<?xml version="1.0"?>
<News hasArchived="true" page="4151" pageCount="10616" pageSize="10" timestamp="Tue, 05 May 2026 05:16:32 -0400" url="https://beta.my.umbc.edu/posts.xml?mode=recent&amp;page=4151">
<NewsItem contentIssues="false" id="84879" important="false" status="posted" url="https://beta.my.umbc.edu/posts/84879">
<Title>End Corporate Rule!</Title>
<Tagline>Lobby Congress this summer to end corporate personhood</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>Hey there,</div><div><br></div><div>Do you hate the amount of power corporations have within our political system?Do you want to gain some experience lobbying this summer while fighting for a noble cause? </div><div><br></div><div>Well then we invite you to escape corporate rule for a few days and join Move to Amend at our “Free the People from Corporate Rule” Summit in DC June 21-24th. </div><div><br></div><div>We will think together about the problem and our movement and generate solutions.</div><div><br></div><div>Monday the 24th is a lobby day and we will be knocking on doors in Congress to tell our representatives to support democracy by co-sponsoring HJR 48, the “We the People Amendment”.</div><div><br></div><div>Your brilliance, energy and voices are welcome!</div><div><br></div><div>LOCATION:</div><div>Trinity Washington University</div><div>125 Michigan Ave NE</div><div>Washington, DC 20017-1004</div><div><br></div><div>Students with ID or low-income folk can join us for the cost of the meals alone (or as low as $25 if that’s still prohibitive). All donations are welcome when possible!</div><div><br></div><div>Please register here if you would like to come for the Super Sweet Student/Low Income Activist deal:<a href="https://movetoamend.org/summit-super-deal" rel="nofollow external" class="bo"> https://movetoamend.org/summit-super-deal</a></div><div><br></div><div>More information and regular registration can be found at: <a href="https://movetoamend.org/summit" rel="nofollow external" class="bo">https://movetoamend.org/summit.</a></div><div><br></div><div>And if you know others who would be interested in attending, please forward this message! Thank you!</div><div><br></div><div>Onwards towards democracy!</div><div><br></div></div>
]]>
</Body>
<Summary>Hey there,     Do you hate the amount of power corporations have within our political system?Do you want to gain some experience lobbying this summer while fighting for a noble cause?      Well...</Summary>
<Website>https://movetoamend.org/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84879/guest@my.umbc.edu/3e1d2686db0ba9508927194ee229db5b/api/pixel</TrackingUrl>
<Group token="classifieds">Classifieds</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/classifieds</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/xsmall.png?1434550723</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/original.png?1434550723</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/xxlarge.png?1434550723</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/xlarge.png?1434550723</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/large.png?1434550723</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/medium.png?1434550723</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/small.png?1434550723</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/xsmall.png?1434550723</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/081/27816fed47150f6fda5f96e75013749f/xxsmall.png?1434550723</AvatarUrl>
<Sponsor>Classifieds</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 19:06:00 -0400</PostedAt>
<EditAt>Thu, 06 Jun 2019 00:12:33 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="120117" important="false" status="posted" url="https://beta.my.umbc.edu/posts/120117">
<Title>Hackers Seek Ransoms from Baltimore and Communities Across the US</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="150" height="150" src="https://umbc.edu/wp-content/uploads/2019/06/Image-6-5-19-at-9.50-AM-e1559744902235-150x150.jpg" alt="Map: The Conversation, CC-BY-ND   Source: Recorded Future   Get the data" style="max-width: 100%; height: auto;">
    <p><em>By <a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, assistant director, <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">UMBC</a> Center for Cybersecurity, director, cybersecurity graduate program</em></p>
    <p>The people of Baltimore are beginning their fifth week under an <a href="https://www.governing.com/topics/public-justice-safety/gov-cyber-attack-security-ransomware-baltimore-bitcoin.html" rel="nofollow external" class="bo">electronic siege</a> that has prevented residents from <a href="https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-open-baltimore-ransomware-20190513-story.html" rel="nofollow external" class="bo">obtaining</a> building permits and business licenses – and even <a href="https://www.npr.org/2019/05/21/725118702/ransomware-cyberattacks-on-baltimore-put-city-services-offline" rel="nofollow external" class="bo">buying or selling homes</a>. A year after hackers <a href="https://www.baltimoresun.com/news/maryland/crime/bs-md-ci-hack-folo-20180328-story.html" rel="nofollow external" class="bo">disrupted</a> the city’s emergency services dispatch system, city workers throughout the city are unable to, among other things, use their government email accounts or conduct <a href="https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-property-deeds-20190524-story.html" rel="nofollow external" class="bo">routine city business</a>.</p>
    <p>In this attack, a type of malicious software called ransomware has encrypted key files, rendering them unusable until the city pays the unknown attackers 13 bitcoin, or about US$76,280. But even if the city were to pay up, there is no guarantee that its files would all be recovered; many ransomware attacks <a href="https://cyber-edge.com/wp-content/uploads/2019/03/CyberEdge-2019-CDR-Report.pdf#page=14" rel="nofollow external" class="bo">end with the data lost</a>, whether the ransom is paid or not.</p>
    <p>Similar attacks in recent years have <a href="https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/" rel="nofollow external" class="bo">crippled</a> the United Kingdom’s National Health Service, <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/" rel="nofollow external" class="bo">shipping giant Maersk</a> and <a href="https://www.recordedfuture.com/state-local-government-ransomware-attacks/" rel="nofollow external" class="bo">local, county and state governments across the U.S.</a> and <a href="https://www.thespec.com/news-story/8902484-opp-warn-of-ransomware-attacks-on-municipal-governments/" rel="nofollow external" class="bo">Canada</a>.<a href="/wp-content/uploads/2019/06/1st-graph.jpeg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/1st-graph.jpeg" alt="Map: The Conversation, CC-BY-ND Source: Recorded Future Get the data" width="1262" height="926" style="max-width: 100%; height: auto;"></a> Map: The Conversation, CC-BY-ND Source: <a href="https://www.recordedfuture.com/state-local-government-ransomware-attacks/" rel="nofollow external" class="bo">Recorded Future</a>: <a href="/wp-content/uploads/2019/06/data-lkvX4.csv" rel="nofollow external" class="bo">Get the data</a></p>
    <p>These types of attacks are becoming more frequent and gaining more media attention. Speaking as a career cybersecurity professional, the technical aspects of incidents like this are but one part of a much bigger picture. Every user of technology must consider not only threats and vulnerabilities, but also operational processes, potential points of failure and how they use technology on a daily basis. Thinking ahead, and taking protective steps, can help reduce the effects of cybersecurity incidents on both individuals and organizations.</p>
    <h4><strong>Understanding cyberattack tools</strong></h4>
    <p>Software designed to attack other computers is nothing new. Nations, private companies, individual researchers and criminals continue developing these types of programs, for a wide range of <a href="https://theconversation.com/america-is-dropping-cyberbombs-but-how-do-they-work-58476" rel="nofollow external" class="bo">purposes</a>, including digital warfare and intelligence gathering, as well as extortion by ransomware.</p>
    <p>Many malware efforts begin as a normal and crucial function of cybersecurity: identifying software and hardware vulnerabilities that could be exploited by an attacker. Security researchers then work to close that vulnerability. By contrast, malware developers, criminal or otherwise, will figure out how to get through that opening undetected, to explore and potentially wreak havoc in a target’s systems.</p>
    <p>Sometimes a <a href="https://theconversation.com/what-are-software-vulnerabilities-and-why-are-there-so-many-of-them-77930" rel="nofollow external" class="bo">single weakness is enough</a> to give an intruder the access they want. But other times attackers will use multiple vulnerabilities in combination to infiltrate a system, take control, steal data and modify or delete information – while trying to hide any evidence of their activity from security programs and personnel. The challenge is so great that <a href="https://www.rsaconference.com/writable/presentations/file_upload/spo1-t11_combatting-advanced-cybersecurity-threats-with-ai-and-machine-learning_copy1.pdf" rel="nofollow external" class="bo">artificial intelligence and machine learning systems</a> are now also being incorporated to help with cybersecurity activities.</p>
    <p>There’s some question about the role the federal government <a href="https://cybersecpolitics.blogspot.com/2019/05/baltimore-is-not-eternalblue.html" rel="nofollow external" class="bo">may have played</a> in this situation, because one of the hacking tools the attackers <a href="https://www.nytimes.com/2019/05/31/us/nsa-baltimore-ransomware.html" rel="nofollow external" class="bo">reportedly</a> used in Baltimore was <a href="https://money.cnn.com/2016/01/12/technology/nsa-michael-hayden-us-hacker-thief/index.html" rel="nofollow external" class="bo">developed</a> by the U.S. National Security Agency, which the <a href="https://www.nytimes.com/2019/05/31/us/nsa-baltimore-ransomware.html" rel="nofollow external" class="bo">NSA has denied</a>. However, hacking tools stolen from the NSA in 2017 by the hacker group <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/" rel="nofollow external" class="bo">Shadow Brokers</a> were used to launch <a href="http://www.cyberdefensemagazine.com/at-least-3-different-groups-have-been-leveraging-the-nsa-eternalblue-exploit-whats-went-wrong" rel="nofollow external" class="bo">similar attacks</a> within months of those tools being posted on the internet. Certainly, those tools should never have been stolen from the NSA – and should have been better protected.</p>
    <p>But my views are more complicated than that: As a citizen, I recognize the NSA’s mandate to research and develop advanced tools to protect the country and fulfill its national security mission. However, <a href="https://theconversation.com/should-spies-use-secret-software-vulnerabilities-77770" rel="nofollow external" class="bo">like many cybersecurity professionals</a>, I remain conflicted: When the government discovers a new technology vulnerability but doesn’t tell the maker of the affected hardware or software until after it’s used to cause havoc or disclosed by a leak, everyone is at risk.<a href="/wp-content/uploads/2019/06/2nd-graph.jpeg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/2nd-graph.jpeg" alt="Chart: The Conversation, CC-BY-ND Source: CyberEdge Group Cyberthreat Defense Report 2019 Get the data" width="1308" height="532" style="max-width: 100%; height: auto;"></a></p>
    <p>Chart: The Conversation, CC-BY-ND Source: <a href="https://cyber-edge.com/wp-content/uploads/2019/03/CyberEdge-2019-CDR-Report.pdf#page=14" rel="nofollow external" class="bo">CyberEdge Group Cyberthreat Defense Report 2019</a> <a href="/wp-content/uploads/2019/06/data-Yj50Z.csv" rel="nofollow external" class="bo">Get the data</a></p>
    <h4><strong>Baltimore’s situation</strong></h4>
    <p>The <a href="https://www.govtech.com/security/Estimates-Put-Baltimores-Ransomware-Recovery-at-18-2-M.html" rel="nofollow external" class="bo">estimated $18 million cost of recovery</a> in Baltimore is money the city likely doesn’t have readily available. Recent research by some of my colleagues at the University of Maryland, Baltimore County, shows that many state and <a href="https://doi.org/10.1111/puar.13028" rel="nofollow external" class="bo">local governments remain woefully underprepared</a> and underfunded to adequately, let alone proactively, deal with cybersecurity’s many challenges.</p>
    <p>It is concerning that the ransomware attack in Baltimore exploited a vulnerability that has been publicly <a href="https://gizmodo.com/you-need-to-patch-your-older-windows-pcs-right-now-to-p-1835158876" rel="nofollow external" class="bo">known</a> about – with an available fix – <a href="http://fortune.com/2019/06/01/baltimore-nsa-ransowmare-microsoft-windows-eternalblue/" rel="nofollow external" class="bo">for over two years</a>. NSA had developed an exploit (code-named EternalBlue) for this discovered security weakness but didn’t alert Microsoft about this critical security vulnerability until early 2017 – and only after the Shadow Brokers had stolen the NSA’s tool to attack it. Soon after, Microsoft <a href="https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/" rel="nofollow external" class="bo">issued a software security update</a> to fix this key flaw in its Windows operating system.</p>
    <p>Admittedly, it can be very complex to manage software updates for a large organization. But given the media coverage at the time about the unauthorized disclosure of many NSA hacking tools and the vulnerabilities they targeted, it’s unclear why Baltimore’s information technology staff didn’t ensure the city’s computers received that particular security update immediately. And while it’s not necessarily fair to <a href="https://www.nextgov.com/cybersecurity/2019/05/nsa-deflects-blame-baltimore-ransomware-attack/157376/" rel="nofollow external" class="bo">blame the NSA</a> for the Baltimore incident, it is entirely fair to say that the knowledge and techniques behind the tools of digital warfare are out in the world; we must learn to live with them and adapt accordingly.<a href="/wp-content/uploads/2019/06/3rd-graph.jpeg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/3rd-graph.jpeg" alt="Chart: The Conversation, CC-BY-ND Source: Recorded Future Get the data" width="1308" height="866" style="max-width: 100%; height: auto;"></a></p>
    <p>Chart: The Conversation, CC-BY-ND Source: <a href="https://www.recordedfuture.com/state-local-government-ransomware-attacks/" rel="nofollow external" class="bo">Recorded Future:</a> <a href="/wp-content/uploads/2019/06/data-g2C5x.csv" rel="nofollow external" class="bo">Get the data</a></p>
    <h4><strong>Compounding problems</strong></h4>
    <p>In a global society where people, companies and governments are increasingly dependent on computers, digital weaknesses have the power to seriously disrupt or destroy everyday actions and functions.</p>
    <p>Even trying to develop workarounds when a crisis hits can be challenging. Baltimore city employees who were blocked from using the city’s email system tried to set up free Gmail accounts to at least get some work done. But they were initially blocked by <a href="https://www.theverge.com/2019/5/23/18637638/google-gmail-baltimore-ransomware-attacks" rel="nofollow external" class="bo">Google’s automated security systems</a>, which identified them as <a href="https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-gmail-accounts-20190523-story.html" rel="nofollow external" class="bo">potentially fraudulent</a>.</p>
    <p>Making matters worse, when Baltimore’s online services went down, <a href="https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-city-agencies-ransomware-20190509-story.html" rel="nofollow external" class="bo">parts</a> of the city’s municipal phone system couldn’t handle the resulting increase in calls attempting to compensate. This underscores the need to not only focus on technology products themselves but also the policies, procedures and capabilities needed to ensure individuals and/or organizations can remain at least minimally functional when under duress, whether by cyberattack, technology failures or acts of nature.</p>
    <h4><strong>Protecting yourself, and your livelihood</strong></h4>
    <p>The first step to <a href="https://theconversation.com/its-easier-to-defend-against-ransomware-than-you-might-think-57258" rel="nofollow external" class="bo">fighting a ransomware attack</a> is to regularly back up your data – which also provides protection against hardware failures, theft and other problems. To deal with ransomware, though, it’s particularly important to keep a few versions of your backups over time – don’t just rewrite the same files on a backup drive over and over.</p>
    <p>That’s because when you get hit, you’ll want to determine when you were infected and restore files from a backup made before that time. Otherwise, you’ll just be recovering infected data, and not actually fixing your problem. Yes, you might lose some data, but not everything – and presumably only your most recent work, which you’ll probably remember and recreate easily enough.</p>
    <p>And of course, following <a href="https://theconversation.com/its-easier-to-defend-against-ransomware-than-you-might-think-57258" rel="nofollow external" class="bo">some of cybersecurity’s best practices</a> – even just the basics – can help prevent, or at least minimize, the possibility of ransomware crippling you or your organization. Doing things like running current antivirus software, <a href="https://theconversation.com/the-petya-ransomware-attack-shows-how-many-people-still-dont-install-software-updates-77667" rel="nofollow external" class="bo">keeping all software updated</a>, using <a href="https://theconversation.com/using-truly-secure-passwords-6-essential-reads-84092" rel="nofollow external" class="bo">strong passwords</a> and <a href="https://theconversation.com/the-age-of-hacking-brings-a-return-to-the-physical-key-73094" rel="nofollow external" class="bo">multifactor authentication</a>, and not blindly trusting random devices or email attachments you encounter are just some of the steps everyone should take to be a good digital citizen.</p>
    <p>It’s also worth making plans to work around potential failures that might befall your email provider, internet service provider and power company, not to mention the software we rely on. Whether they’re attacked or <a href="https://gizmodo.com/major-google-outage-hits-youtube-g-suite-and-third-pa-1835189852" rel="nofollow external" class="bo">simply fail</a>, their absence can disrupt your life.</p>
    <p>In this way, ransomware incidents serve as an important reminder that cybersecurity is not just limited to protecting digital bits and bytes in cyberspace. Rather, it should force everyone to think broadly and holistically about their relationship with technology and the processes that govern its role and use in our lives. And, it should make people consider how they might function without parts of it at both work and home, because it’s a matter of when, not if, problems will occur.</p>
    <p> </p>
    <p>******</p>
    <p><em><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p><em>Header image: Many of Baltimore’s city services are crippled by a cyberattack.</em><br>
    <em><span><a href="https://www.shutterstock.com/image-photo/laptop-blank-screen-on-tableblur-background-440302609" rel="nofollow external" class="bo">The Conversation from City of Baltimore and Love Silhouette/Shutterstock.com</a>, <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="nofollow external" class="bo">CC BY-SA</a></span></em></p>
    <p><em>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/hackers-seek-ransoms-from-baltimore-and-communities-across-the-us-118089" rel="nofollow external" class="bo">original article</a>.</em></p></div>
]]>
</Body>
<Summary>By Richard Forno, assistant director, UMBC Center for Cybersecurity, director, cybersecurity graduate program   The people of Baltimore are beginning their fifth week under an electronic siege...</Summary>
<Website>https://umbc.edu/stories/hackers-seek-ransoms-from-baltimore-and-communities-across-the-us/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/120117/guest@my.umbc.edu/4a372df9e936a9caaef1b45e7a2d6bce/api/pixel</TrackingUrl>
<Tag>baltimore</Tag>
<Tag>cybersecurity</Tag>
<Tag>malware</Tag>
<Tag>nsa</Tag>
<Tag>perspectives</Tag>
<Tag>ransomware</Tag>
<Tag>the-conversation</Tag>
<Group token="umbc-news-magazine">UMBC News &amp;amp; Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-news-magazine</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/original.png?1748556657</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/large.png?1748556657</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/medium.png?1748556657</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/small.png?1748556657</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxsmall.png?1748556657</AvatarUrl>
<Sponsor>UMBC News &amp; Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 16:59:06 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="84871" important="true" status="posted" url="https://beta.my.umbc.edu/posts/84871">
<Title>Interruption to Campus Services around 3:20pm today</Title>
<Body>
<![CDATA[
    <div class="html-content">This afternoon, at around 3:20pm, we suffered a power outage to one of the racks in the computer room in Engineering. This rack holds key equipment that provides data storage for a good number of servers in our infrastructure, including the the main campus website, the central UMBC sites web environment, Peoplesoft Campus Solutions and the Peoplesoft HR system. Power was restored within a minute, and we have been working to restore connectivity as the equipment comes back online.<div><br></div><div><div>Service to the main website and other public facing services was restored around 4:00pm. </div><div><br></div><div>Service to the HR system was restored at 4:50pm, and we are finishing restoring service to the CS system which we expect to have operational by 5:30pm.</div><div><br></div><div>We will send another message when service has been fully restored later this afternoon. </div><div><br></div><div>We appreciate everyone's patience as we work to restore connectivity, if you have any questions about this outage or would like more information, please feel free to email me at <a href="mailto:damian@umbc.edu">damian@umbc.edu</a></div><div><br></div><div>Thank you, and please stay tuned for additional information shortly. </div><div><br></div><div>Damian</div><div>--</div><div>Damian Doyle</div><div>Assistant Vice President</div><div>Enterprise Infrastructure Solutions</div><div>DoIT - UMBC</div></div></div>
]]>
</Body>
<Summary>This afternoon, at around 3:20pm, we suffered a power outage to one of the racks in the computer room in Engineering. This rack holds key equipment that provides data storage for a good number of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84871/guest@my.umbc.edu/64b1ce34ff9accb3be605d8bf3f63b60/api/pixel</TrackingUrl>
<Tag>network</Tag>
<Tag>outage</Tag>
<Tag>website</Tag>
<Tag>www</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 16:58:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="120118" important="false" status="posted" url="https://beta.my.umbc.edu/posts/120118">
<Title>Spider Glue&#8217;s Sticky Secret Revealed By New Genetic Research</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="150" height="150" src="https://umbc.edu/wp-content/uploads/2019/06/Image-6-5-19-at-10.50-AM-1-150x150.jpg" alt="" style="max-width: 100%; height: auto;"><p><em>By <a href="https://theconversation.com/profiles/sarah-stellwagen-605839" rel="nofollow external" class="bo">Sarah Stellwagen</a>, postdoctoral researcher in biological sciences, <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">UMBC</a></em></p>
    <p>What do all of the <a href="https://wsc.nmbe.ch/" rel="nofollow external" class="bo">over 45,000 described spider species</a> on Earth have in common? Each makes at least one type of silk. And there are an awful lot of types out there.</p>
    <p>An individual orb weaving spider – the kind that spins the classic two-dimensional aerial spiral webs that seem to always be suspended at human face-height – can produce seven different silks, each with unique material properties.</p>
    <p>Dragline silk forms the frame of an orb web and is famous for its strength and toughness, <a href="https://www.sciencemag.org/news/2018/11/spider-silk-five-times-stronger-steel-now-scientists-know-why" rel="nofollow external" class="bo">comparable to that of steel</a>. The capture spiral is made of a highly stretchy version called flagelliform silk. Orb weaving spiders use an additional type of silk to wrap prey and create web decorations.</p>
    <p>But there’s another kind that, on the surface, doesn’t resemble silk at all: the sticky glue with which some spiders cover their silk capture threads. It doesn’t look like the classic threads that come to mind when thinking of spider silk, but the gluey substance from these webs is in fact a silk protein.</p>
    <p>For many years, researchers have been uncovering the secrets of spider glue, which stays wet in its open air environment and sticky over many rounds of attachment and release. Its genetic blueprint has remained elusive, however, meaning scientists haven’t been able to think about setting up large-scale production of this potentially useful biomaterial.</p>
    <p>Using new technology, my colleague and <a href="https://scholar.google.com/citations?user=gWWab2oAAAAJ&amp;hl=en&amp;oi=ao" rel="nofollow external" class="bo">I have been able</a> to sequence the the <a href="https://doi.org/10.1534/g3.119.400065" rel="nofollow external" class="bo">first full genetic sequences</a> that code for spider glue proteins.</p>
    
    <a href="https://images.theconversation.com/files/277968/original/file-20190604-69059-a0pc48.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/277968/original/file-20190604-69059-a0pc48.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="Spider glue drops spread along a strand of capture spiral silk.Sarah Stellwagen, CC BY-ND" width="1200" height="708" style="max-width: 100%; height: auto;"></a>Spider glue drops spread along a strand of capture spiral silk. Sarah Stellwagen, <a href="http://creativecommons.org/licenses/by-nd/4.0/" rel="nofollow external" class="bo">CC BY-ND</a>
    <h4><strong>A silk that’s really a sticky glue</strong></h4>
    <p>Under a microscope, orb weaver glue resembles beads on a string – little glistening spheres along a strand of stretchy support silk. Instead of being spun into a fiber as it leaves the spider’s body like other silks, the glue proteins are extruded as a jumbled mass. Their job is to stickily retain prey that get caught in the web.</p>
    <p>Different spider species produce glue tailored to their habitat’s conditions and prey.</p>
    <p>The glue of tropical orb weaving species is sticky in the spider’s wet habitat, but downgrades to just tacky in low humidity. The glue of orb weavers from dry regions becomes dilute and thin if the humidity is too high.</p>
    <p>Bolas spiders forgo the orb web, and instead produce a large globule of glue at the end of a long strand of silk that they whirl rapidly through the air. The glue of this sticky snare is specialized for capturing moths covered with loose scales.</p>
    <p>Widow spiders produce vertical, glue-covered trip lines that detach from the ground when encountered by an unsuspecting victim, springing the prey into the air where it hangs suspended. Unlike orb weaver glue, widow glue is resistant to fluctuating humidity.</p>
    <p>These various specialized adhesive properties have intrigued biomaterials researchers who can dream up plenty of uses for artificial versions of spider glues. But without knowing the genes that code for these proteins, there hasn’t been a clear road map for how to produce synthetic spider glues.</p>
    
    <a href="/wp-content/uploads/2019/06/arachnid-close-up-cobwebs-60694.jpg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/arachnid-close-up-cobwebs-60694.jpg" alt="https://www.pexels.com/photo/female-males-autumn-spiders-metellina-segmentata-60694/" width="4074" height="2706" style="max-width: 100%; height: auto;"></a>Two yellow orb weaver spiders weaving a web. <a href="https://www.pexels.com/photo/female-males-autumn-spiders-metellina-segmentata-60694/" rel="nofollow external" class="bo">Photo by Pixabay.</a>
    <h4><strong>Cracking a long, repetitive code</strong></h4>
    <p>Surprisingly, researchers have only sequenced around 20 full-length spider silk genes despite the incredible diversity of spiders and decades-old interest in <a href="https://www.newyorker.com/tech/annals-of-technology/in-the-future-well-all-wear-spider-silk" rel="nofollow external" class="bo">silk as a useful biomaterial</a>.</p>
    <p>It turns out that not only are the properties of spider silk amazing, but so is the DNA code that stores the instructions for making the protein. Spider silk genes are extremely large; in itself that’s not a problem, but the bulk of their sequence is made from repeats of the same small DNA bits.</p>
    <p>Imagine that the sentence “THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG” is a sequence of DNA that encodes for a protein, but whose exact order of letters is still unknown.</p>
    <p>In order to discover this sequence, the main method of DNA sequencing technology available today has three main steps. Once a DNA sample is collected, many copies of the sentence are randomly broken up into small pieces. For example, you might end up with a collection of fragments like “THE QU” “QUICK B” “BROWN FO” “WN FOX J” “AZY DOG” and on and on.</p>
    <p>Then a DNA sequencing machine discovers each letter of each piece. The final step is stitching all the short pieces, technically called “reads,” back together in one sequence to figure out the original sentence.</p>
    <p>For the sentence above, this is an easy task. The sequence of letters is unique, and as long as there are at least five characters in each read, it’s possible to figure out where one fits relative to another.</p>
    <p>Now imagine a similar sentence: “THE QUICK BROWN FOX JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS JUMPS OVER THE LAZY DOG.” Given many random short reads from the middle region like “UMPS J” or “S JUMP,” no matter how you slice and dice, it’s impossible to use this method to figure out the number of “JUMPS” in the complete sentence.</p>
    <h4><strong>Sequencing a long read of DNA in one go</strong></h4>
    <p>For many years DNA sequencing has been limited to this short-read strategy: breaking a gene into bits and then reassembling into one cohesive sequence.</p>
    <p>Setting aside some difficult and expensive techniques that are out of reach for standard labs, the best way to fully discover a long, repetitive gene is to sequence the repetitive part from start to finish in one go. Fortunately, emerging technology, while still in its infancy, is starting to allow this long-read sequencing by getting around the chemistry limitations of the short-read method. For those that study super-repetitive DNA this is excellent news: New types of DNA sequencers are finally resolving the “JUMPS.”</p>
    <p>Now that <a href="https://doi.org/10.1534/g3.119.400065" rel="nofollow external" class="bo">two spider glue genes are fully sequenced</a>, the first step towards making a synthetic version is complete. Researchers can now insert the genes into other organisms, like bacteria or yeast, to make the glue in bulk.</p>
    
    <a href="https://images.theconversation.com/files/277981/original/file-20190604-69059-1fe6qme.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/277981/original/file-20190604-69059-1fe6qme.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="Droplet of spider glue suspended on capture spiral silk (left) and after adhering to a glass slide (right).Sarah Stellwagen, CC BY-ND" width="1200" height="804" style="max-width: 100%; height: auto;"></a>Droplet of spider glue suspended on capture spiral silk (left) and after adhering to a glass slide (right).Sarah Stellwagen, <a href="http://creativecommons.org/licenses/by-nd/4.0/" rel="nofollow external" class="bo">CC BY-ND</a>
    <p>Unlike solid silks, the glue proteins do not have to be transformed from a liquid to a solid fiber, something spiders do effortlessly but that scientists have trouble replicating. The glue has the potential for many unique applications and is biodegradable, water soluble and stays sticky for months or even years.</p>
    <p>Imagine safer pest control or washable filters. Or frat boys wrestling in a kiddie pool of the stuff. Either way, someday soon it might be possible to reach your hand into a bucket of spider glue – the tricky part will be not sticking to whatever you touch next.</p>
    <p>*****</p>
    <p><em><a href="https://theconversation.com/profiles/sarah-stellwagen-605839" rel="nofollow external" class="bo">Sarah Stellwagen</a> is a postdoctoral researcher in biological sciences at <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p><em>Header image: Spider glue is actually a specialized silk protein. <span><span>Sarah Stellwagen</span>, <a href="http://creativecommons.org/licenses/by-nd/4.0/" rel="nofollow external" class="bo">CC BY-ND</a></span></em></p>
    <p><em>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="http://theconversation.com/spider-glues-sticky-secret-revealed-by-new-genetic-research-107773" rel="nofollow external" class="bo">original article</a>.</em></p></div>
]]>
</Body>
<Summary>By Sarah Stellwagen, postdoctoral researcher in biological sciences, UMBC   What do all of the over 45,000 described spider species on Earth have in common? Each makes at least one type of silk....</Summary>
<Website>https://umbc.edu/stories/spider-glues-sticky-secret-revealed-by-new-genetic-research/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/120118/guest@my.umbc.edu/40ce71b993a821794084354b22475ec1/api/pixel</TrackingUrl>
<Tag>biology</Tag>
<Tag>discovery</Tag>
<Tag>dna</Tag>
<Tag>genes</Tag>
<Tag>graduateschool</Tag>
<Tag>spiders</Tag>
<Tag>the-conversation</Tag>
<Group token="umbc-news-magazine">UMBC News &amp;amp; Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-news-magazine</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/original.png?1748556657</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/large.png?1748556657</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/medium.png?1748556657</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/small.png?1748556657</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxsmall.png?1748556657</AvatarUrl>
<Sponsor>UMBC News &amp; Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 15:37:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="120119" important="false" status="posted" url="https://beta.my.umbc.edu/posts/120119">
<Title>Antibiotic resistance is not new &#8211; it existed long before people used drugs to kill bacteria</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="150" height="150" src="https://umbc.edu/wp-content/uploads/2019/06/drew-hays-206414-unsplash-150x150.jpg" alt="" style="max-width: 100%; height: auto;"><p><em><a href="https://theconversation.com/profiles/ivan-erill-724916" rel="nofollow external" class="bo">Ivan Erill</a>, <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">Associate Professor, Biological Sciences, UMBC</a></em></p>
    <p>Imagine a world where your odds of surviving minor surgery were <a href="https://www.gov.uk/government/publications/english-surveillance-programme-antimicrobial-utilisation-and-resistance-espaur-report" rel="nofollow external" class="bo">one to three</a>. A world in which a visit to the dentist could spell disaster. This is the world into which your great-grandmother was born. And if humanity loses the fight against antibiotic resistance, this is a world your <a href="https://doi.org/10.1016/j.cmi.2015.12.002" rel="nofollow external" class="bo">grandchildren may well end up revisiting</a>.</p>
    <p>Antibiotics changed the world in more ways than one. They made surgery routine and childbirth safer. Intensive farming was born. For decades, antibiotics have effectively killed or stopped the growth of disease-causing bacteria. Yet it was always clear that this would be a rough fight. Bacteria breed fast, and that means that they adapt rapidly. The emergence of antibiotic resistance was <a href="https://doi.org/10.1289/ehp.117-a244" rel="nofollow external" class="bo">predicted by none other than Sir Alexander Fleming</a>, the discoverer of penicillin, less than a year after the first batch of penicillin was mass produced.</p>
    <p>Yet, contrary to popular belief, antibiotic resistance did not evolve recently, or in response to our use and misuse of antibiotics in humans and animals. Antibiotic resistance first evolved millions of years ago, and in the most mundane of places.</p>
    <p>I am a bioinformatician, and <a href="https://erilllab.umbc.edu/" rel="nofollow external" class="bo">my lab</a> studies the evolution of bacterial genomes. With <a href="https://www.who.int/news-room/fact-sheets/detail/antibiotic-resistance" rel="nofollow external" class="bo">antibiotic resistance becoming a major threat</a>, I’m trying to figure out how resistance to antibiotics emerges and spreads among bacterial populations.</p>
    <h2>A billion-years-old arms race</h2>
    <p>Most antibiotics are naturally produced by bacteria living in soil. They produce these deadly chemical compounds to fend off competing species. Yet, in the long game that is evolution, competing species are unlikely to sit idly by. Any mutant capable of tolerating a minimal quantity of the antibiotic will have a survival advantage and will be selected for – over generations this will produce organisms that are highly resistant.</p>
    <p>So it’s a foregone conclusion that antibiotic resistance, for any antibiotic researchers might ever discover, is likely already out there. Yet people keep talking about the evolution of antibiotic resistance as a <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4159373/" rel="nofollow external" class="bo">recent phenomenon</a>. Why?</p>
    <p>Resistance can and does evolve when bacteria are persistently exposed to a new antibiotic they have never encountered. Let’s call this the old-fashioned evolutionary road. Second, when bacteria are exposed to a novel antibiotic and are in contact with bacteria already resistant to this antibiotic, it is just a matter of time before they <a href="https://doi.org/10.1126/science.aav6390" rel="nofollow external" class="bo">get cozy and trade genes</a>. And, importantly, once genes have been packaged for trading, they become easier and easier to share. Bacteria then meet other bacteria, which meet more bacteria, until one of them eventually meets you.</p>
    <div class="embed-container"><iframe src="https://www.youtube.com/embed/plVk4NVIUh8?wmode=transparent&amp;start=0" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div><span>Bacteria can evolve resistance to high levels of antibiotics in just days.</span>
    <h2>The rise and fall of sulfa drugs</h2>
    <p>For all their might, antibiotics are not the only substances capable of effectively killing bacteria (without killing us). A decade before the mass production of penicillin, sulfonamide drugs became the <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC162528/" rel="nofollow external" class="bo">first commercial antibacterial agent</a>. Sulfa drugs act by blocking an enzyme – called DHPS – that is essential for bacteria to grow and multiply.</p>
    <p>Sulfa drugs are not antibiotics. No known organism produces them. They are chemotherapeutic agents synthesized by humans. No natural producer means no billion-year-old arms race and no pool of ancient resistance genes. We would expect bacteria to evolve resistance to sulfa drugs via the good old-fashioned way. And they did.</p>
    <p>Just a few years after their commercial introduction, the first cases of resistance to sulfa drugs <a href="https://mh.bmj.com/content/38/1/55.long" rel="nofollow external" class="bo">were reported</a>. Mutations to the bacterial DHPS enzyme made sulfa drugs ineffective. Then penicillin and the antibiotic era came about. Sulfa drugs were relegated to a <a href="https://linkinghub.elsevier.com/retrieve/pii/S1368-7646(00)90146-8" rel="nofollow external" class="bo">secondary role</a> in medicine, but they gained popularity as cheap antimicrobials in animal husbandry. By the 1980s resistance to sulfa drugs was rampant and worldwide. What had happened?</p>
    <h2>At odds with resistance</h2>
    <p>To answer this question our research team took sequences of sulfa drug resistance genes from disease-causing bacteria and <a href="https://doi.org/10.3389/fmicb.2018.03332" rel="nofollow external" class="bo">compared them</a> to millions of “normal” versions of the DHPS enzyme in nonpathogenic bacteria.</p>
    <p>The team identified two large groups of bacteria that had DHPS enzymes resistant to sulfa drugs. By studying their DNA sequences, we were able to show that these resistant DHPS enzymes had been present in these two groups of bacteria for at least 500 million years. Yet sulfa drugs were first synthesized in the 1910s. How could resistance be around 500 million years ago? And how did these resistance genes find their way into the disease-causing bacteria plaguing hospitals worldwide?</p>
    <p>The clues left in gene sequences are too fuzzy to conclusively answer the latter, but we can certainly speculate. The bacteria we identified as harboring these ancient sulfa drug resistance genes are all soil and freshwater bacteria that thrive under the well-irrigated subsoil of farms. And farmers have been adding huge amounts of <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC162528/" rel="nofollow external" class="bo">sulfa drugs to animal feed</a> for the past 50 years.</p>
    <p>The sublethal concentrations of sulfa drugs in the soil are the perfect setting for resistance genes to be transferred from these ancient resistant bacterial populations to other bacteria. All it takes is for one lucky bacterium to meet one of these ancient resistant ones in the subsoil. They trade some genes, one bacterium to the next, and resistance spreads until a newly minted resistant bacterium eventually makes it to the groundwater supply you drink from. You do the math.</p>
    <h2>Nothing new under the sun</h2>
    <p>As for why sulfa drug resistance genes would be around 500 million years ago, there are two plausible explanations. On the one hand, it could be that 500 million years ago there was a bacterium that synthesized sulfa drugs, which would explain the evolution of resistance. However, the lack of remnants from such a biosynthetic pathway makes this unlikely.</p>
    <p>On the other hand, resistant bacteria may have been around just by chance. The argument here is that there are so many bacteria, and such diversity, that chances are that some of them are going to be resistant to anything scientists come up with. This is a sobering thought.</p>
    <p>Then again, this is already the baseline for antibiotics. Like climate change, antibiotic resistance is one of those problems that always seem to be a couple decades away. And it may well be. A turning point for me in the climate change debate was a decade-old opinion piece in New Scientist. It stated that we should make every possible effort to prevent climate change, especially in the unlikely case that it was not caused by man, because that would mean that all we can do is palliate a natural phenomenon.</p>
    <p>Our research points in the same direction. If resistance is already out there, drug development can offer only temporary relief. The challenge then is not to quell resistance, but to avoid its spread. It is a big challenge, but not an insurmountable one. Not feeding wonder drugs to pigs would do nicely, for starters.</p>
    <p>* * * * *</p>
    <p><em><a href="https://theconversation.com/profiles/ivan-erill-724916" rel="nofollow external" class="bo">Ivan Erill</a>, Associate Professor of Biological Sciences, <a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p><em>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="http://theconversation.com/antibiotic-resistance-is-not-new-it-existed-long-before-people-used-drugs-to-kill-bacteria-115836" rel="nofollow external" class="bo">original article</a>.</em></p>
    <p><em>Header image by <a href="https://unsplash.com/@drew_hays?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText" rel="nofollow external" class="bo">Drew Hays</a> on <a href="https://unsplash.com/search/photos/bacteria?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText" rel="nofollow external" class="bo">Unsplash</a></em><br>
    </p></div>
]]>
</Body>
<Summary>Ivan Erill, Associate Professor, Biological Sciences, UMBC   Imagine a world where your odds of surviving minor surgery were one to three. A world in which a visit to the dentist could spell...</Summary>
<Website>https://umbc.edu/stories/antibiotic-resistance-is-not-new-it-existed-long-before-people-used-drugs-to-kill-bacteria/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/120119/guest@my.umbc.edu/b17980c52040455ddb9b8a3c9217435e/api/pixel</TrackingUrl>
<Tag>biological-sciences</Tag>
<Tag>discovery</Tag>
<Tag>the-conversation</Tag>
<Group token="umbc-news-magazine">UMBC News &amp;amp; Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-news-magazine</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/original.png?1748556657</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/large.png?1748556657</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/medium.png?1748556657</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/small.png?1748556657</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxsmall.png?1748556657</AvatarUrl>
<Sponsor>UMBC News &amp; Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 15:27:30 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="120120" important="false" status="posted" url="https://beta.my.umbc.edu/posts/120120">
<Title>UMBC&#8217;s Sarah Stellwagen first in world to sequence genes for spider glue</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Today in </span><em><span>Genes, Genomes, Genetics, </span></em><span>UMBC postdoctoral fellow </span><strong>Sarah Stellwagen</strong><span> and co-author Rebecca Renberg at the Army Research Lab <a href="https://www.g3journal.org/content/9/6/1909" rel="nofollow external" class="bo">published</a> the first-ever complete sequences of two genes that allow spiders to produce glue</span><span>—</span><span>a sticky, modified version of spider silk that keeps a spider’s prey stuck in its web. </span></p>
    <p><span>The innovative method they employed could pave the way for others to sequence more silk and glue genes, which are challenging to sequence because of their length and repetitive structure. Better understanding of these genes could move scientists closer to the next big advance in biomaterials.</span></p>
    <h4><strong>Sticky solutions</strong></h4>
    <p><span>Spider silk is what spider webs are made of, and it’s been touted for years as the next big thing in biomaterials because of its unusual tensile strength combined with its flexibility. There are more than 45,000 known species of spiders, each of which makes between one and seven types of silk. However, despite many partial sequences, less is known about the full genetic structure of spider silk: Only about 20 complete genes have been sequenced. “Twenty pales in comparison to what’s out there,” Stellwagen says.</span></p>
    <p><span>Plus, spider silk has proven tough to produce in large amounts. Spiders convert liquid blobs of silk into solid, spindly fibers in a complex process inside their bodies. Scientists can make the liquid, but “we can’t replicate the process of going from liquid to solid on a large industrial scale,” Stellwagen says. </span></p>
    <a href="/wp-content/uploads/2019/06/Burns-arachnid-lab-1726.jpg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/Burns-arachnid-lab-1726-1024x683.jpg" alt="" width="720" height="480" style="max-width: 100%; height: auto;"></a>Sarah Stellwagen with her pet baby orange-kneed tarantula.
    <p><span>Spider glue, however, is a liquid both inside and outside the spider. While the glue “does have its own challenges,” Stellwagen says, that difference might make spider glue easier to produce in a lab than silk.</span></p>
    <p><span>Stellwagen sees great potential for spider glue applications as organic pest control. After all, she says, “This stuff evolved to capture insect prey.” </span></p>
    <p><span>For example, farmers could spray the glue along a barn wall to protect their livestock from insects that bite or cause disease, and then could rinse it off without worrying about polluting waterways with dangerous pesticides. They could use glue similarly to protect crops from pests. It could also be applied in areas where mosquito-borne illnesses are prevalent. “It could also just be fun to play with,” Stellwagen says.</span></p>
    <h4><strong>A “behemoth of a gene”</strong></h4>
    <p><span>Before Stellwagen and Renberg’s work, which was funded by the Army Research Lab, the longest silk gene sequenced was about 20,000 base pairs. When she started this project, Stellwagen was expecting to sequence the glue genes quickly and then move on, building on what she learned from the sequence. Instead, it took her and Renberg two years just to finalize the sequence.</span></p>
    <a href="/wp-content/uploads/2019/06/Burns-arachnid-lab-1791.jpg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/Burns-arachnid-lab-1791-1024x683.jpg" alt="" width="720" height="480" style="max-width: 100%; height: auto;"></a>Ph.D. student Tyler Brown and his (and Stellwagen’s) advisor Mercedes Burns, assistant professor of biological sciences, conduct genetic testing on harvestmen DNA. Harvestmen (often called “daddy-long-legs”) are close relatives of spiders.
    <p><span>“It ended up being this behemoth of a gene that’s more than twice as large as the previous largest silk gene,” Stellwagen says. It was a long, hard road to the day </span><span>she found Renberg in the lab</span><span> and said, “I think our gene is 42,000 bases long. I think we finished it.” And in the end, it was taking a risk on a cutting-edge technique that finally yielded the complete sequence.</span></p>
    <p><span>Not only was the gene exceptionally long, but, like spider silk genes, it has many repetitions of the same sequence of bases—A, T, G, and C—in the middle. Modern sequencing techniques (called “next generation sequencing”) work by generating DNA sequences for all of an organism’s genes, but chopped up in little pieces. Then, like solving a puzzle, scientists must match up the overlapping ends of the short sections to determine the entire sequence.</span></p>
    <p><span>However, if your gene is repetitive, you need a single sequence, or “read,” that extends from before the repetitious region to beyond the end to know how many repetitions there are. If your repetitious section is long, as it is in the glue genes Stellwagen and Renberg studied, the chance that you would get the read you need with next-generation methods is slim.</span></p>
    <a href="/wp-content/uploads/2019/06/Burns-arachnid-lab-1755.jpg" rel="nofollow external" class="bo"><img src="/wp-content/uploads/2019/06/Burns-arachnid-lab-1755-1024x683.jpg" alt="" width="720" height="480" style="max-width: 100%; height: auto;"></a>Sarah Stellwagen discusses spider biology with Tyler Montgomery ’20, biochemistry and biological sciences, and Genevieve Ahearn ’19, biological sciences and environmental science.
    <p><span>Fortunately, “third-generation” sequencing techniques are now available. Third-generation sequencing produces longer reads, but fewer of them. Only by repeating the experiment several times do you have a chance of getting the reads you need to determine the number of repetitions and finally define the gene’s entire sequence. “It’s challenging,” says Stellwagen. “You’re picking a needle from a haystack.”</span></p>
    <p><span>But it worked. After two years of going to the computer and not seeing positive results, Stellwagen and Renberg finally got the reads they needed to define the entire gene’s sequence. </span></p>
    <p><span>Stellwagen is already thinking ahead to what comes next. “Now that we have a protocol for discovering full-length silk genes, what do silks from other species look like?” she asks.</span></p>
    <p><span>“I’m super excited that I was able to finally figure out the puzzle, because it was just so hard,” Stellwagen says. While it was a much bigger challenge than she expected, “Ultimately we learned a lot, and I am happy to put that out there for the next person who is trying to solve some ridiculous gene.”</span></p>
    <p><em>Banner image: Sarah Stellwagen (left) and her postdoctoral advisor Mercedes Burns work together in the lab. All photos by Marlayna Demond ’11 for UMBC.</em></p>
    <p><em>Read the <a href="https://www.g3journal.org/content/9/6/1909" rel="nofollow external" class="bo">complete article</a> in </em>G3: Genes, Genomes, Genetics<em>.</em></p></div>
]]>
</Body>
<Summary>Today in Genes, Genomes, Genetics, UMBC postdoctoral fellow Sarah Stellwagen and co-author Rebecca Renberg at the Army Research Lab published the first-ever complete sequences of two genes that...</Summary>
<Website>https://umbc.edu/stories/umbcs-sarah-stellwagen-first-in-world-to-sequence-genes-for-spider-glue/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/120120/guest@my.umbc.edu/26e5923c9383275cafd58fe1e7fc7127/api/pixel</TrackingUrl>
<Tag>biology</Tag>
<Tag>cnms</Tag>
<Tag>page1</Tag>
<Tag>research</Tag>
<Tag>science-and-technology</Tag>
<Group token="umbc-news-magazine">UMBC News &amp;amp; Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-news-magazine</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/original.png?1748556657</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xlarge.png?1748556657</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/large.png?1748556657</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/medium.png?1748556657</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/small.png?1748556657</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xsmall.png?1748556657</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/943/24435aa6207c452e7bc15cc74b42c7bb/xxsmall.png?1748556657</AvatarUrl>
<Sponsor>UMBC News &amp; Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 14:09:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="84869" important="false" status="posted" url="https://beta.my.umbc.edu/posts/84869">
<Title>Ruken Isik Passes her Proposal Defense</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>As a committee member, Dr. Beverly Bickel (LLC) is pleased to announce that Ruken Isik, of LLC Cohort 17, successfully and skillfully defended her powerful dissertation proposal on May 30, 2019. Her title is: "Livable, Lovable, Grievable Lives: Kurdish Women Funerals in Turkey-Kurdistan." <br></div><div><br></div><div>Ruken is investigating Kurdish women's activism at the funerals of Kurdish women guerillas and women who are the victims of 'honor crimes' using feminist theory and methodology. The foundational question that this dissertation will address is: What moves Kurdish women to take action at these funeral sites?</div><div><br></div><div>Many thanks to Ruken's committee members:</div><div><br></div><div>Dr. Carole McCann (GWST), Chair</div><div>Dr. Amy Bhatt (GWST)</div><div>Dr. Mejdulene Shomali (GWST)</div><div>Dr. Emek Ergun (UNC at Charlotte, Women's and Gender Studies Program &amp; Department of Global Studies)</div><div><br></div><div>Please join us in congratulating Ruken on reaching this significant milestone in her doctoral work!<br></div></div>
]]>
</Body>
<Summary>As a committee member, Dr. Beverly Bickel (LLC) is pleased to announce that Ruken Isik, of LLC Cohort 17, successfully and skillfully defended her powerful dissertation proposal on May 30, 2019....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84869/guest@my.umbc.edu/6fd071e53dd5294be6260b8cc5f0f9d9/api/pixel</TrackingUrl>
<Tag>feminist-theory</Tag>
<Tag>proposal-defense</Tag>
<Group token="llc">Language, Literacy and Culture Doctoral Program</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/llc</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/xsmall.png?1375383725</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/original.jpg?1375383725</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/xxlarge.png?1375383725</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/xlarge.png?1375383725</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/large.png?1375383725</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/medium.png?1375383725</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/small.png?1375383725</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/xsmall.png?1375383725</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/537/e594b22cf15b445f7476775aa508e9c3/xxsmall.png?1375383725</AvatarUrl>
<Sponsor>Language, Literacy and Culture Doctoral Program</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 13:45:58 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="84868" important="true" status="posted" url="https://beta.my.umbc.edu/posts/84868">
<Title>Introduction to R for Social Scientists Online Course</Title>
<Tagline>Spots Available through CS3</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Learn how to use </span><strong><em><span><a href="https://www.r-project.org" rel="nofollow external" class="bo">R</a></span></em></strong><span>, a free software program for </span><span>statistical computing and graphics</span><span>!</span></p><p><span> </span></p><p><span>The Center for Social Science Scholarship is partnering with<a href="https://campus.sagepub.com" rel="nofollow external" class="bo"> </a></span><span><a href="https://campus.sagepub.com" rel="nofollow external" class="bo">SAGE Campus </a></span><span>to offer a <em>free </em>30 day </span><strong><span><a href="https://www.youtube.com/watch?v=h-CPehUdgGE&amp;feature=youtu.be" rel="nofollow external" class="bo">Introduction to R for Social Scientists </a></span></strong><span>online course.</span></p><p><span> </span></p><p><span>The course will open on <strong><u>June 17</u></strong>.  It takes around 12 hours to complete, and learners will be given 30-day access to complete the course at their own pace. <a href="https://campus.sagepub.com/introduction-to-r#introduction-to-r/intro" rel="nofollow external" class="bo"> </a></span><span><a href="https://campus.sagepub.com/introduction-to-r#introduction-to-r/intro" rel="nofollow external" class="bo">Course objectives and more information are available here</a></span><span>.</span></p><p><span> </span></p><p><strong><u><span>Enrollment is limited to 5 learners, on a first-come, first-served basis</span></u></strong><span>. Email </span><a href="mailto:socialscience@umbc.edu" rel="nofollow external" class="bo"><span>socialscience@umbc.edu</span></a><span>to indicate your interest, and please provide your full name, preferred email address, affiliation, and home department. </span></p><p><span> </span></p><p><span>Since enrollment is limited, please sign up only if you are certain you can complete the course!  We will confirm if you have been selected. If capacity is full, we will add your name to a waiting list as we gauge interest in offering this or similar courses again in the future. </span></p></div>
]]>
</Body>
<Summary>Learn how to use R, a free software program for statistical computing and graphics!     The Center for Social Science Scholarship is partnering with SAGE Campus to offer a free 30 day Introduction...</Summary>
<Website>https://socialscience.umbc.edu/funding-opportunities/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84868/guest@my.umbc.edu/e13831ff1b47d8605999aef238476334/api/pixel</TrackingUrl>
<Group token="csss">Center for Social Science Scholarship</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csss</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/xsmall.png?1544752142</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/original.png?1544752142</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/xxlarge.png?1544752142</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/xlarge.png?1544752142</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/large.png?1544752142</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/medium.png?1544752142</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/small.png?1544752142</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/xsmall.png?1544752142</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/825/333a55a4dd50a0fafb33f7e2e5b0df03/xxsmall.png?1544752142</AvatarUrl>
<Sponsor>Center for Social Science Scholarship</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/xxlarge.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/xlarge.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/large.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/medium.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/small.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/xsmall.jpg?1559754870</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/084/868/e9c6c733edcd364f2bc35a45d403cff8/xxsmall.jpg?1559754870</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 13:15:40 -0400</PostedAt>
<EditAt>Wed, 05 Jun 2019 13:16:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="106077" important="false" status="posted" url="https://beta.my.umbc.edu/posts/106077">
<Title>Hackers Seek Ransoms from Baltimore and Communities Across the US</Title>
<Body>
<![CDATA[
    <div class="html-content">Many state and local governments, including Baltimore, remain underprepared and underfunded to adequately deal with cybersecurity’s many challenges.</div>
]]>
</Body>
<Summary>Many state and local governments, including Baltimore, remain underprepared and underfunded to adequately deal with cybersecurity’s many challenges.</Summary>
<Website>https://magazine.umbc.edu/hackers-seek-ransoms-from-baltimore-and-communities-across-the-us/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/106077/guest@my.umbc.edu/ef055c47cecea8ad06467d6a9a2147ae/api/pixel</TrackingUrl>
<Tag>baltimore</Tag>
<Tag>cybersecurity</Tag>
<Tag>malware</Tag>
<Tag>nsa</Tag>
<Tag>perspectives</Tag>
<Tag>ransomware</Tag>
<Tag>the-conversation</Tag>
<Group token="umbc-magazine">UMBC Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-magazine</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/5/xsmall.png?1777560876</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/5/original.png?1777560876</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/5/xxlarge.png?1777560876</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/5/xlarge.png?1777560876</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/5/large.png?1777560876</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/5/medium.png?1777560876</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/5/small.png?1777560876</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/5/xsmall.png?1777560876</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/5/xxsmall.png?1777560876</AvatarUrl>
<Sponsor>UMBC Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 12:59:06 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="106078" important="false" status="posted" url="https://beta.my.umbc.edu/posts/106078">
<Title>Spider Glue&#8217;s Sticky Secret Revealed By New Genetic Research</Title>
<Body>
<![CDATA[
    <div class="html-content">Using new technology, a UMBC researcher and her colleague have been able to sequence the first full genetic sequences that code for spider glue proteins.</div>
]]>
</Body>
<Summary>Using new technology, a UMBC researcher and her colleague have been able to sequence the first full genetic sequences that code for spider glue proteins.</Summary>
<Website>https://magazine.umbc.edu/spider-glues-sticky-secret-revealed-by-new-genetic-research/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/106078/guest@my.umbc.edu/9a83b457a92e1ee8e862cf868afa85f8/api/pixel</TrackingUrl>
<Tag>biology</Tag>
<Tag>discovery</Tag>
<Tag>dna</Tag>
<Tag>genes</Tag>
<Tag>graduateschool</Tag>
<Tag>spiders</Tag>
<Tag>the-conversation</Tag>
<Group token="umbc-magazine">UMBC Magazine</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-magazine</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/5/xsmall.png?1777560876</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/5/original.png?1777560876</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/5/xxlarge.png?1777560876</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/5/xlarge.png?1777560876</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/images/avatars/group/5/large.png?1777560876</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/5/medium.png?1777560876</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/5/small.png?1777560876</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/5/xsmall.png?1777560876</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/5/xxsmall.png?1777560876</AvatarUrl>
<Sponsor>UMBC Magazine</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 05 Jun 2019 11:37:48 -0400</PostedAt>
</NewsItem>

</News>
