{"id":36,"date":"2014-06-13T15:52:43","date_gmt":"2014-06-13T15:52:43","guid":{"rendered":"https:\/\/blogs.ncl.ac.uk\/security\/?p=36"},"modified":"2014-06-13T15:57:18","modified_gmt":"2014-06-13T15:57:18","slug":"first-post","status":"publish","type":"post","link":"https:\/\/blogs.ncl.ac.uk\/security\/2014\/06\/13\/first-post\/","title":{"rendered":"First post"},"content":{"rendered":"<p>This post is to announce the birth of &#8220;Security Upon Tyne&#8221; &#8211; a blog on security research at the School of Computing Science, Newcastle University, Newcastle-upon-Tyne, UK.<\/p>\n<p>We hope this blog will provide a platform to facilitate two-way communication: 1) to disseminate our research results to people outside the school; 2) more importantly, to allow any reader over the Internet to comment, scrutinize and criticize our work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post is to announce the birth of &#8220;Security Upon Tyne&#8221; &#8211; a blog on security research at the School of Computing Science, Newcastle University, Newcastle-upon-Tyne, UK. We hope this blog will provide a platform to facilitate two-way communication: 1) &hellip; <a href=\"https:\/\/blogs.ncl.ac.uk\/security\/2014\/06\/13\/first-post\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4854,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-36","post","type-post","status-publish","format-standard","hentry","category-announcement"],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/4854"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":3,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":40,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/36\/revisions\/40"}],"wp:attachment":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/categories?post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/tags?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}