Search

20131 results for: ‘webcentre plone build basics add images alt text’

  • Travel

    Providing infrastructure and procedures that enable staff and students to follow the University’s sustainable travel hierarchy of: ‘Avoid unnecessary travel; Reduce travel; Choose efficient low-carbon travel; Maximise the benefits of the travel.’

  • Professional Development: elective/internship in midwifery

    Module code: MW3013 This module is an exciting opportunity for you to undertake an elective or internship placement in a clinical practice, education, leadership or research setting.

  • New theorems could help robots to correct errors on-the-fly and learn from each other

    Errors in Artificial Intelligence which would normally take a considerable amount of time to resolve could be corrected immediately with the help of new research by Leicester mathematicians.

  • Schools, colleges and community

    Working with UK schools and colleges, plus the local community. Support for students, teachers, advisers, and University of Leicester's local community.

  • Dean of Research celebrates awards and nominations

    We are hugely pleased that our Dean of Research, Professor Mat Hughes, has recently been longlisted for one award and won another.

  • Social Sciences and Humanities Librarians’ Blog: Academic and staff blogs from the University of Lei

    Academic and staff blogs from the University of Leicester

  • Andrew Dunn: Page 93

    Academic Librarian.

  • School of Business drives performance

    The School of Business is working with the Sytner Group on a new training and development programme to enhance their sales performance.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU