54:52","changed_gmt":"2016-10-08 02:23:49","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"CREST D-Map","field_article_url":"","publication_url":"http:\/\/www.technologyreview.com\/web\/25658\/","dateline":{"date":"2010-06-25T00:00:00-04:00","iso_date":"2010-06-25T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}