{"total":3,"offset":0,"limit":50,"entries":[{"year":2018,"section":"Seminars","path":"/2018/seminars/my-experience-building-deep-space-expedition","title":"My experience building deep space expedition","author":"Juho Kastemaa","thumbnails":{"default":{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-160w.jpeg?WjEi93","size":{"x":160,"y":90},"type":"image/jpeg"},"Sources":[{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-160w.jpeg?WjEi93","size":{"x":160,"y":90},"type":"image/jpeg"},{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-200w.jpeg?gPTinj","size":{"x":200,"y":112},"type":"image/jpeg"},{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-240w.jpeg?gJ9-cO","size":{"x":240,"y":135},"type":"image/jpeg"},{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-320w.jpeg?N5Hcg_","size":{"x":320,"y":180},"type":"image/jpeg"},{"path":"/_data/2018/seminars/my-experience-building-deep-space-expedition/thumb-e7N5ArG-fbI-480w.jpeg?qFwrTq","size":{"x":480,"y":270},"type":"image/jpeg"}]}},{"year":2010,"section":"Seminars","path":"/2010/seminars/relevance-of-security-in-networked-world","title":"Relevance of Security in Networked world","author":"Janne Tägtström","thumbnails":{"default":{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-160w.jpeg?d_4N6ohF","size":{"x":160,"y":90},"type":"image/jpeg"},"Sources":[{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-160w.jpeg?d_4N6ohF","size":{"x":160,"y":90},"type":"image/jpeg"},{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-200w.jpeg?T14EjJk6","size":{"x":200,"y":112},"type":"image/jpeg"},{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-240w.jpeg?jTbh41oy","size":{"x":240,"y":135},"type":"image/jpeg"},{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-320w.jpeg?yR-87DHN","size":{"x":320,"y":180},"type":"image/jpeg"},{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-480w.jpeg?dCqdQzGR","size":{"x":480,"y":270},"type":"image/jpeg"},{"path":"/_data/2010/seminars/relevance-of-security-in-networked-world/thumb-b11Q2Ab5E10-640w.jpeg?DYziZyD4","size":{"x":640,"y":360},"type":"image/jpeg"}]}},{"year":1999,"section":"PC demo","path":"/1999/pc-demo/edison-by-tst","title":"Edison","author":"TsT","thumbnails":{"default":{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-160w.jpeg?oQaRA0GN","size":{"x":160,"y":90},"type":"image/jpeg"},"Sources":[{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-160w.jpeg?oQaRA0GN","size":{"x":160,"y":90},"type":"image/jpeg"},{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-200w.jpeg?tzBPjefh","size":{"x":200,"y":112},"type":"image/jpeg"},{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-240w.jpeg?WAhs1BKN","size":{"x":240,"y":135},"type":"image/jpeg"},{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-320w.jpeg?YJepSCrx","size":{"x":320,"y":180},"type":"image/jpeg"},{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-480w.jpeg?fOn7fCxc","size":{"x":480,"y":270},"type":"image/jpeg"},{"path":"/_data/1999/pc-demo/edison-by-tst/thumb-ZhoTKZQ2yLM-640w.jpeg?8y9jUyev","size":{"x":640,"y":360},"type":"image/jpeg"}]}}]}