<node id="501361">
  <nid>501361</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1455656085</created>
  <changed>1475896835</changed>
  <title><![CDATA[Air Forces Names Organizations for $5B Cyber Research Project]]></title>
  <body><![CDATA[<p>U.S. Air Force cybersecurity experts are choosing 10 more companies to draw from a pot of money as large as $5 billion over the next five years for military cybersecurity and <a href="http://www.militaryaerospace.com/articles/2015/03/darpa-brandeis-solicitation.html">information systems</a> research and development. Officials of the U.S. Air Force Installation Contracting Agency at Offutt Air Force Base, Neb., announced the contracts Thursday for the Cyber Security Technical Area Tasks (CS TATs) program. The contracts were awarded on behalf of the Air Force Combat Command.</p><p>&nbsp;</p><p><a href="http://www.militaryaerospace.com/articles/2015/11/air-force-cyber.html" target="_blank">Read more</a> in Military &amp; Aerospace Electronics</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2015-11-23T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[The U.S. Air Forces names 10 organizations to share in cybersecurity research project.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>U.S. Air Force cybersecurity experts choose 10 more companies to share in a $5-billion research project over the next five years, now including the Georgia Tech Research Institute.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="501371">
            <nid>501371</nid>
            <type>image</type>
            <title><![CDATA[USAF F-16]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>204125</fid>
                  <filename><![CDATA[usaf_f-16.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/usaf_f-16_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/usaf_f-16_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[USAF F-16]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>416</tid>
        <value><![CDATA[GTRI]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
          <item>
        <tid>9696</tid>
        <value><![CDATA[US Air Force]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
