Browse: Faculty of Physical & Applied Sciences > School of Electronics and Computer Science

Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Group by: No Grouping | Name | Item Type
Jump to: Collection | Resource
Number of items: 164.

Collection

collection
Collaborative Working
Shared with: Selected Users

collection
Commercial Issues in IT
Shared with: Selected Users

collection
Computational Systems
some resources on agile methods and enterprise architecture frameworks

Shared with: Selected Users

collection
IT Modelling
Shared with: Selected Users

collection
IT Systems
resources for the new 15 credit IT Systems module.

Shared with: Selected Users

collection
Laser Work
Shared with: Selected Users

collection
Object Orientated PHP
To replace Application Scripting and Contemporary Programming Principles

Shared with: Selected Users

collection
Web Design
A collection of resources created for the Web Design Module. Please note that this link directs you to another share.

Shared with: Selected Users

Resource

A User-Centric Approach to eCertificate for Electronic Identities (eIDs) Management in Mobile Environment
The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment with a user-centric approach. Mobile devices have been chosen because they provide mobility, personal use and high computational complexity. The inherent user-centricity also allows the user to personally manage the ID information and to display only what is required. The chosen path to develop the protocol is to migrate the existing eCert technologies implemented by the Learning Societies Laboratory in Southampton. By comparing this protocol with the analysis of the eID problem domain, a new solution has been derived which is compatible with both systems without loss of features.

Profile PictureMr Michele Schiano Di Zenise
Shared with: University

Agile methodologies
Outlines of both Scrum and Dynamic Systems Development Model

Shared with: Selected Users

Aproaches to Learning
Covers some of ways people think about learning - used for first year class to help them think about what they are doing and what works best for them.

Shared with: World

And 1 more...
Case Studies
Case studies related to content taught in IT Systems. CASE STUDY LIST: Banco do Brasil WAN Case Study Brighton WiMAX Case Study Burlington Linux Case Study Google Docs Case Study Networks in Agribusiness Case Study

Shared with: Selected Users

Digital Britain
Only a Digital Britain can unlock the imagination and creativity that will secure for us and our children the highly skilled jobs of the future. Only a Digital Britain will secure the wonders of an information revolution that could transform every part of our lives. Only a Digital Britain will enable us to demonstrate the vision and dynamism that we have to shape the future.

Shared with: World

Enterprise Architecture notes/white papers
A collection of notes and white papers regarding Enterprise Architecture

Shared with: Selected Users

INFO 2009 - Group 9 - KungFu Rabbits
This is the folder for 2011/2012 group 9 for INFO2009 (CWK2). The resource is an interactive website. Users: cre1g10, rjt2g10, gl10g10, jb23g10, jdr1g10

Profile PictureMr James Robinson
Shared with: World

INFO2009 Group 16 - The Rice Box Resources
INFO2009, Coursework 2, Green ICT/IT

Profile PictureMiss Yizhi Chen
Shared with: Selected Schools/Units

Laser work
Shared with: Selected Users

Mobile OS Whitepaper Summaries
A summary of white papers on Android, IOS, Symbian and Series 40 Mobile Operating Systems

Shared with: Selected Users

OpenIMAJ - Tutorial - Simple Mosaic
Profile PictureDr Sina Samangooei
Shared with: World

And 7 more...

Programming Principles: Abstract Classes and Interfaces
In this session we look at how to use Abstract Classes and Interfaces in Object Oriented Design - especially as a way to get all the advantages of multiple inheritance without any of the problems.

Shared with: World

Programming Principles: Designing Applications
In this session we look at the how to use noun verb parsing to try and identify the building blocks of a problem, so that we can start to create object oriented solutions. We also look at some of the challenges of software engineering, and the processes that software engineers use to meet them, and finally we take a look at some more Design Patterns that may help us reuse well known and effective solutions in our own designs.

Shared with: University

Programming Principles: Loops and Arrays
In this session we look at the different types of loop in the Java language, and see how they can be used to iterate over Arrays.

Shared with: World

Programming Principles: Software Design
In this session we look at some of the basics of good code design, including avoiding duplication and designing for loose coupling and high cohesion.

Shared with: University

Programming Principles: Super and Sub-classes
In this session we introduce inheritance - one of the cornerstone concepts of object oriented programming. We look at how to define super and sub-classes, how to maintain encapsulation using the super() constructor, and why it is useful to use substitution to hold references to sub-classes in references typed as their super-class.

Shared with: University

Programming Principles: Testing and Debugging
In this session we look at the sorts of errors that occur in programs, and how we can use different testing and debugging strategies (such as unit testing and inspection) to track them down. We also look at error handling within the program and at how we can use Exceptions to manage errors in a more sophisticated way. These slides are based on Chapter 6 of the Book 'Objects First with BlueJ'

Shared with: University

Purity of Disciplines
XKCD comic showing the purity of diciplines. Although this is funny, you'll soon find out that the humour wears off if you stay in academia.

Shared with: World

REALISE Transferability Workshop
This is about open innovation, open source and assistive technology as part of a JISC project developing an innovation market place for AT projects.

Shared with: World

And 3 more...

Social Networking Technologies: Project Launch
Students taking the 20 credit version of the course (COMP6052) will work in groups of 6 to develop and design a new social networking tool/application/website. The teams will work on their design throughout the semester, and keep a design and development blog that will act as a digital portfolio of their work. At the end of the semester they will also be asked to submit an individual reflective summary that will outline their teams objectives and progress, their part in its progress, and a critical analysis of whether or not they were successful. At the end of the course teams will be asked to pitch their ideas to an interdisciplinary Dragon's Den style panel who will expect them to not only have created something that is technical viable, but will also want to see other economic, social, legal and ethical factors taken into consideration. In this presentation we explain the structure of the group project, what is expected in the blog, and explore some potential ideas to help students understand the scope of the work required. The outcome of the group project does not have to be a fully working piece of software, instead we are looking for a well developed idea that contains enough detail to be convincing to the panel.

Shared with: University

Value in Web 2.0
COMP6051, COMP6052 Notes Social Networking Technologies: Value in Web 2.0

Shared with: University

Web Design Labs
additional Labs created for web design module. Topics covered: HTML 5, Jquery and javascript debugging

Shared with: Selected Users

And 4 more...
Web Design Labs (E-assessment)
Multiple choice quizzes for each lab

Shared with: Selected Users

What is Cybercrime and what do we do about?
A guest lecture by Professor David S.Wall from the University of Durham. This talk will explore the way that networked technology has transformed criminal behaviour. The first part will map out cybercrimes and identify the challenges they pose for both criminologists and also regulators. The second part will show that cybercrimes are informational, networked and global. In this section it will also be shown that cybercrimes are highly disorganised forms of offending when compared to the organisation of more 'traditional' crimes, but display some new organisational logics of their own. The third part of the talk will illustrate how the 'culture of fear' that has arisen around cybercrime has placed demands upon government and police - demands that, for reasons related to the distinct nature of cybercrimes, are hard to resolve. The fourth and final part will look at the new policing arrangements that are designed, it is argued here, to close the reassurance gap.

Shared with: University

Writing Technical Reports and Papers
A brief coverage of the structure of a paper/report and some hints on writing and avoiding plagiarism

Shared with: World

informative website
Profile PictureMr Stelios Mousouros
Shared with: University

INFO2009 - Team 'DROP TABLE groups;
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE groups;

Profile PictureMr Patrick Naish
Shared with: World

Perl Assessment
Perl programming overview for EPrints to support assessment 1

Shared with: World

Personal Learning Environments? or Society’s Learning Environment?
Keynote Presentation at PLE2011. What kind of Web have we got? What kind of Web does a Learning Individual need? What kind of Web does a Learning Society need?

Shared with: World

And 3 more...
Web vs Apps
Shared with: World

And 1 more...
What is the Web?
An introductory lecture on Web Science, taking a kind of devils advocate position by suggesting that the Web is a piece of runaway technology that escaped from research labs prematurely.

Shared with: World

And 3 more...
Policy Skills for Web Scientists
Practical group based work on reading and interrogating evidence and writing policy briefings/critiques

Shared with: World

And 1 more...
INFO2009 A presentation with quiz and tutorial on Web 3.0
A resource for the teaching of concepts involved in 'web 3.0', including a powerpoint presentation with quiz, and accompanying tutorial

Profile PictureMr David Chang
Shared with: University

INFO2009 resource: Infographic on the evolution of Open Source Software
Infographic providing a timeline of important events in the history of open source software since the fifties. Also includes stats for OSS licenses, usage in Business and reasons for participating in an OSS community.

Profile PictureMr Marinos Mavrommatis
Shared with: World

Cyber Crime
Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years.

Shared with: World

Team A (Group 23)
This website has been created to raise awareness of potential issues surrounding file sharing and the penalties than can be imposed if you are caught sharing copyrighted content.

Profile PictureMr Greg Cramer
Shared with: University

And 1 more...

Abstraction: From Transistors to Computers and from Bits to Programs
Takes the Tanenbaum (Structured Computer Organisation) approach to show how application of successive levels of abstraction allow us to understand how computers are made from transitors and how they are programmed.

Shared with: World

And 1 more...
Learning, Teaching and Lesson Planning
This resource was designed for use with MSc Web Scientists as an introduction to a coursework that requires them to produce some teaching materials.

Shared with: World

Timeline of Computing
Actually this is a timeline of Learning Technology but has all teh important dates in it

Shared with: World

Introduction to Research Methods
Just one lecture for first year. Its objective is to show that there exists more than on approach to tackling a research question - and that not all disciplines approach things the same way!

Shared with: World

And 1 more...
Group 15 (Snav) - The Data Protection Act 1998
An online tutorial outlining the definitions and principles of the Data Protection Act. Contains questions on scenarios which allow the user to test their knowledge, as well as a downloadable space-shooter game which gets the user to answer Data Protection Act questions.

Profile PictureMr Liam De Valmency
Shared with: University

Accessible Digital Resources
Accessible etexts from curriculum materials for those with print impairments - strategies for conversion and reading using assistive technologies.

Shared with: World

REALISE project - final case study
This document describes the REALISE project, its successes and challenges. There are transferability plans for sustainability.

Shared with: World

CV workshop resources
slides, example CVs, good and bad, links to relevant sites

Shared with: World

Agile Game: A Project Management Game for Agile Methods
Since mid-1990s, companies have adopted agile methods and incorporated them in their development methodologies. For this reason, future project managers and developers need to have a full understanding of these methods. At present, the university’s approach to agile methods is theoretical and is not reflected during the development of a product and their practical use. The purpose of this project is the creation of a software system in the form of a game, named Agile Game, which simulates their use. The system is designed for use as supplementary material in lectures, to help students understand agile methods, to present their use within a project, and to demonstrate how they differ from traditional project management methodologies. The final system, which is web based, was implemented using PHP, MySQL and JavaScript. It was fully tested against the requirements and evaluated by peer students. The evaluation showed that the majority of users were satisfied with the system but they thought that it should contain more detailed information at every step of the game. For this reason, some parts of the design and the content were reviewed to meet user requirements.

Shared with: World

Linked Data - A little goes a long way
Presentation about the University Linked Open Data Service to Insitutional Web Managers Workshop 2011.

Shared with: World

Southampton Open Data Service - Talk to Digital Economy Group
This is a talk on the new University Open Data Service, some of the applications it's already being put to, and some of the things we hope to do next.

Shared with: World

Health Inequalities
Shared with: University

INFO 2009 Resource
Coursework 2, Security Sock-puppet Show

Profile PictureMiss Emily Rigby
Shared with: University

INFO2009 Group 20 - Resource
INFO2009 2011/2012 Session, Group 20 (One Direction) resource on surveillance

Profile PictureMr David Hulme
Shared with: World

And 1 more...
How The Web Devalues Creativity
By lowering the barriers to communication, the Web has not made it possible for writers to make more money; instead large corporate aggregators are taking advantage of creators to make themselves rich. MaryAnn Johanson is the creator of one of the oldest independent film review sites on the web (flickfilosopher.com). In this lecture she addresses the problems of the long tail for the long tailees. How can a creative professional make a living through the Web, when all the power is held by the aggregators? So much for radical disintermediation... This share contains the lecture slides (see slide #29-30 for the summary of her argument), the lecture audio, further reading, a link to her web site and a critique of The Longer Tail from students at another Web Science Trust Network lab.

Shared with: World

INFO2009 Group 17 - Team Scopophobia - Security
This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security

Profile PictureMr Ignas Kaziukenas
Shared with: World

And 4 more...
Something on legal issues
holding title for set of slides and summary notes to be used in INFO2009

Shared with: World

And 3 more...
Transparency & Privacy
The Transparency Agenda of the 2010/1 UK Coalition government promises to revolutionise government, public services and public engagement, by ‘holding politicians and public bodies to account, reducing the deficit and delivering better value for money in public spending, and realising significant economic benefits by enabling businesses and non-profit organisations to build innovative applications and websites using public data’, to quote the then Prime Minister. This is an ambitious programme with laudable aims, yet it naturally has limits.

Shared with: World

INFO2009 Group 3, FlowerPower - Educational video about DRM
This video contains an overall description of DRM as an introduction, and a discussion about the controversy around DRM techniques.

Profile PictureMr Oscar Mariani Elola
Shared with: University

INFO2009 - Computer Crime Learning Resource
An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009

Profile PictureMr Daniel Corbishley
Shared with: University

Explaination of ArrayList remove() Methods
In the example code you can see that when the remove(Object o) method is called the Integer is not cast to an int and the matching is done using the object's .equals() method rather than using ==

Shared with: World

Open Source Licenses in Academia
A Seminar about the advantages of using open source licenses as a complimentary strategy to the academic publish process.

Shared with: World

A Brief History of the Web
The Web is now so ingrained in our lives that it is easy to forget that it is less than twenty years old. But the History of Web goes back much further, to the pioneering technologists who built the first hypertext systems and the men and women before them who imagined great libraries of interconnected information that would augment human intellect and drive civilization forward. In this lecture we will explore the pre-digital origins of the Web, look at how it developed into the mass communication system we have today, and speculate on the next stages of its evolution in the context of Web Science and Social Media.

Shared with: World

Introduction to the Social Networking Systems Course
These are the Introduction slides for Comp6051 Social Networking Technologies. They outline the structure of the course, and give a (very brief) overview of the topics covered.

Shared with: World

Power and Influence
Like any form of human interaction and communication it is possible to view Social Media as a means for the powerful to influence and control the less powerful. But what is power on social media, how might we measure or affect it, and does it translate to the real world? In this lecture we will look at the philosophical definitions of power, and explore how it has been analysed in social networks and social media systems. We will also look at the characteristics of social networks that impact on power, including Homophily, Heterophily, CyberBalkanization and Thresholds of Collective Action. Finally we will ask what evidence there is that power in social media can affect what goes on in the real world, and explore some real and fictional examples of protest to see what the consequences of social media actually are on sometimes violent political debate.

Shared with: World

Privacy
Privacy is a concept that has been with us for hundreds of years, but it is relatively recently (the last 130 years or so) that it has been seen as something that needs protection as a legal right. Technology has presented many challenges to privacy, from the printing press to recording devices to communication hacking, but Social Media seems to present something new - a phenomenon of people giving up their personal information to an extent that would be considered extraordinary just a generation ago. In this lecture we look at attitudes and behaviors around privacy, see how social norms have shaped our expectations of privacy, and how we have come to trade our privacy for value, making complex (and sometimes ill-informed) risk decisions. We will also explore how people really behave on Social Media systems, to see whether we (as a society) should be concerned about modern attitudes to privacy, and whether there are any advantages that might balance that concern. Finally we look at how technology can be applied to the problems of privacy, both as a preventative measure, but also by aiding transparency and helping people to make better privacy decisions. These slides were updated for 2014.

Shared with: World

Programming Principles: Collections and Iterators
In this session we look at how we can use collection objects like ArrayList as a more advanced type of array. We also introduce the idea of generics (forcing a collection to hold a particular type) and see how Java handles the autoboxing and unboxing of primitives. Finally we look at Iterators, a common design pattern for dealing with iteration over a collection.

Shared with: World

Programming Principles: Computational Thinking
In this session we look at how to think systematically about a problem and create a solution. We look at the definition and characteristics of an algorithm, and see how through modularisation and decomposition we can then choose a set of methods to create. We also compare this somewhat procedural approach, with the way that design works in Object Oriented Systems,

Shared with: World

Programming Principles: Encapsulation and Constructors
In this session we look at the public and protected keywords, and the principle of encapsulation. We also look at how Constructors can help you initialise objects, while maintaining the encapsulation principle.

Shared with: World

Programming Principles: Methods
In this session we look at how to create more powerful objects through more powerful methods. We look at parameters and call by value vs. call by reference; return types; and overloading.

Shared with: World

Programming Principles: Polymorphism
In this session we build on inheritance and look at overriding methods and dynamic binding. Together these give us Polymorphism - the third pillar of Object Oriented Programming - and a very powerful feature that allows us to build methods that deal with superclasses, but whose calls get redirected when we pass in sub-classes.

Shared with: World

Programming Principles: Starting Out
In this lecture we describe the structure of the Programming Principles course at Southampton, look at the definitions and paradigms of programming, and take a look ahead to the key things that we will be covering in the weeks ahead.

Shared with: World

Review: Social Media and Abstract Nouns
The revision slides for our Social Media course, contains major lessons learned throughout the course, and an example exam question (on trust).

Shared with: University

The New Web Literacy
Web 2.0 is sometimes described as the read/write web, giving everyday users the chance to create and share information as well as to consume information created by others. Social media systems are built on this foundation of participation and sharing, but what is the mindset of these users, and are they quite so everyday as we might suppose? The skills and attitudes held by users can be described as their literacy, and there has been a lot of debate over the last few years about how to describe these literacies, and design for them. One field that has been changed radically by this notion is Technology Enhanced Learning (TEL) where a fierce debate has raged about the potential of a new generation of highly literate digital natives, and Edupunks have argued for open and personal systems that challenge traditional models of institutional control. In this session we look at the arguments surrounding digital literacy and examine TEL as an example of how social media can change an application domain.

Shared with: World

The Web 2.0 Development Survival Guide
Building software for Web 2.0 and the Social Media world is non-trivial. It requires understanding how to create infrastructure that will survive at Web scale, meaning that it may have to deal with tens of millions of individual items of data, and cope with hits from hundreds of thousands of users every minute. It also requires you to build tools that will be part of a much larger ecosystem of software and application families. In this lecture we will look at how traditional relational database systems have tried to cope with the scale of Web 2.0, and explore the NoSQL movement that seeks to simplify data-storage and create ultra-swift data systems at the expense of immediate consistency. We will also look at the range of APIs, libraries and interoperability standards that are trying to make sense of the Social Media world, and ask what trends we might be seeing emerge.

Shared with: World

Trust
Trust is a complex philosophical, social and technical notion, but it underlies many of our digital interactions including e-commerce and collective intelligence. In this lecture we will look at how different disciplines, including Psychology, Sociology and Economics have come to understand Trust through the lens of their own studies, aims and goals, and will explore how computer scientists and software engineers have implemented trust models based on policy, provenance and reputation. We will take a closer look at both Global and Local reputation-based trust, and see how assumptions of transitivity and asymmetry are useful. Finally we will explore trust issues around the largest known store of human knowledge: the Wikipedia

Shared with: World

Programming Principles: Introduction to Java
In this lecture we look at key concepts in Java: how to write, compile and run Java programs, define a simple class, create a main method, and use if/else structures to define behaviour.

Shared with: World

Programming Principles: The Java Library
In this session we point you at the Java Library, and go into some more details on how Strings work. We also introduce the HashMap class (a very useful type of collection).

Shared with: World

Programming Principles: Variables, Primitives, Objects and Scope
In this session we look more closely at the way that Java deals with variables, and in particular with the differences between primitives (basic types like int and char) and objects. We also take an initial look at the scoping rules in Java, which dictate the visibility of variables in your program

Shared with: World

And 1 more...
The Digital Dream Team - Digital Divide (Group 4)
This vessel contains the poster and artefact link for The Digital Dream Teams' project

Profile PictureMr Douglas Moore
Shared with: World

E Assessment for Web Design Labs
Small quizzes designed to reinforce learning from web design labs.

Shared with: Selected Users

Introduction to the Library for 1st Year ECS Students
There is an accompanying quiz in Blackboard on the INFO1010 page, and a link to a survey. (Look under Course Documents)

Shared with: University

And 2 more...
Group 19 - Website Resource
Our website is a resource that describes equality and shows examples of bad Web accessibility. The website is hosted at: http://users.ecs.soton.ac.uk/wjvh1g10/index.html

Profile PictureMr Ashley Patrick
Shared with: World

And 1 more...

Science
Shared with: World

INFO1016 Revision Slides
These are the slides where I summarised what I thought are the important parts of the operating systems course. They are mostly slides borrowed from the original course slides, so thank you to Thanassis for those. For full details about the topics, please refer to the full lecture slides and the course textbook.

Shared with: University

Cybercrime - An Interactive Presentation
Presentation slides + mini quiz on the topic of cybercrime.

Profile PictureMiss Cathy Jin
Shared with: University

Toward 2^W beyond Web 2.0
From its inception as a global hypertext system, the Web has evolved into a universal platform for deploying loosely coupled distributed applications. 2^W is a result of the exponentially growing Web building on itself to move from a Web of content to a Web of applications.

Shared with: World

Programming Principles: Exceptions
Slides for COMP1004 Lectures on Exceptions

Shared with: University

Programming Principles: Statics
Slides for COMP1004 Lecture on Statics

Shared with: University

Programming Principles: The Strategy Pattern
Slides for COMP1004 Lecture on the Strategy Pattern

Shared with: University

Social Computing Data Repository
Social Computing Data Repository hosts data from a collection of many different social media sites, most of which have blogging capacity. Some of the prominent social media sites included in this repository are BlogCatalog, Twitter, MyBlogLog, Digg, StumbleUpon, del.icio.us, MySpace, LiveJournal, The Unofficial Apple Weblog (TUAW), Reddit, etc. The repository contains various facets of blog data including blog site metadata like, user defined tags, predefined categories, blog site description; blog post level metadata like, user defined tags, date and time of posting; blog posts; blog post mood (which is defined as the blogger's emotions when (s)he wrote the blog post); blogger name; blog post comments; and blogger social network.

Shared with: World

Group 21 Slartibartfast - Group Resource
Informative website about Anonymous/LulzSec and Denial of Service attacks

Profile PictureMr Jonathan Seager
Shared with: University

Legal Issues in Social Networking
Legal Issues in Social Networking - Analyzed Paper

Profile PictureMr Amir Sezavar Keshavarz
Shared with: World

Motivations for Social Networking at Work
Motivations for Social Networking at Work - Analyzed Paper

Profile PictureMr Amir Sezavar Keshavarz
Shared with: World

Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace
Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace - Analyzed Paper

Profile PictureMr Amir Sezavar Keshavarz
Shared with: World

And 2 more...
INFO 2009 Coursework 2 - Go Green - Group 7 - Green ICT
A Website on GREEN ICT by the Go Green Group as a part of the resource set made for the Info2009 2011-12 coursework

Profile PictureMiss Shreeprabha Aggarwal
Shared with: World

INFO2009 - Team Helios
Resource for INFO2009 Coursework 2 - Team Helios. The video covers the topic of open government data and the benefits and drawbacks to producing and using it.

Shared with: University

And 6 more...

Info2009 CW Tutorial Website
Security Tutorial Website

Profile PictureMr Yupeng Zhou
Shared with: University

Open Access: How the Case Has Been Made
How the argument for Open Access hasd been made to government and the research industry over the last ten years.

Shared with: World

INFO2009 - Group 14: DRM & Copyright
A short video about DRM & Copyright (with chins).

Profile PictureMr Thomas Thorpe
Shared with: University

Information source evaluation matrix
An information source evaluation matrix, produced by the Library at De Montfort University

Shared with: World

INFO2009 Power Point
Profile PictureMr Noel Varanda
Shared with: University

INFO2009 - Security Issues in home computing
By antipirates

Profile PictureMr Noel Varanda
Shared with: University

Green ICT - (JT)2L
A set of lecture slides and accompanying text tutorial.

Profile PictureMr Jhim Verame
Shared with: University

Academic Integrity Resources - links and guides
an online tutorial, a pdf version, a powerpoint presentation, links to regulations.

Shared with: World

Freedom Of Information Act
Link to various resources appropriate for revising the FOI

Shared with: World

Green IT (includes High Powered Computing) - background reading
Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

Shared with: World

INFO1010 Ethics in Practice
Slides with associated activities and reading list to Introduce in Practice to Computer Science and IT undergraduates

Shared with: World

INFO2009 - Information Networks
Process Lecture to identify sources of information, exchange tips and techniques, update the student wiki and contribute to research activities for courseworks (annotated bibliography, poster, information resource)

Shared with: World

INFO2009 Resource Summary 2011-12
Slides which summarise the team resources produced for INFO2009

Shared with: University

PhD Supervision up to 9 months
Information and guidance for students in the early stages of their PhD studies

Shared with: World

And 2 more...
Privacy and Security - background grey literature online
Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

Shared with: World

And 2 more...
Smart Meetings - background reading
Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

Shared with: World

Technical Report Background Reading Guidance and Links
Handout which contains a set of links to a variety of background resources associated with the topics for a technical report coursework. Resources are clustered into three overview areas, but contain links which be used to address each of the six questions scenarios.

Shared with: World

And 10 more...
INFO2009 Educational Resources: Security
Contains visually-appealing and informative "infographics" containing descriptions of common security vulnerabilities and general information about security. Suitable for use in a blog post or printed out and on the wall in an educational area. Also contains video podcasts demonstrating common security exploits in realistic web systems, and offering practical advice on fixing them. Created by "Am and the Raging Otters".

Profile PictureMr Sam Whitehall
Shared with: University

Open Data
Diverse attitudes to open data

Shared with: World

INFO1010 Presentation Slots and Guidance 11-12
summary of requirements and slot allocation

Shared with: World

INFO1010: Organisational Perspectives
lecture in professional issues which looks at organisations likely to employ our students and suggests how students might work towards identifying and achieving their employment objectives

Shared with: World

INFO2009 2011-12 Case Study Examination
materials for open book examination to be held during semester 1 exam period 2011-12

Shared with: University

And 3 more...
Sustainability and Diversity
lecture slides and resources for class mainly concerned with sustainability - also gives recap on perspectives on diversity which have been integrated into other lectures through the semester

Shared with: World

example share for INFO2009
This share is designed to show students how to create a share for their INFO2009 coursework includes link to example video at http://youtu.be/Bcr9AdL7ttc

Shared with: World

This list was generated on Thu Nov 27 00:18:32 2014 GMT.