Category / Computer Science

Team BU develop game based app in just 24 hours

photoWell done Team BU (Chi Zhang, Erika Borkoles, Sarah Collard, Gary Head, Barry Squires and Clare Farrance) for taking part in the Sport England hackathon* last weekend. We had just 24 hours to develop our concept and build a prototype app to help 18-25 year olds become more physically active.

We developed a location based game app called ‘Nudge’ and incorporated social gamification strategies to encourage sustained physical activity adherence. We also sought strategies to help those who are already active in this age group encourage their inactive peers to participate.

The hackathon was a great experience and an excellent opportunity to collaborate across BU faculties and services.

A special mention needs to go to Chi who programmed through the night to make sure we had a working prototype. Hiring an experienced flutter developer can save you a lot of time and money and enable developers to solve complex problems at the last minute.

The winning team will be announced at the Sports Technology Awards in April 2016 and awarded a bursary of £10,000 to help them build the app.

Well done Team BU and fingers crossed for next April!

 

* A hackathon is a portmanteau of the words “hack” and “marathon”, where “hack” is used in the sense of exploratory programming.

Fancy working on a project with the RNLI?

 

RNLIlogo

Following recent  HEIF funding, this project aims to develop an alternative solution by simulating and visualising the lifeboat launching with unmanned vehicles in an immersive virtual environment. Working with staff members at the RNLI and located within The National Centre for Computer Animation (NCCA) at Bournemouth University this role will offer an exciting opportunity to join the NCCA’s research team and be involved in the design of the next generation lifeboat launching system in order to enhance safety and efficiency.

This vacancy is advertised on BU’s website with a closing date of 20 September 2015.

Fusion Investment Fund — Introducing the Bournemouth-Athens Network in Critical Infrastructure Security (BANCIS)

Although largely invisible to us, our lives are dependent on critical infrastructure (CI).  CI is made up of roads, rail, pipelines, power lines, together with buildings, technology, and people.  Some of this infrastructure is modern, but much of it is ageing and interconnected in so many ways that we fail to realise our dependency on CI or its dependencies until its loss disrupts our day-to-day lives.

tech_laptop

 

This dependency has not been lost on governments, which now invest significant sums on securing this infrastructure from cybersecurity threats. Unfortunately, in most cases, this investment entails bolting security mechanisms onto existing infrastructure.  Such investment decisions are made by people with little knowledge of the infrastructure they are securing and, has such, little visibility of the impact that poorly designed security might have on the day-to-day delivery of these critical services.  Moreover, because technology innovation does not evolve at the same pace in different cultures, and security which mitigate the risks faced by critical infrastructure in one country may not be as effective in another.   The reason for these differences are myriad, and range from differences in working practices to expectations about the scale of infrastructure being secured.  There is, therefore, a need to evaluate security solutions against specification exemplars based on these nuanced, representative environments.  However, to develop exemplars of such environments requires data collection and knowledge sharing about nuances associated with particular forms of critical infrastructure for different cultures.

The Bournemouth-Athens Network in Critical Infrastructure Security (BANCIS) project will examine and model the nuances associated with two forms of critical infrastructure in different national cultures.  It will do so by building a network between Cybersecurity researchers at BU, and the Information Security & Critical Infrastructure Protection Laboratory at Athens University of Economics & Business (AUB). These nuances will be modelled as specification exemplars of UK and Greek water and rail companies. By developing these exemplars, researchers and practitioners will be able to conduct a cost-effective evaluation of new ideas based on realistic CI environments.  The exemplars will also help students appreciate the challenges associated with designing security for complex, real-world systems.  The exemplars will be modelled using the CAIRIS security design tool; this is an open-source software product maintained by researchers at BU. The data necessary to build these exemplars will be collected over a series of visits by AUB researchers to BU, and BU researcher to AUB.

Please contact Shamal Faily if you’re interested in finding out more about BANCIS, or getting involved in the project.

Workshop Metastable Dynamics of Neural Ensembles Underlying Cognition

Is the traditional view on cortical activity dynamics, in which the cognitive flow of information wanders through multiple attractor states driven by task-dependent inputs, still a valid model? This picture has been recently challenged both empirically and from the modelling perspective.

The interpretation of the collective dynamics of neuronal assemblies underlying perception and cognitive processing is a very active debate, touching the essence of our understanding of neural computation, and hence one of the most exciting topics in neuroscience. This workshop will address a range of modelling and data analysis approaches which focus on metastable nonlinear dynamics underlying perceptual and cognitive functions in cortex.

The workshop will take Place in Prague, on the 23rd of July of 2015 in the context of the 23rd Computational Neuroscience Meeting; and will have the participation of some of the world-leading scientists in the area. Please find more information in the following link: https://research.bournemouth.ac.uk/2015/03/metastable-dynamics-of-neural-ensembles-underlying-cognition-workshop/

The virtual and the field: enhancing visualisation in archaeology using serious game technologies

The FIF funded collaborative project between the Creative Technology and Archaeology Frameworks has produced another output.

Virtual&Field

A visualisation of the Iron Age banjo enclosure discovered in the Bournemouth University Durotriges Big Dig at Winterborne Kingston has been produced using Unreal Engine 4. The system allows users to explore the environment as it may have appeared in the Iron Age at a human scale.

This was a pilot study that was produced as part of a Fusion Investment Fund project at Bournemouth University in collaboration between staff and students on the Archaeology and Games Technology courses. It is anticipated that the environment will be further developed by Games Technology students as part of their final year project studies with enhancements made to the existing environment and with the addition of visualisations of the same site at different historical periods of habitation.

A fly through of the Iron Age environment can be seen at:

For more information about the visualisation please contact djohn@bournemouth.ac.uk.

An overview of Information Security today and into the future

Kevin Henry is *the* guru in security certifications and training and we are delighted that he will be presenting at the University tomorrow and on Friday 12th of June.  Kevin is going to deliver a handful of lectures which will take you on an enlightening journey through the world of Information Security!

Kevin will present on the following topics:

Thursday 11th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30 pm

Content of the CISSP

What is Information Security and its Role in Business?

2pm – 4pm

How is the face of Information Security Changing?

Hackers versus APTs

Where should my career go?

Friday 12th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30pm

The Value of the CISSP and other Certifications

International Standards and Practices – An Overview of ISO/IEC 27001 and PCI-DSS

If you would like to attend any of the lectures please contact the BU Cyber Security Unit to reserve your place – 01202 962 557 or email 

Kevin is recognized as one of the Leaders in the field of Information Security worldwide. He has been involved in computers since 1976 when he was an operator on the largest minicomputer system in Canada at the time. He has since worked in many areas of Information Technology including Computer Programming, Systems Analysis and Information Technology Audit. Following 20 years in the telecommunications field, Kevin moved to a Senior Auditor position with the State of Oregon where he was a member of the Governor’s IT Security Subcommittee and performed audits on courts and court-related IT systems. The co-chair of the CBK for the CISSP and several other certifications, as well as an author with published articles in over ten books and magazines, Kevin is the principal of KMHenry Management Inc. and served until recently as the Head of Education for (ISC)2 and Vice President of ITPG, responsible for all educational systems, products and instructors for training programs. Currently Kevin is an Authorized Instructor for (ISC)2, ISACA, and BCI.

Visit the BUCSU website for more information on enterprise consultancy, research and education

An overview of Information Security today and into the future

Kevin Henry is *the* guru in security certifications and training and we are delighted that he will be presenting at the University on the 11th and 12th of June.  Kevin is going to deliver a handful of lectures which will take you on an enlightening journey through the world of Information Security!

Kevin will present on the following topics:

Thursday 11th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30 pm

Content of the CISSP

What is Information Security and its Role in Business?

2pm – 4pm

How is the face of Information Security Changing?

Hackers versus APTs

Where should my career go?

Friday 12th June

Shelley Lecture Theatre, Poole House

10.00am – 12.30pm

The Value of the CISSP and other Certifications

International Standards and Practices – An Overview of ISO/IEC 27001 and PCI-DSS

If you would like to attend any of the lectures please contact the BU Cyber Security Unit to reserve your place – 01202 962 557 or email 

 

Kevin is recognized as one of the Leaders in the field of Information Security worldwide. He has been involved in computers since 1976 when he was an operator on the largest minicomputer system in Canada at the time. He has since worked in many areas of Information Technology including Computer Programming, Systems Analysis and Information Technology Audit. Following 20 years in the telecommunications field, Kevin moved to a Senior Auditor position with the State of Oregon where he was a member of the Governor’s IT Security Subcommittee and performed audits on courts and court-related IT systems. The co-chair of the CBK for the CISSP and several other certifications, as well as an author with published articles in over ten books and magazines, Kevin is the principal of KMHenry Management Inc. and served until recently as the Head of Education for (ISC)2 and Vice President of ITPG, responsible for all educational systems, products and instructors for training programs. Currently Kevin is an Authorized Instructor for (ISC)2, ISACA, and BCI.

 

Visit the BUCSU website for more information on enterprise consultancy, research and education