{"id":34,"date":"2022-11-15T23:42:50","date_gmt":"2022-11-15T23:42:50","guid":{"rendered":"https:\/\/blogs.uca.edu\/computerscience\/?page_id=34"},"modified":"2022-11-29T01:21:27","modified_gmt":"2022-11-29T01:21:27","slug":"events","status":"publish","type":"page","link":"https:\/\/blogs.uca.edu\/computerscience\/events\/","title":{"rendered":"Events"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"158\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1-1024x158.png\" alt=\"\" class=\"wp-image-261\" srcset=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1-1024x158.png 1024w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1-300x46.png 300w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1-768x118.png 768w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1-1536x236.png 1536w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1.png 1950w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n      <div id='pgcalendar'>loading...<\/div>\n      <div class='pgcal-branding'>Powered by <a href='https:\/\/wordpress.org\/plugins\/pretty-google-calendar\/'>Pretty Google Calendar<\/a><\/div>\n\n    \n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Past Events<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-soliloquy-soliloquywp\"><div aria-live=\"polite\" id=\"soliloquy-container-175\" class=\"soliloquy-container soliloquy-transition-fade  soliloquy-theme-classic\" style=\"max-width:960px;max-height:500px;\"><ul id=\"soliloquy-175\" class=\"soliloquy-slider soliloquy-slides soliloquy-wrap soliloquy-clear\"><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-1 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-178\" class=\"soliloquy-image soliloquy-image-1\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/20221007_172457-scaled-960x500_c.jpg\" alt=\"20221007_172457\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-2 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-179\" class=\"soliloquy-image soliloquy-image-2\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/20221008_143954-scaled-960x500_c.jpg\" alt=\"20221008_143954\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-3 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-180\" class=\"soliloquy-image soliloquy-image-3\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/20221009_104936-scaled-960x500_c.jpg\" alt=\"20221009_104936\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-4 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-181\" class=\"soliloquy-image soliloquy-image-4\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/IMG_4852-960x500_c.jpg\" alt=\"IMG_4852\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-5 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-182\" class=\"soliloquy-image soliloquy-image-5\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/IMG_4853-960x500_c.jpg\" alt=\"IMG_4853\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-6 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-251\" class=\"soliloquy-image soliloquy-image-6\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/20220915_134256-1-scaled-960x500_c.jpg\" alt=\"20220915_134256\" \/><\/li><li aria-hidden=\"true\" class=\"soliloquy-item soliloquy-item-7 soliloquy-image-slide\" draggable=\"false\" style=\"list-style:none\"><img id=\"soliloquy-image-252\" class=\"soliloquy-image soliloquy-image-7\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/20220915_142436-1-scaled-960x500_c.jpg\" alt=\"20220915_142436\" \/><\/li><\/ul><\/div><noscript><style type=\"text\/css\">#soliloquy-container-175{opacity:1}<\/style><\/noscript><\/div>\n\n\n\n<p><br><br>Previous speakers and competitions include Acxiom, First Orion, Schellman, Gainwell, FBI cybersecurity field agents, Metova, Baptist Health, National Cyber League 2022, and the JOLT Cyber Challenge 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Past Events Previous speakers and competitions include Acxiom, First Orion, Schellman, Gainwell, FBI cybersecurity field agents, Metova, Baptist Health, National Cyber League 2022, and the JOLT Cyber Challenge 2022.<\/p>\n","protected":false},"author":152,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/34"}],"collection":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":16,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/34\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}