Search
-
Buried ‘without any pompe or solemne funeral…’
https://le.ac.uk/richard-iii/richard-iii-and-leicester/buried
After the battle, Richard’s corpse was returned to Leicester, accompanied by Henry Tudor and the victorious Lancastrian army. By all accounts, Richard’s body was not treated well after the battle.
-
Immigration and indigenism in popular historical discourses
https://le.ac.uk/impact-of-diasporas/projects/immigration-and-indigenism
Research Associate: Dr Marc Scully The relationship between a sense of national or regional identity and collective memory has been a matter of longstanding concern across a range of disciplines, including social psychology, sociology, history and politics.
-
Senate regulation 3: Regulations governing fees
https://le.ac.uk/policies/regulations/senate-regulations/senate-regulation-3
Downloadable version of Senate Regulation 3 (PDF, 229KB) General 3.1 These regulations apply to all students registered at the University on a taught programme of study, and to associate students registered on one or more modules.
-
Professor George Fraser
https://le.ac.uk/bepicolombo/meet-the-team/professor-george-fraser
George Fraser was born 22 July 1955 near Inverness and was a proud Highlander.
-
Hidden inscriptions hint at mystery medieval woman’s identity
https://le.ac.uk/news/2022/november/insular-manuscript-medieval-inscriptions
Drawings and the name ‘Eadburg’ found scratched into early medieval manuscript by University of Leicester PhD student.
-
Locating the choir within the church
https://le.ac.uk/richard-iii/discovery/locating-the-choir
A small area above the human remains in Trench 1 was carefully widened with a digger to give archaeologists better access to the burial. Jo Appleby and Turi King began to carefully remove the grave soil by hand. Work was slow, to avoid damage to the skeleton.
-
Computer Science with Cyber Security BSc
https://le.ac.uk/courses/computer-science-with-cyber-security-bsc/2026
Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.
-
Computer Science with Cyber Security BSc
https://le.ac.uk/courses/computer-science-with-cyber-security-bsc/2027
Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.
-
Playing Prometheus: some reflections from Australia
https://staffblogs.le.ac.uk/carchipelago/2014/11/19/playing-prometheus-some-reflections-from-australia/
Blog on Australia Convict heritage sites and archives
-
Colin Hyde: Page 3
https://staffblogs.le.ac.uk/specialcollections/author/colin_hyde/page/3/
Colin Hyde manages the East Midlands Oral History Archive, based in Special Collections.