Interdisciplinary blog

Uncategorized

Twitter harvesting

December 14, 2012
by Luke Goater via Digital Economy USRG

By Amir Aryaarjmand. At the Creative DigiFest #SxSC2, Adam Field talked about a ‘Lightweight Twitter Harvester’, featuring his service. I arranged an interview with him to know more about this service and here is the summary of my interview, a tutorial on how to use the service and comments from colleagues working on related initiatives. Regarding […]

Continue reading

Data management

December 11, 2012
by Jeremy Frey via Computational Intensive Imaging Blog

Data management is in general a major problem in research but the joint experimental and computational aspects of CII research, and the tendency for this work to be collaborative, makes the data management a very time consuming task.  Research projects in Southampton over the last 5 years have covered many aspects of good practice and […]

Continue reading

Mendeley Group set up

December 11, 2012
by Alison Simmance via Computational Intensive Imaging Blog

We have created a Mendeley Group for for CII USRG – “Computationally Intensive Imaging”.  This is an “Open” Mendeley Group (http://www.mendeley.com/groups/2874091/computationally-intensive-imaging/) so please add references that your think would be of general interest to CII members.

Continue reading

Royal Society X-ray imaging Events

December 10, 2012
by William Brocklesby via Computational Intensive Imaging Blog

I’d like to draw everyone’s attention to the following Royal Society meeting and workshop on X-ray imaging, which may well, be of interest to some of the CII group: 1)      Taking x-ray phase contrast imaging into mainstream applications- 9:00 am on Monday 11 February 2013 – 5:00 pm on Tuesday 12 February 2013 This meeting […]

Continue reading

SuperIdentity – examining identity in the real and cyber world

December 10, 2012
by Mark Nixon via Computational Intensive Imaging Blog

Academics at the University of Southampton, one of eight universities to have secured a government grant to extend its research on biometrics, have been investigating new approaches to biometrics which relate human vision to computer vision to enable recognition of people. It’s called soft biometrics and essentially concerns using human descriptions within automatic computer vision […]

Continue reading

My experience as a Digital Champion at Random Hacks of Kindness (#RHoKSoton)

December 4, 2012
by Luke Goater via Digital Economy USRG

Random Hacks of Kindness was a delightful experience for the Digital Champions. Before the event we met twice to learn more about #RHoK, our tasks, and technologies that we were not familiar with, and that we were supposed to use during this social hacking weekend. Ivan (@IvanMelendezCh) was responsible for managing the Digital Champions and […]

Continue reading

Computationally Intensive Imaging Blog

November 29, 2012
by Hembo Pagi via Computational Intensive Imaging Blog

Bringing you the very latest news and discussions on imaging activities across the University!
This monthly blog is brought to you by the chairs of the CII USRG: Jeremy Frey, Bill Brocklesby, Ian Sinclair.

Continue reading

Random Hacks of Kindness Event: 1st – 2nd December at University of Southampton #rhoksoton

November 26, 2012
by Lisa Harris via Digital Economy USRG

Dirk Gorissen from Engineering is running this weekend’s Random Hacks of Kindness (RHoK) event in the University of Southampton Mountbatten Building (53). It takes place in the Common Room on Level 3. A RHoK (founded by Google, Microsoft, Nasa, and others) is all about bringing domain experts, programmers, and makers together for a weekend in […]

Continue reading

Hacking the Notion of Cyber Security

November 19, 2012
by Jussi Parikka via Digital Economy USRG

Cyber security might have become a widespread term in public debate, government security arrangements as well as funding bodies’ strategical directions but it has longer historical and cultural roots. The recent organisation of security and defence around the at times ephemeral seeming threats of “the cyber” is pitched as a necessary move to combat the […]

Continue reading

Authors