CINXE.COM
Learn Veeam With Online Courses and Programs | edX
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1"/><link rel="stylesheet" href="/_next/static/css/ac5d9ab56c20cfb8.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/3fa5b5f2f793e4c1.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/8848c94dc66fe2aa.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/811f10d283271a23.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/8797c4ddf1b9f026.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/7e9d27ec358490ac.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/1e97b410b545a5d8.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-a4f9812243050229.js"/><script src="/_next/static/chunks/4bd1b696-4358cc10669205ce.js" async=""></script><script src="/_next/static/chunks/1684-0a453e59219efa9f.js" async=""></script><script src="/_next/static/chunks/main-app-85789d807cfcda53.js" async=""></script><script src="/_next/static/chunks/0e5ce63c-e5678294ec164d13.js" async=""></script><script src="/_next/static/chunks/c233e9bd-b7c9422fb889c5f2.js" async=""></script><script src="/_next/static/chunks/1551-a32ba51ea27eb996.js" async=""></script><script src="/_next/static/chunks/7268-ff18385b2655ac37.js" async=""></script><script src="/_next/static/chunks/3063-0c08aa3ace92d48f.js" async=""></script><script src="/_next/static/chunks/2769-3881453dae2bd98b.js" async=""></script><script src="/_next/static/chunks/4027-042478c0003133da.js" async=""></script><script src="/_next/static/chunks/4902-a502401b22596fb4.js" async=""></script><script src="/_next/static/chunks/9800-4a3b7102fbe3de1f.js" async=""></script><script src="/_next/static/chunks/9304-f8932c9966ddf481.js" async=""></script><script src="/_next/static/chunks/6090-d5fd1335f506444c.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/not-found-51e0afcfe2220a57.js" async=""></script><script src="/_next/static/chunks/a4634e51-f019cc1ab047e185.js" async=""></script><script src="/_next/static/chunks/8cc6faea-b2797766ef923a86.js" async=""></script><script src="/_next/static/chunks/d648eb28-2e60f8fd6112f90f.js" async=""></script><script src="/_next/static/chunks/9158-e6e425b5f6f826e4.js" async=""></script><script src="/_next/static/chunks/3929-dead225d00ed24b3.js" async=""></script><script src="/_next/static/chunks/965-e858088f7146e0b7.js" async=""></script><script src="/_next/static/chunks/4334-7aa27f1f3aec8263.js" async=""></script><script src="/_next/static/chunks/1992-56c53a964d08613b.js" async=""></script><script src="/_next/static/chunks/6314-9d7343e5e11143fa.js" async=""></script><script src="/_next/static/chunks/5614-8f8d2222b07c224f.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js" async=""></script><script src="/_next/static/chunks/2981-01390deb7d8c5e7f.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/layout-2a139665c274d279.js" async=""></script><script src="/_next/static/chunks/app/%5Blocale%5D/error-08837b7ba890f046.js" async=""></script><link rel="preload" href="https://beam.edx.org/consent/fa169e97-be64-4cc1-bad3-9534590f9a30/OtAutoBlock.js" as="script"/><link rel="preload" href="https://beam.edx.org/scripttemplates/otSDKStub.js" as="script"/><meta name="next-size-adjust" content=""/><link rel="preconnect" href="https://cdn.segment.com"/><link rel="preconnect" href="https://prospect-form-plugin.2u.com"/><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"!(function () {\n var i = \"analytics\",\n analytics = (window[i] = window[i] || []);\n if (!analytics.initialize)\n if (analytics.invoked)\n window.console &&\n console.error &&\n console.error(\"Segment snippet included twice.\");\n else {\n analytics.invoked = !0;\n analytics.methods = [\n \"trackSubmit\",\n \"trackClick\",\n \"trackLink\",\n \"trackForm\",\n \"pageview\",\n \"identify\",\n \"reset\",\n \"group\",\n \"track\",\n \"ready\",\n \"alias\",\n \"debug\",\n \"page\",\n \"screen\",\n \"once\",\n \"off\",\n \"on\",\n \"addSourceMiddleware\",\n \"addIntegrationMiddleware\",\n \"setAnonymousId\",\n \"addDestinationMiddleware\",\n \"register\",\n ];\n analytics.factory = function (e) {\n return function () {\n if (window[i].initialized)\n return window[i][e].apply(window[i], arguments);\n var n = Array.prototype.slice.call(arguments);\n if (\n [\"track\", \"screen\", \"alias\", \"group\", \"page\", \"identify\"].indexOf(\n e\n ) > -1\n ) {\n var c = document.querySelector(\"link[rel='canonical']\");\n n.push({\n __t: \"bpc\",\n c: (c && c.getAttribute(\"href\")) || void 0,\n p: location.pathname,\n u: location.href,\n s: location.search,\n t: document.title,\n r: document.referrer,\n });\n }\n n.unshift(e);\n analytics.push(n);\n return analytics;\n };\n };\n for (var n = 0; n < analytics.methods.length; n++) {\n var key = analytics.methods[n];\n analytics[key] = analytics.factory(key);\n }\n analytics.load = function (key, n) {\n var t = document.createElement(\"script\");\n t.type = \"text/plain\";\n t.async = !0;\n t.id = \"segment-analytics\";\n t.setAttribute(\"data-global-segment-analytics-key\", i);\n t.setAttribute(\"class\", \"optanon-category-C0002-C0004\")\n t.src =\n \"https://cdn.segment.com/analytics.js/v1/\" +\n key +\n \"/analytics.min.js\";\n var r = document.getElementsByTagName(\"script\")[0];\n r.parentNode.insertBefore(t, r);\n analytics._loadOptions = n;\n };\n analytics._writeKey = \"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\";\n analytics.SNIPPET_VERSION = \"5.2.0\";\n analytics.load(\"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\", {user: {storage: {stores: [\"cookie\", \"localStorage\", \"memory\"]}}});\n analytics.page()\n }\n})()","id":"script-segment"}])</script><style>.preampjs [data-preamp], .fusejs [data-fuse] { opacity: 0 !important}</style><script> !function(co,h,e,s,i,o,n){var d='documentElement';var a='className';h[d][a]+=' preampjs fusejs'; n.k=e;co._Cohesion=n;co._Preamp={k:s,start:new Date};co._Fuse={k:i};co._Tagular={k:o}; [e,s,i,o].map(function(x){co[x]=co[x]||function(){(co[x].q=co[x].q||[]).push([].slice.call(arguments))}}); var b=function(){var u=h[d][a];h[d][a]=u.replace(/ ?preampjs| ?fusejs/g,'')}; h.addEventListener('DOMContentLoaded',function(){co.setTimeout(b,3e3); co._Preamp.docReady=co._Fuse.docReady=!0});var z=h.createElement('script'); z.async=1;z.src='https://www.edx.org/beam.js'; z.onerror=function(){var ce='error',f='function';for(var o of co[e].q||[])o[0]===ce&&typeof o[1]==f&&o[1]();co[e]=function(n,cb){n===ce&&typeof cb==f&&cb()};b()}; h.head.appendChild(z);} (window,document,'cohesion','preamp','fuse','tagular',{"domainAllowlist":["h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com","www.h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com","edx.org","www.edx.org"],"tagular":{"sourceKey":"src_2euJfAVNt6Z9kQz4e9t1SQBtm8x","writeKey":"wk_2euJfDkJVTtEVzsC8BPOb0g9dVj","apiHost":"https://www.edx.org/beam/v2/t","multiparty":true,"useBeacon":true,"cookieDomain":"edx.org"},"monarch":{"sourceId":"bdac7c16-924e-4180-bb35-5b2dfff6d308","endpoint":"https://www.edx.org/beam","token":"b43382aa-9f76-406c-a628-bf96086f1c28","autoRequest":{"enabled":false,"suppressPlacements":true,"timeout":2000}},"consent":{"onetrust":{"enabled":true,"optIn":true},"required":true,"domain":".edx.org"},"fuse":{"enabled":false},"cookieDomain":"edx.org"}); </script><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"(function (w, d, s, l, i) {\n w[l] = w[l] || [];\n w[l].push({ \"gtm.start\": new Date().getTime(), event: \"gtm.js\" });\n var f = d.getElementsByTagName(s)[0],\n j = d.createElement(s),\n dl = l != \"dataLayer\" ? \"&l=\" + l : \"\";\n j.async = true;\n j.src = \"https://www.googletagmanager.com/gtm.js?id=\" + i + dl;\n f.parentNode.insertBefore(j, f);\n})(window, document, \"script\", \"dataLayer\", \"GTM-543ZGMK2\");\n","id":"script-gtm"}])</script><title>Learn Veeam With Online Courses and Programs | edX</title><meta name="description" content="Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today."/><link rel="canonical" href="https://www.edx.org/learn/veeam"/><meta property="og:title" content="Learn Veeam With Online Courses and Programs | edX"/><meta property="og:description" content="Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today."/><meta property="og:url" content="https://www.edx.org/learn/veeam"/><meta property="og:site_name" content="edX"/><meta property="og:locale" content="EN_US"/><meta name="twitter:card" content="summary"/><meta name="twitter:creator" content="@edXOnline"/><meta name="twitter:title" content="Learn Veeam With Online Courses and Programs | edX"/><meta name="twitter:description" content="Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today."/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="16x16"/><script>document.querySelectorAll('body link[rel="icon"], body link[rel="apple-touch-icon"]').forEach(el => document.head.appendChild(el))</script><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="__className_d65c78"><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-543ZGMK2" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><header class="contents mx-auto h-[76px] pointer-events-auto"><div class="hidden md:flex flex-col w-full border-b border-putty-400"><div class="relative h-[76px] flex justify-between items-center"><div class="flex items-center gap-6 w-full pl-2 sm:pl-4"><a class="min-w-12" href="/"><img alt="edX Online Homepage" title="edX" data-ot-ignore="true" loading="lazy" width="60" height="60" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" src="/trademark-logos/edx-logo-elm.svg"/></a><div class="flex items-center gap-2 w-full"><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 bg-primary text-primary-foreground shadow hover:bg-primary-hover hover:text-primary-hover-foreground border-2 border-primary h-auto lg:h-10 px-4 text-base" id="mega-nav-button">Learn<!-- --> <svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 ml-2 font-bold"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><div class="relative min-h-12"><div><form data-testid="search-box" class="flex overflow-hidden gap-2.5 md:flex-row md:gap-0"><div class="my-2 md:my-0 flex bg-white rounded min-h-12 md:w-72 border border-gray-dark"><input type="search" class="border-0 grow focus-visible:ring-0 focus-visible:ring-offset-0 [&::-webkit-search-cancel-button]:hidden rounded w-[230px] h-[44px] shadow-none" placeholder="What do you want to learn?" value=""/><button class="mx-4" type="submit" role="button" aria-label="Search for courses, certificates and degrees"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M15.5 14h-.79l-.28-.27A6.471 6.471 0 0 0 16 9.5 6.5 6.5 0 1 0 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5Zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14Z" fill="currentColor"></path></svg></button><button class="hidden"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41Z" fill="currentColor"></path></svg></button></div><button class="rounded-full text-white text-base no-underline hover:no-underline ml-0 md:ml-2 px-[1rem] py-[0.5625rem] border bg-primary border-primary hover:text-white hover:border-secondary hover:bg-secondary md:hidden" type="submit">Search</button></form></div><div class="hidden px-3 md:px-0 md:w-[504px] absolute z-50 "><div class="shadow-md rounded bg-white"><p class="text-sm font-bold ml-3 mb-0">Most popular programs</p><ul class="list-none !p-0 !m-0 text-xs"><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/learn/computer-science/harvard-university-cs50-s-introduction-to-computer-science" class="no-underline flex items-center"><img alt="CS50's Introduction to Computer Science" title="CS50's Introduction to Computer Science" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2Fda1b2400-322b-459b-97b0-0c557f05d017-a3d1899c3344.small.png&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">CS50's Introduction to Computer Science</span><span class="text-xs lg:text-sm block">HarvardX<!-- --> | <!-- -->Course</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy" class="no-underline flex items-center"><img alt="Artificial Intelligence: Implications for Business Strategy" title="Artificial Intelligence: Implications for Business Strategy" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fcourse%2Fimage%2F32ab61e5-44b4-4316-ad59-9f04fc876e0a-aeb25306d62b.small.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Artificial Intelligence: Implications for Business Strategy</span><span class="text-xs lg:text-sm block">MIT Sloan School of Management<!-- --> | <!-- -->Executive Education</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/masters/micromasters/mitx-supply-chain-management" class="no-underline flex items-center"><img alt="Supply Chain Management" title="Supply Chain Management" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Supply Chain Management</span><span class="text-xs lg:text-sm block">MITx<!-- --> | <!-- -->MicroMasters</span></div></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/certificates/professional-certificate/harvardx-computer-science-for-game-development" class="no-underline flex items-center"><img alt="Computer Science for Game Development" title="Computer Science for Game Development" loading="lazy" width="36" height="36" decoding="async" data-nimg="1" class="object-cover overflow-clip my-0 mr-2 w-9 h-9" style="color:transparent" srcSet="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=48&q=75 1x, /_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=96&q=75 2x" src="/_next/image?url=https%3A%2F%2Fprod-discovery.edx-cdn.org%2Fcdn-cgi%2Fimage%2Fwidth%3Dauto%2Cheight%3Dauto%2Cquality%3D75%2Cformat%3Dwebp%2Fmedia%2Fprograms%2Fcard_images%2F64b3c632-8610-4b17-9a48-9efee7fa3266-6a1e055774b4.jpg&w=96&q=75"/><div class="font-normal"><span class="text-sm lg:text-base block">Computer Science for Game Development</span><span class="text-xs lg:text-sm block">HarvardX<!-- --> | <!-- -->Professional Certificate</span></div></a></li></ul><p class="text-sm font-bold ml-3 mb-0">Trending now</p><ul class="list-none p-0 m-0"><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=data science" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">data science</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=ai" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">ai</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=finance" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">finance</span></a></li><li class="m-0 px-3 py-2 ProductSearch_searchListItem__5Bj11"><a href="/search?q=business" class="no-underline flex items-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg><span class="text-sm lg:text-base block ml-2">business</span></a></li></ul></div><div class="hidden"><div class="bg-white rounded shadow-md overflow-hidden"><ul class="list-none p-0 my-0"></ul><div class="pl-3 py-2 bg-light"><a href="/search">View all results</a></div></div></div></div></div></div></div><div class="flex items-center pr-2 sm:pr-4"><a href="https://business.edx.org" class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 text-gray-dark hover:bg-putty-light hover:text-accent-foreground h-auto py-2 px-3">edX For Business</a></div></div></div><div class="hidden md:block absolute w-full z-40"><div role="alert" class="relative flex justify-center items-center text-sm py-1 pl-2 pr-10 bg-accent-blue text-accent-foreground hidden"><p class="text-center text-inherit text-sm m-0">Unlock the future — join us for a worldwide AI learning event April 8 and <b>earn a free Microsoft certificate</b>. <a href="https://www.edx.org/microsoft-ai-skills-fest" class="underline text-inherit">Learn more</a>.</p><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 hover:text-accent-foreground h-auto px-4 py-2 absolute top-auto right-0 text-inherit hover:bg-transparent"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41Z" fill="currentColor"></path></svg><span class="sr-only">Close site banner.</span></button></div></div><div class="grid grid-cols-3 md:hidden relative h-[76px] justify-center items-center border-b border-putty-400"><div class="pl-4"><button class="hover:bg-primary p-2 rounded-full hover:text-white" aria-label="Navigation menu"><svg width="20" height="20" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M1.5 3C1.22386 3 1 3.22386 1 3.5C1 3.77614 1.22386 4 1.5 4H13.5C13.7761 4 14 3.77614 14 3.5C14 3.22386 13.7761 3 13.5 3H1.5ZM1 7.5C1 7.22386 1.22386 7 1.5 7H13.5C13.7761 7 14 7.22386 14 7.5C14 7.77614 13.7761 8 13.5 8H1.5C1.22386 8 1 7.77614 1 7.5ZM1 11.5C1 11.2239 1.22386 11 1.5 11H13.5C13.7761 11 14 11.2239 14 11.5C14 11.7761 13.7761 12 13.5 12H1.5C1.22386 12 1 11.7761 1 11.5Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></div><div class="flex justify-items-center justify-center"><a href="/"><img alt="edX Online" title="edX Online" loading="lazy" width="60" height="60" decoding="async" data-nimg="1" style="color:transparent" src="/trademark-logos/edx-logo-elm.svg"/></a></div><div class="pr-4 flex justify-items-end justify-end"><button class="hover:bg-primary p-2 rounded-full hover:text-white focus:border-gray-dark" aria-label="Search courses"><svg width="24" height="24" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M10 6.5C10 8.433 8.433 10 6.5 10C4.567 10 3 8.433 3 6.5C3 4.567 4.567 3 6.5 3C8.433 3 10 4.567 10 6.5ZM9.30884 10.0159C8.53901 10.6318 7.56251 11 6.5 11C4.01472 11 2 8.98528 2 6.5C2 4.01472 4.01472 2 6.5 2C8.98528 2 11 4.01472 11 6.5C11 7.56251 10.6318 8.53901 10.0159 9.30884L12.8536 12.1464C13.0488 12.3417 13.0488 12.6583 12.8536 12.8536C12.6583 13.0488 12.3417 13.0488 12.1464 12.8536L9.30884 10.0159Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></div><div class="absolute top-full w-full z-40"><div role="alert" class="relative flex justify-center items-center text-sm py-1 pl-2 pr-10 bg-accent-blue text-accent-foreground hidden"><p class="text-center text-inherit text-sm m-0">Unlock the future — join us for a worldwide AI learning event April 8 and <b>earn a free Microsoft certificate</b>. <a href="https://www.edx.org/microsoft-ai-skills-fest" class="underline text-inherit">Learn more</a>.</p><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 hover:text-accent-foreground h-auto px-4 py-2 absolute top-auto right-0 text-inherit hover:bg-transparent"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41Z" fill="currentColor"></path></svg><span class="sr-only">Close site banner.</span></button></div></div></div></header><div style="min-height:50px"><script type="application/ld+json"> { "@context": "https://schema.org", "@type" : "Organization", "name" : "edX", "url" : "https://www.edx.org", "logo": "/images/logos/edx-logo-elm.svg", "sameAs" : [ "https://www.facebook.com/edX", "https://twitter.com/edXOnline", "https://www.linkedin.com/company/edx", "http://www.instagram.com/edxonline", "https://www.youtube.com/user/edxonline" ] } </script><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.edx.org/"},{"@type":"ListItem","position":2,"name":"Learn","item":"https://www.edx.org/learn"},{"@type":"ListItem","position":3,"name":"Veeam"}]}</script><script type="application/ld+json">[{"@context":"https://schema.org","@type":"WebSite","url":"https://www.edx.org/learn/veeam","name":"Learn Veeam With Online Courses and Programs","alternateName":"edX Online"}]</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"ItemList","itemListElement":[{"@type":"ListItem","position":1,"url":"https://www.edx.org/learn/software-development/ibm-software-programming-and-database-basics"},{"@type":"ListItem","position":2,"url":"https://www.edx.org/learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications"},{"@type":"ListItem","position":3,"url":"https://www.edx.org/learn/operating-systems/ibm-hardware-and-operating-systems"},{"@type":"ListItem","position":4,"url":"https://www.edx.org/learn/information-technology/the-georgia-institute-of-technology-information-and-communication-technology-ict-accessibility"},{"@type":"ListItem","position":5,"url":"https://www.edx.org/certificates/professional-certificate/ibm-information-technology-support"},{"@type":"ListItem","position":6,"url":"https://www.edx.org/learn/information-technology/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-hardware"},{"@type":"ListItem","position":7,"url":"https://www.edx.org/learn/computer-science/amazon-web-services-introduction-to-information-technology-and-aws-cloud"},{"@type":"ListItem","position":8,"url":"https://www.edx.org/learn/economics/the-international-monetary-fund-cyber-risk-security"},{"@type":"ListItem","position":9,"url":"https://www.edx.org/learn/information-systems/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-enterprise-systems"},{"@type":"ListItem","position":10,"url":"https://www.edx.org/learn/computer-programming/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-programming"},{"@type":"ListItem","position":11,"url":"https://www.edx.org/learn/software-development/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-software-development"},{"@type":"ListItem","position":12,"url":"https://www.edx.org/learn/war-and-conflict/the-university-of-queensland-global-media-war-and-technology"},{"@type":"ListItem","position":13,"url":"https://www.edx.org/learn/data-analysis/rochester-institute-of-technology-data-analytics-and-visualization-in-health-care"},{"@type":"ListItem","position":14,"url":"https://www.edx.org/learn/teacher-training/raspberry-pi-foundation-teach-kids-computing-computing-systems-and-networks"},{"@type":"ListItem","position":15,"url":"https://www.edx.org/learn/tourism-management/the-hong-kong-polytechnic-university-innovation-and-technology-management-in-tourism-and-hospitality"},{"@type":"ListItem","position":16,"url":"https://www.edx.org/learn/health-informatics/israelx-health-informatics-for-better-and-safer-healthcare"},{"@type":"ListItem","position":17,"url":"https://www.edx.org/learn/globalization/columbia-university-freedom-of-expression-and-information-in-the-time-of-globalization-advanced-course"},{"@type":"ListItem","position":18,"url":"https://www.edx.org/certificates/professional-certificate/dartmouth-imtx-c-programming-with-linux"},{"@type":"ListItem","position":19,"url":"https://www.edx.org/certificates/professional-certificate/uwashingtonx-it-project-management"},{"@type":"ListItem","position":20,"url":"https://www.edx.org/certificates/professional-certificate/upvalenciax-it-fundamentals-for-business-professionals"},{"@type":"ListItem","position":21,"url":"https://www.edx.org/certificates/professional-certificate/usmx-championing-the-digital-enterprise"},{"@type":"ListItem","position":22,"url":"https://www.edx.org/masters/micromasters/doanex-healthcare-administration"},{"@type":"ListItem","position":23,"url":"https://www.edx.org/bachelors/information-science-usc-sl"},{"@type":"ListItem","position":24,"url":"https://www.edx.org/certificate/maryville-university-undergraduate-certificate-in-data-science"},{"@type":"ListItem","position":25,"url":"https://www.edx.org/certificate/maryville-university-post-baccalaureate-certificate-in-big-data"},{"@type":"ListItem","position":26,"url":"https://www.edx.org/masters/maryville-university-master-of-arts-in-management-and-leadership"},{"@type":"ListItem","position":27,"url":"https://www.edx.org/learn/web-accessibility/the-world-wide-web-consortium-w3c-introduction-to-web-accessibility"},{"@type":"ListItem","position":28,"url":"https://www.edx.org/learn/gis-geographic-information-systems/university-of-alaska-fairbanks-gis-foundations"},{"@type":"ListItem","position":29,"url":"https://www.edx.org/learn/technology/ibm-technical-support-basics-for-everyone"},{"@type":"ListItem","position":30,"url":"https://www.edx.org/learn/c-programming/dartmouth-college-c-programming-language-foundations"},{"@type":"ListItem","position":31,"url":"https://www.edx.org/learn/drones/wageningen-university-research-drones-for-agriculture-prepare-and-design-your-drone-uav-mission"},{"@type":"ListItem","position":32,"url":"https://www.edx.org/learn/it-support/ibm-it-support-case-studies"}]}</script><main id="page-id-417"><article class="container prose mt-8 md:mt-auto"><div class="fullwidth pb-12 pt-20 md:pt-16 bg-cover bg-center bg-[url(/bg-images/learn-page-header.webp)]"><div class="mx-auto lg:container [&>*]:text-white"><nav aria-label="breadcrumb" class="not-prose mb-4"><ol class="list-none flex flex-wrap items-center gap-1.5 break-words text-base text-putty-dark sm:gap-2.5"><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize"><a class="Breadcrumbs_breadcrumb_link__il5uK" href="/">Home</a></li><li aria-hidden="true" class="ml-0"><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="text-white font-bold w-4 h-4" style="stroke-width:1;stroke:white"><path d="M6.1584 3.13508C6.35985 2.94621 6.67627 2.95642 6.86514 3.15788L10.6151 7.15788C10.7954 7.3502 10.7954 7.64949 10.6151 7.84182L6.86514 11.8418C6.67627 12.0433 6.35985 12.0535 6.1584 11.8646C5.95694 11.6757 5.94673 11.3593 6.1356 11.1579L9.565 7.49985L6.1356 3.84182C5.94673 3.64036 5.95694 3.32394 6.1584 3.13508Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></li><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize" aria-current="false"><a class="Breadcrumbs_breadcrumb_link__il5uK" href="/learn">learn</a></li><li aria-hidden="true" class="ml-0"><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="text-white font-bold w-4 h-4" style="stroke-width:1;stroke:white"><path d="M6.1584 3.13508C6.35985 2.94621 6.67627 2.95642 6.86514 3.15788L10.6151 7.15788C10.7954 7.3502 10.7954 7.64949 10.6151 7.84182L6.86514 11.8418C6.67627 12.0433 6.35985 12.0535 6.1584 11.8646C5.95694 11.6757 5.94673 11.3593 6.1356 11.1579L9.565 7.49985L6.1356 3.84182C5.94673 3.64036 5.95694 3.32394 6.1584 3.13508Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></li><li class="inline-flex items-center gap-1.5 Breadcrumbs_breadcrumbs__0fm1_ text-primary-foreground capitalize" aria-current="page"><span class="">veeam</span></li></ol></nav><h1 class="text-learn-hero-heading lg:text-learn-hero-heading-large lg:leading-learn-hero-line-height-large mb-6 font-extrabold tracking-tight">Learn Veeam with online courses and programs</h1><div class="break-words [&>ul>li>p]:text-white [&>*]:text-white text-xl line-clamp-2"><p class="mb-8">With in-depth Veeam tutorials, you can build a robust knowledge base of the data management platform and its unique use cases. Discover how to learn Veeam with edX today.</p></div></div></div><div class="fullwidth bg-secondary text-primary-foreground p-8 sticky top-0 z-50"><div class="container"><div class="lg:flex hidden text-sm items-center "><a aria-label="Create an account" href="https://authn.edx.org/register" target="_self" class="inline-flex items-center justify-center whitespace-nowrap text-sm text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 @apply border-[1px] rounded-full h-auto px-4 py-2 not-prose undefined"><span class="inline-flex gap-2 items-center justify-center break-words whitespace-normal">Create an account</span></a></div><div class="lg:hidden p-4 w-full"><button type="button" role="combobox" aria-controls="radix-«R5ajhtrenb»" aria-expanded="false" aria-autocomplete="none" dir="ltr" data-state="closed" class="flex h-9 w-full items-center justify-between whitespace-nowrap rounded border border-input bg-transparent px-3 py-2 text-sm shadow-sm ring-offset-background placeholder:text-putty-dark focus:outline-none focus:ring-1 focus:ring-ring disabled:cursor-not-allowed disabled:opacity-50 [&>span]:line-clamp-1 no-underline text-white hover:text-white"><span style="pointer-events:none"></span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 opacity-50" aria-hidden="true"><path d="M4.93179 5.43179C4.75605 5.60753 4.75605 5.89245 4.93179 6.06819C5.10753 6.24392 5.39245 6.24392 5.56819 6.06819L7.49999 4.13638L9.43179 6.06819C9.60753 6.24392 9.89245 6.24392 10.0682 6.06819C10.2439 5.89245 10.2439 5.60753 10.0682 5.43179L7.81819 3.18179C7.73379 3.0974 7.61933 3.04999 7.49999 3.04999C7.38064 3.04999 7.26618 3.0974 7.18179 3.18179L4.93179 5.43179ZM10.0682 9.56819C10.2439 9.39245 10.2439 9.10753 10.0682 8.93179C9.89245 8.75606 9.60753 8.75606 9.43179 8.93179L7.49999 10.8636L5.56819 8.93179C5.39245 8.75606 5.10753 8.75606 4.93179 8.93179C4.75605 9.10753 4.75605 9.39245 4.93179 9.56819L7.18179 11.8182C7.35753 11.9939 7.64245 11.9939 7.81819 11.8182L10.0682 9.56819Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><select aria-hidden="true" tabindex="-1" style="position:absolute;border:0;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;clip:rect(0, 0, 0, 0);white-space:nowrap;word-wrap:normal"></select></div></div></div><div class="flex flex-wrap py-12"><div><img loading="lazy" decoding="async" class="hidden lg:block float-right ml-4 mb-4" src="https://images.ctfassets.net/ii9ehdcj88bc/40gRkTcppcpHFWSn4fvkhg/133ea1467b694f6eb4332094c89916b5/Veeam.png" alt="Veeam | Introduction Image Description" width="435" height="245"/><h2><b>What is Veeam?</b></h2><p>Veeam is a software platform that offers tools for backup, anti-malware protection, analytics, and disaster recovery. To enhance IT security, Veeam can provide real-time system monitoring, with proactive alerts and automated remediation. In cases of data loss or security breaches, Veeam can help users restore system integrity via its backup and data recovery tools.</p><p>Veeam software can be deployed within physical and virtual environments, as well as cloud infrastructures. These features allow companies to manage their data in ways that fit their individual needs, so Veeam can be used across a variety of industries, from small businesses to the federal government.<sup><a href="#42diVNJteGg4j7iL2LBZzD">1</a></sup></p></div></div><div class="fullwidth bg-putty-100"><div class="relative overflow-hidden py-3 bg-putty-light "><div class="container flex flex-col items-center justify-center text-center py-10 bg-putty-light"><h2 class="text-secondary font-extrabold scroll-m-20 tracking-tight text-4xl lg:text-7xl font-black font-inter mt-0">Maximize Your Potential</h2><p class="md:px-24 py-3 text-base text-center ">Sign up for special offers, career resources, and recommendations that will help you grow, prepare, and advance in your career.</p><div class="flex gap-4 undefined"></div></div></div><a class="subnav-item -mt-1" name="Browse online Veeam courses" id="browse-online-veeam-courses"></a><div class="container py-3"><div dir="ltr" data-orientation="horizontal"><div data-state="active" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Certificate" id="radix-«R1sjhtrenb»-content-Certificate" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2" style="animation-duration:0s"><h2 class="text-xl lg:text-3xl font-bold">Browse online <!-- -->Veeam<!-- --> <!-- -->Certificates</h2><h4 class="elm-h5 font-normal my-4">Find new interests and advance your career opportunities</h4><div class="lg:grid lg:grid-cols-3 lg:gap-4 border-t-solid border-t-[1px] border-b-solid border-b-[1px] py-6 mb-6"><div class="flex"><div class="w-12 text-primary"><svg width="48" height="48" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="m23 12-2.44-2.79.34-3.69-3.61-.82-1.89-3.2L12 2.96 8.6 1.5 6.71 4.69 3.1 5.5l.34 3.7L1 12l2.44 2.79-.34 3.7 3.61.82L8.6 22.5l3.4-1.47 3.4 1.46 1.89-3.19 3.61-.82-.34-3.69L23 12Zm-12.91 4.72-3.8-3.81 1.48-1.48 2.32 2.33 5.85-5.87 1.48 1.48-7.33 7.35Z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Stand out in your field</h3><p class="text-sm">Use the knowledge and skills you have gained to drive impact at work and grow your career.</p></div></div><div class="flex"><div class="w-12 text-primary"><svg width="48" height="48" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M11.99 2C6.47 2 2 6.48 2 12s4.47 10 9.99 10C17.52 22 22 17.52 22 12S17.52 2 11.99 2zM12 20c-4.42 0-8-3.58-8-8s3.58-8 8-8 8 3.58 8 8-3.58 8-8 8zm.5-13H11v6l5.25 3.15.75-1.23-4.5-2.67z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Learn at your own pace</h3><p class="text-sm">On your computer, tablet or phone, online courses make learning flexible to fit your busy life.</p></div></div><div class="flex"><div class="w-12 text-primary"><svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" role="img" focusable="false" aria-hidden="true"><path d="m16 6 2.29 2.29-4.88 4.88-4-4L2 16.59 3.41 18l6-6 4 4 6.3-6.29L22 12V6h-6z" fill="currentColor"></path></svg></div><div class="px-3 text-primary"><h3 class="mt-0 text-base text-primary">Earn a valuable credential</h3><p class="text-sm">Showcase your key skills and valuable knowledge.</p></div></div></div></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Course" hidden="" id="radix-«R1sjhtrenb»-content-Course" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Executive Education" hidden="" id="radix-«R1sjhtrenb»-content-Executive Education" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Masters" hidden="" id="radix-«R1sjhtrenb»-content-Masters" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Bachelors" hidden="" id="radix-«R1sjhtrenb»-content-Bachelors" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2"></div><div class="hidden lg:flex justify-center"><div role="tablist" aria-orientation="horizontal" class="inline-flex h-12 items-center justify-center rounded py-1 text-primary w-full shadow-lg rounded-t-xl max-w-[1128px]" tabindex="-1" data-orientation="horizontal" style="outline:none"><button type="button" role="tab" aria-selected="true" aria-controls="radix-«R1sjhtrenb»-content-Certificate" data-state="active" id="radix-«R1sjhtrenb»-trigger-Certificate" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Certificates<!-- --> <!-- -->(81)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-«R1sjhtrenb»-content-Course" data-state="inactive" id="radix-«R1sjhtrenb»-trigger-Course" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Courses<!-- --> <!-- -->(383)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-«R1sjhtrenb»-content-Executive Education" data-state="inactive" id="radix-«R1sjhtrenb»-trigger-Executive Education" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Executive Education<!-- --> <!-- -->(14)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-«R1sjhtrenb»-content-Masters" data-state="inactive" id="radix-«R1sjhtrenb»-trigger-Masters" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Master's Programs<!-- --> <!-- -->(10)</button><button type="button" role="tab" aria-selected="false" aria-controls="radix-«R1sjhtrenb»-content-Bachelors" data-state="inactive" id="radix-«R1sjhtrenb»-trigger-Bachelors" class="hover:bg-card-gray-hover inline-flex grow items-center justify-center whitespace-nowrap p-3 ring-offset-background transition-all focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 data-[state=active]:bg-secondary data-[state=active]:text-primary-foreground data-[state=active]:shadow data-[state=active]:hover:bg-secondary no-underline font-normal text-[16px] text-primary hover:text-primary data-[state=active]:font-bold bg-white rounded-none first:rounded-tl-xl last:rounded-tr-xl" tabindex="-1" data-orientation="horizontal" data-radix-collection-item="">Bachelor's Programs<!-- --> <!-- -->(4)</button></div></div><div class="lg:hidden"><button type="button" role="combobox" aria-controls="radix-«R1psjhtrenb»" aria-expanded="false" aria-autocomplete="none" dir="ltr" data-state="closed" class="h-9 w-full justify-between whitespace-nowrap rounded bg-transparent px-3 py-2 text-sm ring-offset-background placeholder:text-putty-dark focus:outline-none focus:ring-1 focus:ring-ring disabled:cursor-not-allowed disabled:opacity-50 [&>span]:line-clamp-1 flex items-center border-solid border-[1px] border-primary shadow-none text-primary no-underline"><svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M3 17v2h6v-2H3ZM3 5v2h10V5H3Zm10 16v-2h8v-2h-8v-2h-2v6h2ZM7 9v2H3v2h4v2h2V9H7Zm14 4v-2H11v2h10Zm-6-4h2V7h4V5h-4V3h-2v6Z" fill="currentColor"></path></svg><span style="pointer-events:none"></span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 opacity-50" aria-hidden="true"><path d="M4.93179 5.43179C4.75605 5.60753 4.75605 5.89245 4.93179 6.06819C5.10753 6.24392 5.39245 6.24392 5.56819 6.06819L7.49999 4.13638L9.43179 6.06819C9.60753 6.24392 9.89245 6.24392 10.0682 6.06819C10.2439 5.89245 10.2439 5.60753 10.0682 5.43179L7.81819 3.18179C7.73379 3.0974 7.61933 3.04999 7.49999 3.04999C7.38064 3.04999 7.26618 3.0974 7.18179 3.18179L4.93179 5.43179ZM10.0682 9.56819C10.2439 9.39245 10.2439 9.10753 10.0682 8.93179C9.89245 8.75606 9.60753 8.75606 9.43179 8.93179L7.49999 10.8636L5.56819 8.93179C5.39245 8.75606 5.10753 8.75606 4.93179 8.93179C4.75605 9.10753 4.75605 9.39245 4.93179 9.56819L7.18179 11.8182C7.35753 11.9939 7.64245 11.9939 7.81819 11.8182L10.0682 9.56819Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button><select aria-hidden="true" tabindex="-1" style="position:absolute;border:0;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;clip:rect(0, 0, 0, 0);white-space:nowrap;word-wrap:normal"></select></div><div data-state="active" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Certificate" id="radix-«R1sjhtrenb»-content-Certificate" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto" style="animation-duration:0s"><h3 class="mb-4">Certificates</h3><div class="hidden lg:block"><div class="gap-4 py-4 dynamic-grid flex-wrap undefined"></div></div><div class="lg:hidden"><div class="gap-4 py-4 flex overflow-x-scroll undefined"></div></div><div class="flex justify-center mx-auto mt-5"></div></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Course" hidden="" id="radix-«R1sjhtrenb»-content-Course" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Executive Education" hidden="" id="radix-«R1sjhtrenb»-content-Executive Education" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Masters" hidden="" id="radix-«R1sjhtrenb»-content-Masters" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-«R1sjhtrenb»-trigger-Bachelors" hidden="" id="radix-«R1sjhtrenb»-content-Bachelors" tabindex="0" class="mt-2 ring-offset-background focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 flex flex-col max-w-[1128px] mx-auto"></div></div></div><div class="pt-0 pb-6 fullwidth bg-putty-100"><h3 class="mb-8 mt-0 text-2xl">Related Topics</h3><div class="flex gap-3 overflow-x-auto scroll-smooth not-prose"></div><div class="pt-4"></div></div><div class="flex flex-col gap-2 pb-10"><div class="Default_content__HO8we"><div id=""><h3><b>Why use Veeam?</b></h3><p>You can use Veeam to handle your system’s backups on a regular schedule and at scale. This way, you won’t worry about falling behind even as your operations grow. You can reap several other benefits using Veeam software, including:<sup><a href="#52NPOHZ9jKDxkBpMMcZTME">2</a></sup></p><p></p><ul><li><p>Backup and recovery for physical, virtual, and cloud systems.</p></li><li><p>Monitoring and analytics in real-time with Veeam ONE.</p></li><li><p>Cloud mobility, with native support for major platforms like Google Cloud, Azure, and AWS. </p></li><li><p>Ransomware and data security with backups that let you restore your systems to the latest healthy state in the event of a breach or malware attack. </p></li><li><p>Disaster recovery for events such as fires, floods, hurricanes, etc.</p></li><li><p>Data reuse, with backups that allow you to repurpose your data in other environments.</p></li></ul><p></p><h3><b>Veeam tutorial curriculum</b></h3><p>Veeam courses will likely start with the basics, like learning what Veeam is and how to download and install Veeam. These beginner courses could also include an introduction to the different features and products across the platform, such as Veeam Backup and Replication, Veeam Community Edition, Enterprise Manager, ONE, Orchestrator, and Data Platform Essentials.</p><p></p><p>At advanced levels, you can learn about Veeam Agent job configurations for backups and restorations, as well as the implementation and execution of disaster recovery operations from start to finish. Ultimately, Veeam tutorials can teach you how to configure and maintain a full data management system that can also integrate with other supported services.</p><p></p><p>Expand your knowledge of IT with edX. Discover a wide range of learning formats to accommodate your preferences, including accelerated <span data-boot-camp-link="https://www.edx.org/boot-camps">boot camps</span> and comprehensive <a class="text-link underline" href="https://www.edx.org/bachelors/">bachelor’s degree</a> programs. For more advanced learners, pursuing a <a class="text-link underline" href="https://www.edx.org/masters">master’s degree</a> may be the goal, while busy professionals in leadership positions may benefit from <a class="text-link underline" href="https://www.edx.org/executive-education">executive education courses</a>.</p></div></div><a class="subnav-item -mt-1" name="Explore jobs that use Veeam" id="explore-jobs-that-use-veeam"></a><div class="Default_content__HO8we"><div id=""><h2><b>Explore jobs that use Veeam</b></h2><p>Many jobs that can use Veeam will often take advantage of its backup features. These roles can include:</p><p></p><ul><li><p><b>Database administrator:</b> Ensures the company’s information and records are secure and up to date.<sup><a href="#1TyUfpLQEWEhDuaiMG4nPU">3</a></sup></p></li><li><p><b>System administrator:</b> Oversees a company’s hardware and software assets to ensure they’re available when needed without downtime.<sup><a href="#6859NNRow1u0fYjRfc6mhm">4</a></sup></p></li><li><p><b>Data center system engineer:</b> Builds and diagnoses issues within a company’s data center, especially on in-house infrastructure.<sup><a href="#7GQMLi604AKTGt9QPYthnY">5</a></sup></p></li><li><p><b>Network administrator:</b> Configures, maintains, and upgrades a company’s computer network.<sup><a href="#2zvjrbNH8qFo3OjRSr2N1T">6</a></sup></p></li><li><p><b>IT support technician:</b> Helps a company’s staff work with the technology.<sup><a href="#426fGKIZCv2eRiaxKvsokW">7</a></sup></p></li></ul><p></p><p>Veeam has also started to focus on addressing the threat of ransomware, so you can learn Veeam and pursue a career in cybersecurity if the field interests you.</p><p></p><p>Each of these roles will have different education and skills requirements. For example, you may be able to build relevant skills in a <span data-boot-camp-link="https://www.edx.org/boot-camps/cybersecurity">cybersecurity bootcamp</span> or develop your programming skills in a <span data-boot-camp-link="https://www.edx.org/boot-camps/coding">coding boot camp</span>.</p></div></div></div><div class="fullwidth max-w-none py-12 md:py-16 not-prose bg-primary-gradient"><div class="container"><h2 class="text-4xl md:text-6xl my-5 text-white italic"><span class="text-primary-foreground">More opportunities</span> <!-- -->for you to learn</h2><p class="text-lg leading-9 text-white">We've added 500+ learning opportunities to create one of the world's most comprehensive free-to-degree online learning platforms.</p><ul class="block md:grid md:grid-cols-2 md:gap-x-[100px] mx-auto lg:grid-cols-3"></ul></div></div><a class="subnav-item -mt-1" name="Veeam FAQ" id="veeam-f-a-q"></a><a class="subnav-item" id="frequently-asked-questions"></a><div class="flex flex-col py-4 lg:pt-16"><h2 class="mt-2 mb-4 text-3xl font-bold ">Frequently Asked Questions</h2><div class="flex flex-col gap-3 [&_button]:no-underline [&_button]:text-gray-dark [&_button:hover]:text-gray-dark" data-orientation="vertical"><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-«R16kcjhtrenb»" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-«R6kcjhtrenb»" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What is Veeam Backup?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-«R16kcjhtrenb»" hidden="" role="region" aria-labelledby="radix-«R6kcjhtrenb»" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-«R1akcjhtrenb»" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-«Rakcjhtrenb»" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What is Veeam ONE?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-«R1akcjhtrenb»" hidden="" role="region" aria-labelledby="radix-«Rakcjhtrenb»" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-«R1ekcjhtrenb»" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-«Rekcjhtrenb»" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>What does Veeam do?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-«R1ekcjhtrenb»" hidden="" role="region" aria-labelledby="radix-«Rekcjhtrenb»" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div><div data-state="closed" data-orientation="vertical" class="border-b AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E"><h3 data-orientation="vertical" data-state="closed" class="flex"><button type="button" aria-controls="radix-«R1ikcjhtrenb»" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-«Rikcjhtrenb»" class="flex flex-1 gap-10 text-left items-center justify-between py-4 text-sm font-medium transition-all hover:underline [&[data-state=open]>svg]:rotate-180 AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J" data-radix-collection-item=""><span>Are Veeam and VMware the same?</span><svg width="15" height="15" viewBox="0 0 15 15" fill="none" xmlns="http://www.w3.org/2000/svg" class="h-4 w-4 shrink-0 text-primary-500 transition-transform duration-200"><path d="M3.13523 6.15803C3.3241 5.95657 3.64052 5.94637 3.84197 6.13523L7.5 9.56464L11.158 6.13523C11.3595 5.94637 11.6759 5.95657 11.8648 6.15803C12.0536 6.35949 12.0434 6.67591 11.842 6.86477L7.84197 10.6148C7.64964 10.7951 7.35036 10.7951 7.15803 10.6148L3.15803 6.86477C2.95657 6.67591 2.94637 6.35949 3.13523 6.15803Z" fill="currentColor" fill-rule="evenodd" clip-rule="evenodd"></path></svg></button></h3><div data-state="closed" id="radix-«R1ikcjhtrenb»" hidden="" role="region" aria-labelledby="radix-«Rikcjhtrenb»" data-orientation="vertical" class="overflow-hidden text-sm data-[state=closed]:animate-accordion-up data-[state=open]:animate-accordion-down" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div><ol><li id="42diVNJteGg4j7iL2LBZzD"><p><a class="text-link underline external" href="https://www.veeam.com/solutions/industry/government/solutions.html" target="_blank" rel="noopener noreferrer">Data Backup & Protection for U.S. Federal Government</a>. (2023). <i>Veeam</i>.<i></i>Retrieved April 11, 2023.</p></li><li id="52NPOHZ9jKDxkBpMMcZTME"><p><a class="text-link underline external" href="https://www.veeam.com/data-protection-platform.html" target="_blank" rel="noopener noreferrer">Data Protection and Management Solutions</a>. (2023). <i>Veeam. </i>Retrieved May 11, 2023.</p></li><li id="1TyUfpLQEWEhDuaiMG4nPU"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/database-administrators.htm" target="_blank" rel="noopener noreferrer">Database Administrators and Architects</a>. (2022). <i>U.S. Bureau of Labor Statistics</i>.<i></i>Retrieved April 28, 2023.</p></li><li id="6859NNRow1u0fYjRfc6mhm"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm" target="_blank" rel="noopener noreferrer">Network and Computer Systems Administrators</a>. (2023). <i>U.S. Bureau of Labor Statistics</i>.<i></i>Retrieved April 28, 2023.</p></li><li id="7GQMLi604AKTGt9QPYthnY"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/database-administrators.htm" target="_blank" rel="noopener noreferrer">Database Administrators and Architects</a>. (2022). <i>U.S. Bureau of Labor Statistics</i>.<i></i>Retrieved April 28, 2023.</p></li><li id="2zvjrbNH8qFo3OjRSr2N1T"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm" target="_blank" rel="noopener noreferrer">Network and Computer Systems Administrators</a>. (2023). <i>U.S. Bureau of Labor Statistics</i>.<i></i>Retrieved April 28, 2023.</p></li><li id="426fGKIZCv2eRiaxKvsokW"><p><a class="text-link underline external" href="https://www.bls.gov/ooh/computer-and-information-technology/computer-support-specialists.htm" target="_blank" rel="noopener noreferrer">Computer Support Specialists</a>. (2022). <i>U.S. Bureau of Labor Statistics. </i>Retrieved April 28, 2023.</p></li></ol></div></article></main></div><div class="bg-primary text-primary-foreground pt-16"><footer class="flex justify-between max-w-screen-xl mx-auto px-4 pb-4 "><div class="flex flex-col w-full"><div class="flex flex-wrap justify-between mb-6 w-full"><a class="mb-6" href="/"><img alt="edX homepage" title="edX homepage" data-ot-ignore="true" loading="lazy" width="127" height="67" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" src="/trademark-logos/edx-by-2u-white.svg"/></a><div><div class="mb-4 justify-center flex flex-row"><div class="mx-2 flex flex-col"><a href="https://www.facebook.com/edx/" target="_blank" role="button" aria-label="Visit our Facebook page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="32" height="32" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://x.com/edXOnline" target="_blank" role="button" aria-label="Visit our X page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="48" height="48" viewBox="0 0 48 48" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://www.linkedin.com/school/edx/" target="_blank" role="button" aria-label="Visit our LinkedIn page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path fill-rule="evenodd" clip-rule="evenodd" d="M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z" fill="currentColor"></path></svg></div></a></div><div class="mx-2 flex flex-col"><a href="https://www.reddit.com/r/edX/" target="_blank" role="button" aria-label="Visit our Reddit page"><div class="flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full"><svg width="40" height="40" viewBox="-2 -2 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" focusable="false" aria-hidden="true"><path d="M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z" fill="currentColor"></path></svg></div></a></div></div></div></div><div class="my-6"><div class="flex flex-wrap md:flex-nowrap justify-between"><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Browse Courses</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/artificial-intelligence">Learn AI</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/chatgpt">Learn ChatGPT</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/spanish">Learn Spanish</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/python">Learn Python</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/excel">Learn Excel</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/software-engineering">Learn Software Engineering</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/blockchain">Learn Blockchain</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/computer-programming">Learn Computer Programming</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/economics">Learn Economics</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/architecture">Learn Architecture</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/project-management">Learn Project Management</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/learn/business-administration">Learn Business Administration</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/learn" class="hover:underline text-[1rem] text-white hover:text-white">see more Courses</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">step-by-step guides</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-cybersecurity-analyst">Become a Cybersecurity Analyst</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-data-scientist">Become a Data Scientist</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-social-media-manager">Become a Social Media Manager</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-software-developer">Become a Software Developer</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/become/how-to-become-a-software-engineer-without-a-degree">Become a Software Engineer</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/become" class="hover:underline text-[1rem] text-white hover:text-white">see more Guides</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Complete your bachelor's online</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/business">Bachelor's in Business</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/computer-data-sciences">Bachelor's in Computer Science / Data Science</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/health-social-services">Bachelor's in Health and Nursing</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/online-accounting-bachelor-degree">Bachelor's in Accounting</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/online-bachelors-degree-finance">Bachelor's in Finance</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/psychology">Bachelor's in Psychology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/bachelors-in-public-health-online">Bachelor's in Public Health</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/bachelors/social-work-bsw">Bachelor's in Social Work</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/bachelors" class="hover:underline text-[1rem] text-white hover:text-white">see more Undergraduate Degrees</a></div></div><div class="mr-12 mb-6 grow"><span class="uppercase font-roboto text-[1rem] font-normal text-left pb-6">Earn your online graduate degree</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-mba">Master's in Business Administration</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/masters-in-public-health-online">Master's in Public Health</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-msw-programs">Master's in Social Work</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-msn-programs">Master's in Nursing</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-data-science">Master's in Data Science</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-engineering">Master's in Engineering</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-slp-programs">Master's in Speech Pathology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-slp-programs">Master's in Counseling/Psychology</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/healthcare">Master's Degree in Healthcare</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/masters-in-education-online">Master's Degree in Education</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-artificial-intelligence">Master's Degree in AI</a></li><li class="mb-2 hover:underline text-[1rem]"><a class="text-white hover:text-white" href="/masters/online-masters-in-computer-science">Master's Degree in Computer Science</a></li></ul><div class="flex flex-col text-[1rem]"><a href="/masters" class="hover:underline text-[1rem] text-white hover:text-white">see more Graduate Degrees</a><a href="/doctorate" class="hover:underline text-[1rem] text-white hover:text-white">see more Doctorate Degrees</a></div></div></div><div class="my-4 border-t-[1px] border-solid border-primary-foreground"></div></div><div class="flex flex-wrap justify-between"><div class="mr-12 mb-6"><span class="text-base text-left pb-6 mt-0 font-bold">edx</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://business.edx.org/partner">Partner With Us</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/about-us">About</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://business.edx.org/?_gl=1*y0gcxr*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NDczLjQ1LjAuMA..">edX For Business</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/affiliate-program">Affiliates</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="http://open.edx.org/?_gl=1*lt6kx3*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTQ5LjU5LjAuMA..">Open edX</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/advisory-groups">2U Advisory Council</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/careers">Careers</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://press.edx.org/?_gl=1*8w80my*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTgzLjI1LjAuMA..">News</a></li></ul></div><div class="mr-12 mb-6"><span class="text-base text-left pb-6 mt-0 font-bold">Connect</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/resources">Idea Hub</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://courses.edx.org/support/contact_us?_gl=1*13dq6q5*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NjYyLjYuMC4w">Contact Us</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="https://support.edx.org/?_gl=1*1ej7jnc*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE1MDgxLjUuMC4w">Help Center</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/policy/security">Security</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/media-kit">Media Kit</a></li></ul></div><div class="mb-6 grow"><span class="text-base text-left pb-6 mt-0 font-bold">Legal</span><ul class="my-6 list-none"><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-terms-service">Terms of Service & Honor Code</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-privacy-policy">Privacy Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/edx-privacy-policy/cookies">Cookie Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/accessibility">Accessibility Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/trademarks">Trademark Policy</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/modern-slavery-statement">Modern Slavery Statement</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="/sitemap">Sitemap</a></li><li class="mb-2 hover:underline text-base"><a class="text-white hover:text-white" href="#">Your Privacy Choices</a></li></ul></div><div class="mb-6 flex"><div class="min-w-64"><label for="languageSelector" class="text-base text-left mb-2 mt-0">Choose your language</label><div class="mt-4 flex items-center"><select id="languageSelector" class="text-secondary bg-white text-base border border-gray rounded py-2 px-4 mr-2 w-full focus:border-primary"><option value="en" selected="">English</option><option value="es">Spanish</option></select><button class="inline-flex items-center justify-center whitespace-nowrap rounded-md text-center font-medium transition-colors focus-visible:outline-none focus-visible:ring-1 focus-visible:ring-ring disabled:pointer-events-none disabled:opacity-50 bg-primary text-primary-foreground shadow hover:bg-primary-hover hover:text-primary-hover-foreground h-auto lg:h-10 px-4 text-base border-2 border-primary-foreground">Apply</button></div></div></div></div><div class="flex flex-wrap-reverse justify-between"><p class="text-primary-foreground text-[1rem]">© 2024 edX LLC. All rights reserved.<br/><span>| 深圳市恒宇博科技有限公司</span></p><div class="flex gap-1"><a href="https://itunes.apple.com/us/app/edx/id945480667?mt=8&external_link=true" target="_blank" rel="noopener noreferrer"><img alt="Download on the App Store" title="Download on the App Store" data-ot-ignore="true" loading="lazy" width="120" height="40" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" srcSet="/_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=128&q=75 1x, /_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=256&q=75 2x" src="/_next/image?url=%2Fimages%2Fapple-store-badge-en.png&w=256&q=75"/></a><a href="https://play.google.com/store/apps/details?id=org.edx.mobile&external_link=true" target="_blank" rel="noopener noreferrer"><img alt="Get it on Google Play" title="Get it on Google Play" data-ot-ignore="true" loading="lazy" width="135" height="40" decoding="async" data-nimg="1" class="optanon-category-C0001" style="color:transparent" srcSet="/_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=256&q=75 1x, /_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=384&q=75 2x" src="/_next/image?url=%2Fimages%2Fgoogle-play-badge-en.png&w=384&q=75"/></a></div></div></div></footer></div><!--$--><!--/$--><!--$--><!--/$--><script>(self.__next_s=self.__next_s||[]).push([0,{"children":"window.NREUM||(NREUM={});NREUM.info = {\"agent\":\"\",\"beacon\":\"bam.nr-data.net\",\"errorBeacon\":\"bam.nr-data.net\",\"licenseKey\":\"NRBR-29a7b8c10e12125c415\",\"applicationID\":\"574099970\",\"agentToken\":null,\"applicationTime\":4.673579,\"transactionName\":\"ZwNVMRNUC0QHVEMICl5JYAADcxdWC1JADhdbM0UMTnsATxJdRE4idTIYSjpZClQHW1I8SlwDVhcPGj5UB0NSBgpCH2o=\",\"queueTime\":0,\"ttGuid\":\"509e59c182992d9e\"}; (window.NREUM||(NREUM={})).init={privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.nr-data.net\"]},distributed_tracing:{enabled:true}};(window.NREUM||(NREUM={})).loader_config={agentID:\"594494951\",accountID:\"44163\",trustKey:\"78034\",xpid:\"UAIGV1VADQQEVFhbDgYH\",licenseKey:\"NRBR-29a7b8c10e12125c415\",applicationID:\"574099970\"};;/*! For license information please see nr-loader-spa-1.286.0.min.js.LICENSE.txt */\n(()=>{var e,t,r={8122:(e,t,r)=>{\"use strict\";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]&&\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{\"use strict\";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{\"use strict\";r.d(t,{D0:()=>h,gD:()=>g,xN:()=>p});var n=r(3333);const i=e=>{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=>{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n.$v.MARKS)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(n.$v.MEASURES)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(n.$v.RESOURCES)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0},ssl:void 0,user_actions:{enabled:!0,elementAttributes:[\"id\",\"className\",\"tagName\",\"type\"]}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i<n.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{\"use strict\";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{\"use strict\";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0,harvester:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{\"use strict\";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n=\"1.286.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.18\"},6154:(e,t,r)=>{\"use strict\";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i=\"undefined\"!=typeof window&&!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope&&(\"undefined\"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope&&(\"undefined\"!=typeof self&&self instanceof WorkerGlobalScope&&self||\"undefined\"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&\"undefined\"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{\"use strict\";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")&&(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")&&(e=e.substring(1)),0===t.indexOf(\"/\")&&(t=t.substring(1)),\"\"===e||e===t}},3241:(e,t,r)=>{\"use strict\";r.d(t,{W:()=>o});var n=r(6154);const i=\"newrelic\";function o(e={}){try{n.gm.dispatchEvent(new CustomEvent(i,{detail:e}))}catch(e){}}},1687:(e,t,r)=>{\"use strict\";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{\"use strict\";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{\"use strict\";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{\"use strict\";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{\"use strict\";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{\"use strict\";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{\"use strict\";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=>\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3&o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{\"use strict\";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{\"use strict\";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&\"\"!==r.port||(\"http:\"===t.protocol&&(r.port=\"80\"),\"https:\"===t.protocol&&(r.port=\"443\")),r.pathname&&\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=>{\"use strict\";function n(e,t){\"function\"==typeof console.debug&&console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=>n})},5701:(e,t,r)=>{\"use strict\";r.d(t,{B:()=>a,t:()=>s});var n=r(7836),i=r(3241);const o=new Set,a={};function s(e,t){const r=n.ee.get(t);a[t]??={},e&&\"object\"==typeof e&&(o.has(t)||(r.emit(\"rumresp\",[e]),a[t]=e,o.add(t),(0,i.W)({agentIdentifier:t,loaded:!0,drained:!0,type:\"lifecycle\",name:\"load\",feature:void 0,data:e})))}},8990:(e,t,r)=>{\"use strict\";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{\"use strict\";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if(\"object\"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=>{\"use strict\";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=>{\"use strict\";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{\"use strict\";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{\"use strict\";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object&&(a.RI&&h(document,f),c&&h(c.prototype,f),h(a.gm,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n&&(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{\"use strict\";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e&&\"function\"==typeof e&&e.apply&&!e[o])}},9414:(e,t,r)=>{\"use strict\";r.d(t,{J:()=>c});var n=r(7836),i=r(2646),o=r(944),a=r(3434);const s=new Map;function c(e,t,r,c){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,o.R)(29);const u=function(e){return(e||n.ee).get(\"logger\")}(e),d=(0,a.YM)(u),l=new i.y(n.P);l.level=c.level,l.customAttributes=c.customAttributes;const f=t[r]?.[a.Jt]||t[r];return s.set(f,l),d.inPlace(t,[r],\"wrap-logger-\",(()=>s.get(f))),u}},9300:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{\"use strict\";r.d(t,{$v:()=>u,TZ:()=>n,Zp:()=>i,kd:()=>c,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3,c=[\"PageAction\",\"UserAction\",\"BrowserPerformance\"],u={MARKS:\"experimental.marks\",MEASURES:\"experimental.measures\",RESOURCES:\"experimental.resources\"}},6774:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{\"use strict\";r.d(t,{A$:()=>o,ET:()=>a,TZ:()=>s,p_:()=>i});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o={OFF:0,ERROR:1,WARN:2,INFO:3,DEBUG:4,TRACE:5},a=\"log\",s=n.K7.logging},3785:(e,t,r)=>{\"use strict\";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(8154),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},8154:(e,t,r)=>{\"use strict\";r.d(t,{z_:()=>o,XG:()=>s,TZ:()=>n,rs:()=>i,xV:()=>a});r(6154),r(9566),r(384);const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{\"use strict\";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{\"use strict\";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=>{\"use strict\";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s,rF:()=>d});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}function d(e,t){try{if(\"string\"==typeof t?.type){if(\"password\"===t.type.toLowerCase())return\"*\".repeat(e?.length||0);if(void 0!==t?.dataset?.nrUnmask||t?.classList?.contains(\"nr-unmask\"))return e}}catch(e){}return\"string\"==typeof e?e.replace(/[\\S]/g,\"*\"):\"*\".repeat(e?.length||0)}},3738:(e,t,r)=>{\"use strict\";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=>{\"use strict\";r.d(t,{AM:()=>o,O2:()=>c,Qu:()=>u,TZ:()=>s,ih:()=>d,pP:()=>a,tC:()=>i});var n=r(860);const i=[\"click\",\"keydown\",\"submit\",\"popstate\"],o=\"api\",a=\"initialPageLoad\",s=n.K7.softNav,c={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},u={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},d={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=>{\"use strict\";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>A,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>T,uP:()=>s,wW:()=>E,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",E=\"cb\"+R,A=\"jsTime\",T=\"fetch\"},4234:(e,t,r)=>{\"use strict\";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{\"use strict\";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},8969:(e,t,r)=>{\"use strict\";r.d(t,{j:()=>I});var n=r(860),i=r(2555),o=r(9908),a=r(1687),s=r(5289),c=r(6154),u=r(944),d=r(8154),l=r(384),f=r(6344);const h=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"recordCustomEvent\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",f.G4.RECORD,f.G4.PAUSE,\"log\",\"wrapLogger\"],p=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var g=r(1863),m=r(2614),v=r(993),b=r(3785),y=r(9414),w=r(3241),R=r(5701);function x(){const e=(0,l.pV)();h.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.runtime?e.exposed&&e[t]&&\"micro-agent\"!==e.runtime.loaderType&&n.push(e[t](...r)):(0,u.R)(38,t)})),n[0]}(t,...r)}))}const E={};var A=r(9417),T=r(5603),S=r(3371);const N=e=>{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};var O=r(7836);const _=new Set;function I(e,t={},h,I){let{init:P,info:j,loader_config:C,runtime:k={},exposed:L=!0}=t;k.loaderType=h;const H=(0,l.pV)();j||(P=H.init,j=H.info,C=H.loader_config),(0,A.xN)(e.agentIdentifier,P||{}),(0,T.a)(e.agentIdentifier,C||{}),j.jsAttributes??={},c.bv&&(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const M=e.init,D=[j.beacon,j.errorBeacon];_.has(e.agentIdentifier)||(M.proxy.assets&&(N(M.proxy.assets),D.push(M.proxy.assets)),M.proxy.beacon&&D.push(M.proxy.beacon),x(),(0,l.US)(\"activatedFeatures\",R.B),e.runSoftNavOverSpa&&=!0===M.soft_navigations.enabled&&M.feature_flags.includes(\"soft_nav\")),k.denyList=[...M.ajax.deny_list||[],...M.ajax.block_internal?D:[]],k.ptid=e.agentIdentifier,(0,S.V)(e.agentIdentifier,k),_.has(e.agentIdentifier)||(e.ee=O.ee.get(e.agentIdentifier),e.exposed=L,function(e,t){t||(0,a.Ak)(e.agentIdentifier,\"api\");const l=e.ee.get(\"tracer\");E[e.agentIdentifier]=m.g.OFF,e.ee.on(f.G4.REPLAY_RUNNING,(t=>{E[e.agentIdentifier]=t}));const h=\"api-\",x=h+\"ixn-\";function A(t,r,n,o){const a=e.info;return null===r?delete a.jsAttributes[t]:(0,i.x1)(e.agentIdentifier,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),N(h,n,!0,o||null===r?\"session\":void 0)(t,r)}function T(){}e.log=function(t,{customAttributes:r={},level:i=v.p_.INFO}={}){(0,o.p)(d.xV,[\"API/log/called\"],void 0,n.K7.metrics,e.ee),(0,b.R)(e.ee,t,r,i)},e.wrapLogger=(t,r,{customAttributes:i={},level:a=v.p_.INFO}={})=>{(0,o.p)(d.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,e.ee),(0,y.J)(e.ee,t,r,{customAttributes:i,level:a})},p.forEach((t=>{e[t]=N(h,t,!0,\"api\")})),e.addPageAction=N(h,\"addPageAction\",!0,n.K7.genericEvents),e.recordCustomEvent=N(h,\"recordCustomEvent\",!0,n.K7.genericEvents),e.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)&&(t=\"/\"+t),e.runtime.customTransaction=(r||\"http://custom.transaction\")+t,N(h,\"setPageViewName\",!0)()},e.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return A(e,t,\"setCustomAttribute\",r);(0,u.R)(40,typeof t)}else(0,u.R)(39,typeof e)},e.setUserId=function(e){if(\"string\"==typeof e||null===e)return A(\"enduser.id\",e,\"setUserId\",!0);(0,u.R)(41,typeof e)},e.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return A(\"application.version\",e,\"setApplicationVersion\",!1);(0,u.R)(42,typeof e)},e.start=()=>{try{(0,o.p)(d.xV,[\"API/start/called\"],void 0,n.K7.metrics,e.ee),e.ee.emit(\"manual-start-all\")}catch(e){(0,u.R)(23,e)}},e[f.G4.RECORD]=function(){(0,o.p)(d.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(f.G4.RECORD,[],void 0,n.K7.sessionReplay,e.ee)},e[f.G4.PAUSE]=function(){(0,o.p)(d.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(f.G4.PAUSE,[],void 0,n.K7.sessionReplay,e.ee)},e.interaction=function(e){return(new T).get(\"object\"==typeof e?e:{})};const S=T.prototype={createTracer:function(t,r){var i={},a=this,s=\"function\"==typeof r;return(0,o.p)(d.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,e.ee),e.runSoftNavOverSpa||(0,o.p)(x+\"tracer\",[(0,g.t)(),t,i],a,n.K7.spa,e.ee),function(){if(l.emit((s?\"\":\"no-\")+\"fn-start\",[(0,g.t)(),a,s],i),s)try{return r.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw l.emit(\"fn-err\",[arguments,this,t],i),t}finally{l.emit(\"fn-end\",[(0,g.t)()],i)}}}};function N(t,r,i,a){return function(){return(0,o.p)(d.xV,[\"API/\"+r+\"/called\"],void 0,n.K7.metrics,e.ee),(0,w.W)({agentIdentifier:e.agentIdentifier,drained:!!R.B?.[e.agentIdentifier],type:\"data\",name:\"api\",feature:t+r,data:{notSpa:i,bufferGroup:a}}),a&&(0,o.p)(t+r,[i?(0,g.t)():performance.now(),...arguments],i?null:this,a,e.ee),i?void 0:this}}function O(){r.e(478).then(r.bind(r,8778)).then((({setAsyncAPI:t})=>{t(e),(0,a.Ze)(e.agentIdentifier,\"api\")})).catch((t=>{(0,u.R)(27,t),e.ee.abort()}))}[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((t=>{S[t]=N(x,t,void 0,e.runSoftNavOverSpa?n.K7.softNav:n.K7.spa)})),e.setCurrentRouteName=e.runSoftNavOverSpa?N(x,\"routeName\",void 0,n.K7.softNav):N(h,\"routeName\",!0,n.K7.spa),e.noticeError=function(t,r){\"string\"==typeof t&&(t=new Error(t)),(0,o.p)(d.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(\"err\",[t,(0,g.t)(),!1,r,!!E[e.agentIdentifier]],void 0,n.K7.jserrors,e.ee)},c.RI?(0,s.GG)((()=>O()),!0):O()}(e,I),(0,w.W)({agentIdentifier:e.agentIdentifier,drained:!!R.B?.[e.agentIdentifier],type:\"lifecycle\",name:\"initialize\",feature:void 0,data:e.config})),_.add(e.agentIdentifier)}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=>{\"use strict\";r.d(t,{$J:()=>d,K7:()=>c,P3:()=>u,XX:()=>i,Yy:()=>s,df:()=>o,qY:()=>n,v4:()=>a});const n=\"events\",i=\"jserrors\",o=\"browser/blobs\",a=\"rum\",s=\"browser/logs\",c={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:i,logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},u={[c.pageViewEvent]:1,[c.pageViewTiming]:2,[c.metrics]:3,[c.jserrors]:4,[c.spa]:5,[c.ajax]:6,[c.sessionTrace]:7,[c.softNav]:8,[c.sessionReplay]:9,[c.logging]:10,[c.genericEvents]:11},d={[c.pageViewEvent]:a,[c.pageViewTiming]:n,[c.ajax]:n,[c.spa]:n,[c.softNav]:n,[c.metrics]:i,[c.jserrors]:i,[c.sessionTrace]:o,[c.sessionReplay]:o,[c.logging]:s,[c.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.286.0.min.js\"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.286.0.PROD:\",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-xt9QypT23DNupLy9wXPzK6uGCHucLx9ieBiprVZwJD/HfkKcTY5t9xUrMvJ/ybOBfVDiFPL8R/YCJHdANxjV3g==\",249:\"sha512-KxJzV7dF4ry7RzxsxRBMJPnHjRdZUbseWowgGkDemMtubSveBZAlqlWb/489Lpd5K2u0Q2zTSBK599A9+u9jpA==\",212:\"sha512-ges3wTNuYgFINvgkoryTYKsHZWBqvLFD9qo1XJQWq5OYq+1DVXuGFs9cYogVoQEoCQxuaUdKAXcxF/sl3Ntbrg==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc&&s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")&&(s.crossOrigin=\"anonymous\"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{\"undefined\"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&(\"load\"===r.type?\"missing\":r.type),a=r&&r.target&&r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.286.0.PROD\"]=self[\"webpackChunk:NRBA-1.286.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(){this.agentIdentifier=(0,r.LA)(16)}#e(t,...r){if(this[t]!==n.prototype[t])return this[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}recordCustomEvent(e,t){return this.#e(\"recordCustomEvent\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(this[t]!==o.prototype[t]&&this[t]!==n.prototype[t])return this[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(8969);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),t.runtime.harvester.initializedAggregates.push(this.featAggregate),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),E=i(2843),A=i(3878),T=i(782),S=i(1863);class N extends b{static featureName=T.T;constructor(e,t=!0){super(e,T.T,t),p.RI&&((0,E.u)((()=>(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,T.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=>(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,T.T,this.ee))),this.importAggregator(e))}}var O=i(8154);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),p.RI&&document.addEventListener(\"securitypolicyviolation\",(e=>{(0,x.p)(O.xV,[\"Generic/CSPViolation/Detected\"],void 0,this.featureName,this.ee)})),this.importAggregator(e)}}var I=i(6774),P=i(3304);class j{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,P.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new j(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection: \";if(!e?.reason)return;if(H(e.reason)){try{e.reason.message.startsWith(t)||(e.reason.message=t+e.reason.message)}catch(e){}return C(e.reason)}const r=C(e.reason);return(r.message||\"\").startsWith(t)||(r.message=t+r.message),r}function L(e){if(e.error instanceof SyntaxError&&!/:\\d+$/.test(e.error.stack?.trim())){const t=new j(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class M extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",((e,t)=>{this.abortHandler&&(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r,t],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=>{this.abortHandler&&(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=>{this.abortHandler&&(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var D=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t&&\"function\"!==t?-1:e===p.gm?0:(0,D.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e&&e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!(\"undefined\"!=typeof FormData&&e instanceof FormData))try{return(0,P.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",J=Y+\"body-\",X=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,X.forEach((e=>{r(Q[te],e,J),r(ee[te],e,J)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i&&(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,P.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;const he=\"X-NewRelic-App-Data\";class pe extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};ge(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){E(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},ge(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||\"function\"!=typeof r.onload)&&\"function\"==typeof o.end)&&o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&\"load\"===e[0]&&t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&\"load\"===e[0]&&t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&(\"onload\"===r&&(this.onload=!0),(\"load\"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=\"\"+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString&&(t=e[0].toString()),\"string\"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader&&e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&\"object\"==typeof i&&i instanceof URL&&(r=i.href),ge(this,r);var o=(\"\"+(i&&i instanceof le&&i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCaptureCalled||4!==e.readyState?null==t.status&&(t.status=0):E(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function E(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r&&null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin&&r.getAllResponseHeaders().indexOf(he)>=0){var i=r.getResponseHeader(he);i&&((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function ge(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const me={},ve=[\"pushState\",\"replaceState\"];function be(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||me[t.debugId]++||(me[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,ve,\"-\")),t}var ye=i(3738);const{He:we,bD:Re,d3:xe,Kp:Ee,TZ:Ae,Lc:Te,uP:Se,Rz:Ne}=ye;class Oe extends b{static featureName=Ae;constructor(e,t=!0){super(e,Ae,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;be(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Se,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Te,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Ne+xe,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Ne+Ee,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(we,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:Re,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var _e=i(2614);class Ie extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(_e.H3,\"_\").concat(_e.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===_e.g.FULL||e.sessionReplayMode===_e.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee,agentRef:this.#o}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==_e.g.FULL&&this.featAggregate.initializeRecording(_e.g.FULL,!0):(this.#i=_e.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==_e.g.FULL&&(this.recorder.parent.mode=_e.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Pe=i(3962);class je extends b{static featureName=Pe.TZ;constructor(e,t=!0){if(super(e,Pe.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=be(this.ee);Pe.tC.forEach((e=>{(0,A.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=>(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Ce=i(7378);const ke={},Le=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function He(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||ke[t.debugId])return t;ke[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,Le,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const Me={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(Me[t.debugId])return t;Me[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const Ke={},Ue=\"setTimeout\",Ve=\"setInterval\",Ge=\"clearTimeout\",Fe=\"-start\",Be=[Ue,\"setImmediate\",Ve,Ge,\"clearImmediate\"];function We(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Ke[t.debugId]++)return t;Ke[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Be.slice(0,2),Ue+\"-\"),r.inPlace(p.gm,Be.slice(2,3),Ve+\"-\"),r.inPlace(p.gm,Be.slice(3),Ge+\"-\"),t.on(Ve+Fe,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ue+Fe,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const ze={};function qe(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||ze[t.debugId])return t;ze[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:Ze,d3:Ye,Kp:Je,$p:Xe,wW:$e,e5:Qe,tH:et,uP:tt,rw:rt,Lc:nt}=Ce;class it extends b{static featureName=Ze;constructor(e,t=!0){if(super(e,Ze,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=He(this.ee),a=De(this.ee),s=We(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=be(this.ee),f=qe(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[tt]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[tt],this[nt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(tt,g),a.on(rt,g),o.on(rt,g),this.ee.on(nt,m),a.on($e,m),o.on($e,m),this.ee.on(\"fn-err\",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([tt,nt,\"xhr-resolved\"],this.featureName),u.buffer([tt],this.featureName),s.buffer([\"setTimeout\"+Je,\"clearTimeout\"+Ye,tt],this.featureName),c.buffer([tt,\"new-xhr\",\"send-xhr\"+Ye],this.featureName),d.buffer([et+Ye,et+\"-done\",et+Xe+Ye,et+Xe+Je],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([tt],this.featureName),a.buffer([\"propagate\",rt,$e,\"executor-err\",\"resolve\"+Ye],this.featureName),i.buffer([tt,\"no-\"+tt],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,et+Ye),v(d,et+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n>1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var ot=i(3333);class at extends b{static featureName=ot.TZ;constructor(e,t=!0){super(e,ot.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled,e.init.performance.resources.enabled];if(p.RI&&(e.init.user_actions.enabled&&(ot.Zp.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),ot.qN.forEach((e=>{const t=(0,v.s)((e=>{(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)}),500,{leading:!0});(0,A.sp)(e,t)}))),e.init.performance.resources.enabled&&p.gm.PerformanceObserver?.supportedEntryTypes.includes(\"resource\"))){new PerformanceObserver((e=>{e.getEntries().forEach((e=>{(0,x.p)(\"browserPerformance.resource\",[e],void 0,this.featureName,this.ee)}))})).observe({type:\"resource\",buffered:!0})}r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var st=i(993),ct=i(3785),ut=i(9414);class dt extends b{static featureName=st.TZ;constructor(e,t=!0){super(e,st.TZ,t);const r=this.ee;(0,ut.J)(r,p.gm.console,\"log\",{level:\"info\"}),(0,ut.J)(r,p.gm.console,\"error\",{level:\"error\"}),(0,ut.J)(r,p.gm.console,\"warn\",{level:\"warn\"}),(0,ut.J)(r,p.gm.console,\"info\",{level:\"info\"}),(0,ut.J)(r,p.gm.console,\"debug\",{level:\"debug\"}),(0,ut.J)(r,p.gm.console,\"trace\",{level:\"trace\"}),this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,ct.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t){super(),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}get api(){return this}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[pe,w,N,Oe,Ie,_,M,at,dt,je,it],loaderType:\"spa\"})})()})();","id":"nr-browser-agent"}])</script><script src="/_next/static/chunks/webpack-a4f9812243050229.js" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0])</script><script>self.__next_f.push([1,"1:\"$Sreact.fragment\"\n2:I[87555,[],\"\"]\n3:I[31295,[],\"\"]\n6:I[59665,[],\"MetadataBoundary\"]\n8:I[59665,[],\"OutletBoundary\"]\nb:I[74911,[],\"AsyncMetadataOutlet\"]\nd:I[59665,[],\"ViewportBoundary\"]\nf:I[26614,[],\"\"]\n10:\"$Sreact.suspense\"\n11:I[74911,[],\"AsyncMetadata\"]\n13:I[69243,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"4902\",\"static/chunks/4902-a502401b22596fb4.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"3224\",\"static/chunks/app/%5Blocale%5D/not-found-51e0afcfe2220a57.js\"],\"\"]\n17:I[50225,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n18:I[4924,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/ch"])</script><script>self.__next_f.push([1,"unks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"ClientOnly\"]\n19:I[55541,[\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"2981\",\"static/chunks/2981-01390deb7d8c5e7f.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"8450\",\"static/chunks/app/%5Blocale%5D/layout-2a139665c274d279.js\"],\"CohesionReady\"]\n1a:I[44595,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\","])</script><script>self.__next_f.push([1,"\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"CohesionProvider\"]\n1b:I[11704,[\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"2981\",\"static/chunks/2981-01390deb7d8c5e7f.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"8450\",\"static/chunks/app/%5Blocale%5D/layout-2a139665c274d279.js\"],\"MonarchRuleProvider\"]\n1f:I[78830,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n20:I[16511,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"stat"])</script><script>self.__next_f.push([1,"ic/chunks/4027-042478c0003133da.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"8530\",\"static/chunks/app/%5Blocale%5D/error-08837b7ba890f046.js\"],\"default\"]\n:HL[\"/_next/static/media/a34f9d1faa5f3315-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/css/ac5d9ab56c20cfb8.css\",\"style\"]\n:HL[\"/_next/static/css/3fa5b5f2f793e4c1.css\",\"style\"]\n:HL[\"/_next/static/css/8848c94dc66fe2aa.css\",\"style\"]\n:HL[\"/_next/static/css/811f10d283271a23.css\",\"style\"]\n:HL[\"/_next/static/css/8797c4ddf1b9f026.css\",\"style\"]\n:HL[\"/_next/static/css/7e9d27ec358490ac.css\",\"style\"]\n:HL[\"/_next/static/css/1e97b410b545a5d8.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"0:{\"P\":null,\"b\":\"ZdFoQtvBWDgkXwUty6qBH\",\"p\":\"\",\"c\":[\"\",\"learn\",\"veeam\"],\"i\":false,\"f\":[[[\"\",{\"children\":[[\"locale\",\"en\",\"d\"],{\"children\":[\"learn\",{\"children\":[[\"category\",\"veeam\",\"d\"],{\"children\":[\"__PAGE__\",{}]}]}]},\"$undefined\",\"$undefined\",true]}],[\"\",[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L2\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L3\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[[[\"$\",\"title\",null,{\"children\":\"404: This page could not be found.\"}],[\"$\",\"div\",null,{\"style\":{\"fontFamily\":\"system-ui,\\\"Segoe UI\\\",Roboto,Helvetica,Arial,sans-serif,\\\"Apple Color Emoji\\\",\\\"Segoe UI Emoji\\\"\",\"height\":\"100vh\",\"textAlign\":\"center\",\"display\":\"flex\",\"flexDirection\":\"column\",\"alignItems\":\"center\",\"justifyContent\":\"center\"},\"children\":[\"$\",\"div\",null,{\"children\":[[\"$\",\"style\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}\"}}],[\"$\",\"h1\",null,{\"className\":\"next-error-h1\",\"style\":{\"display\":\"inline-block\",\"margin\":\"0 20px 0 0\",\"padding\":\"0 23px 0 0\",\"fontSize\":24,\"fontWeight\":500,\"verticalAlign\":\"top\",\"lineHeight\":\"49px\"},\"children\":404}],[\"$\",\"div\",null,{\"style\":{\"display\":\"inline-block\"},\"children\":[\"$\",\"h2\",null,{\"style\":{\"fontSize\":14,\"fontWeight\":400,\"lineHeight\":\"49px\",\"margin\":0},\"children\":\"This page could not be found.\"}]}]]}]}]],[]],\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[[\"locale\",\"en\",\"d\"],[\"$\",\"$1\",\"c\",{\"children\":[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/ac5d9ab56c20cfb8.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/3fa5b5f2f793e4c1.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],\"$L4\"]}],{\"children\":[\"learn\",[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L2\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L3\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[[\"category\",\"veeam\",\"d\"],[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L2\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L3\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[\"__PAGE__\",[\"$\",\"$1\",\"c\",{\"children\":[\"$L5\",[\"$\",\"$L6\",null,{\"children\":\"$L7\"}],[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8848c94dc66fe2aa.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/811f10d283271a23.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8797c4ddf1b9f026.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"3\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/7e9d27ec358490ac.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"4\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/1e97b410b545a5d8.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],[\"$\",\"$L8\",null,{\"children\":[\"$L9\",\"$La\",[\"$\",\"$Lb\",null,{\"promise\":\"$@c\"}]]}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false],[\"$\",\"$1\",\"h\",{\"children\":[null,[\"$\",\"$1\",\"in3O_exSlF1nufJop67SW\",{\"children\":[[\"$\",\"$Ld\",null,{\"children\":\"$Le\"}],[\"$\",\"meta\",null,{\"name\":\"next-size-adjust\",\"content\":\"\"}]]}],null]}],false]],\"m\":\"$undefined\",\"G\":[\"$f\",\"$undefined\"],\"s\":false,\"S\":false}\n"])</script><script>self.__next_f.push([1,"7:[\"$\",\"$10\",null,{\"fallback\":null,\"children\":[\"$\",\"$L11\",null,{\"promise\":\"$@12\"}]}]\na:null\n14:T492,\n function OptanonWrapper() {\n function loadSegmentIfConsented() {\n let activeGroups = window.OnetrustActiveGroups || \"\";\n let requiredCategories = [\"C0002\", \"C0004\"];\n let hasConsent = requiredCategories.every((cat) =\u003e\n activeGroups.includes(\",\" + cat + \",\"),\n );\n let script = document.getElementById(\"segment-analytics\")\n if (hasConsent \u0026\u0026 script \u0026\u0026 script.type === \"text/plain\") {\n script.type = \"text/javascript\";\n }\n if (!hasConsent \u0026\u0026 script \u0026\u0026 script.type !== \"text/plain\") {\n script.type = \"text/plain\"; // Prevent execution\n }\n }\n let taxiFormScript = document.getElementById(\"taxi-form-script\")\n if (taxiFormScript \u0026\u0026 taxiFormScript.type === \"text/plain\") {\n taxiFormScript.type = \"text/javascript\";\n }\n loadSegmentIfConsented();\n OneTrust.OnConsentChanged(loadSegmentIfConsented);\n }\n 15:Ta3d,"])</script><script>self.__next_f.push([1,"!(function () {\n var i = \"analytics\",\n analytics = (window[i] = window[i] || []);\n if (!analytics.initialize)\n if (analytics.invoked)\n window.console \u0026\u0026\n console.error \u0026\u0026\n console.error(\"Segment snippet included twice.\");\n else {\n analytics.invoked = !0;\n analytics.methods = [\n \"trackSubmit\",\n \"trackClick\",\n \"trackLink\",\n \"trackForm\",\n \"pageview\",\n \"identify\",\n \"reset\",\n \"group\",\n \"track\",\n \"ready\",\n \"alias\",\n \"debug\",\n \"page\",\n \"screen\",\n \"once\",\n \"off\",\n \"on\",\n \"addSourceMiddleware\",\n \"addIntegrationMiddleware\",\n \"setAnonymousId\",\n \"addDestinationMiddleware\",\n \"register\",\n ];\n analytics.factory = function (e) {\n return function () {\n if (window[i].initialized)\n return window[i][e].apply(window[i], arguments);\n var n = Array.prototype.slice.call(arguments);\n if (\n [\"track\", \"screen\", \"alias\", \"group\", \"page\", \"identify\"].indexOf(\n e\n ) \u003e -1\n ) {\n var c = document.querySelector(\"link[rel='canonical']\");\n n.push({\n __t: \"bpc\",\n c: (c \u0026\u0026 c.getAttribute(\"href\")) || void 0,\n p: location.pathname,\n u: location.href,\n s: location.search,\n t: document.title,\n r: document.referrer,\n });\n }\n n.unshift(e);\n analytics.push(n);\n return analytics;\n };\n };\n for (var n = 0; n \u003c analytics.methods.length; n++) {\n var key = analytics.methods[n];\n analytics[key] = analytics.factory(key);\n }\n analytics.load = function (key, n) {\n var t = document.createElement(\"script\");\n t.type = \"text/plain\";\n t.async = !0;\n t.id = \"segment-analytics\";\n t.setAttribute(\"data-global-segment-analytics-key\", i);\n t.setAttribute(\"class\", \"optanon-category-C0002-C0004\")\n t.src =\n \"https://cdn.segment.com/analytics.js/v1/\" +\n key +\n \"/analytics.min.js\";\n var r = document.getElementsByTagName(\"script\")[0];\n r.parentNode.insertBefore(t, r);\n analytics._loadOptions = n;\n };\n analytics._writeKey = \"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\";\n analytics.SNIPPET_VERSION = \"5.2.0\";\n analytics.load(\"lwt68hX0axsop9XVP6cbIDVPAqbleoeC\", {user: {storage: {stores: [\"cookie\", \"localStorage\", \"memory\"]}}});\n analytics.page()\n }\n})()"])</script><script>self.__next_f.push([1,"1d:Tef95,"])</script><script>self.__next_f.push([1,"window.NREUM||(NREUM={});NREUM.info = {\"agent\":\"\",\"beacon\":\"bam.nr-data.net\",\"errorBeacon\":\"bam.nr-data.net\",\"licenseKey\":\"NRBR-29a7b8c10e12125c415\",\"applicationID\":\"574099970\",\"agentToken\":null,\"applicationTime\":4.673579,\"transactionName\":\"ZwNVMRNUC0QHVEMICl5JYAADcxdWC1JADhdbM0UMTnsATxJdRE4idTIYSjpZClQHW1I8SlwDVhcPGj5UB0NSBgpCH2o=\",\"queueTime\":0,\"ttGuid\":\"509e59c182992d9e\"}; (window.NREUM||(NREUM={})).init={privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.nr-data.net\"]},distributed_tracing:{enabled:true}};(window.NREUM||(NREUM={})).loader_config={agentID:\"594494951\",accountID:\"44163\",trustKey:\"78034\",xpid:\"UAIGV1VADQQEVFhbDgYH\",licenseKey:\"NRBR-29a7b8c10e12125c415\",applicationID:\"574099970\"};;/*! For license information please see nr-loader-spa-1.286.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003eh,gD:()=\u003eg,xN:()=\u003ep});var n=r(3333);const i=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=\u003e{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n.$v.MARKS)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(n.$v.MEASURES)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(n.$v.RESOURCES)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0},ssl:void 0,user_actions:{enabled:!0,elementAttributes:[\"id\",\"className\",\"tagName\",\"type\"]}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r\u0026\u0026(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0,harvester:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.286.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.18\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},3241:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(6154);const i=\"newrelic\";function o(e={}){try{n.gm.dispatchEvent(new CustomEvent(i,{detail:e}))}catch(e){}}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5701:(e,t,r)=\u003e{\"use strict\";r.d(t,{B:()=\u003ea,t:()=\u003es});var n=r(7836),i=r(3241);const o=new Set,a={};function s(e,t){const r=n.ee.get(t);a[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(o.has(t)||(r.emit(\"rumresp\",[e]),a[t]=e,o.add(t),(0,i.W)({agentIdentifier:t,loaded:!0,drained:!0,type:\"lifecycle\",name:\"load\",feature:void 0,data:e})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),c\u0026\u0026h(c.prototype,f),h(a.gm,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9414:(e,t,r)=\u003e{\"use strict\";r.d(t,{J:()=\u003ec});var n=r(7836),i=r(2646),o=r(944),a=r(3434);const s=new Map;function c(e,t,r,c){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,o.R)(29);const u=function(e){return(e||n.ee).get(\"logger\")}(e),d=(0,a.YM)(u),l=new i.y(n.P);l.level=c.level,l.customAttributes=c.customAttributes;const f=t[r]?.[a.Jt]||t[r];return s.set(f,l),d.inPlace(t,[r],\"wrap-logger-\",(()=\u003es.get(f))),u}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{$v:()=\u003eu,TZ:()=\u003en,Zp:()=\u003ei,kd:()=\u003ec,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3,c=[\"PageAction\",\"UserAction\",\"BrowserPerformance\"],u={MARKS:\"experimental.marks\",MEASURES:\"experimental.measures\",RESOURCES:\"experimental.resources\"}},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{A$:()=\u003eo,ET:()=\u003ea,TZ:()=\u003es,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o={OFF:0,ERROR:1,WARN:2,INFO:3,DEBUG:4,TRACE:5},a=\"log\",s=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(8154),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},8154:(e,t,r)=\u003e{\"use strict\";r.d(t,{z_:()=\u003eo,XG:()=\u003es,TZ:()=\u003en,rs:()=\u003ei,xV:()=\u003ea});r(6154),r(9566),r(384);const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es,rF:()=\u003ed});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}function d(e,t){try{if(\"string\"==typeof t?.type){if(\"password\"===t.type.toLowerCase())return\"*\".repeat(e?.length||0);if(void 0!==t?.dataset?.nrUnmask||t?.classList?.contains(\"nr-unmask\"))return e}}catch(e){}return\"string\"==typeof e?e.replace(/[\\S]/g,\"*\"):\"*\".repeat(e?.length||0)}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003ec,Qu:()=\u003eu,TZ:()=\u003es,ih:()=\u003ed,pP:()=\u003ea,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\",\"popstate\"],o=\"api\",a=\"initialPageLoad\",s=n.K7.softNav,c={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},u={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},d={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eA,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eT,uP:()=\u003es,wW:()=\u003eE,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",E=\"cb\"+R,A=\"jsTime\",T=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},8969:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003eI});var n=r(860),i=r(2555),o=r(9908),a=r(1687),s=r(5289),c=r(6154),u=r(944),d=r(8154),l=r(384),f=r(6344);const h=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"recordCustomEvent\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",f.G4.RECORD,f.G4.PAUSE,\"log\",\"wrapLogger\"],p=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var g=r(1863),m=r(2614),v=r(993),b=r(3785),y=r(9414),w=r(3241),R=r(5701);function x(){const e=(0,l.pV)();h.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.runtime?e.exposed\u0026\u0026e[t]\u0026\u0026\"micro-agent\"!==e.runtime.loaderType\u0026\u0026n.push(e[t](...r)):(0,u.R)(38,t)})),n[0]}(t,...r)}))}const E={};var A=r(9417),T=r(5603),S=r(3371);const N=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};var O=r(7836);const _=new Set;function I(e,t={},h,I){let{init:P,info:j,loader_config:C,runtime:k={},exposed:L=!0}=t;k.loaderType=h;const H=(0,l.pV)();j||(P=H.init,j=H.info,C=H.loader_config),(0,A.xN)(e.agentIdentifier,P||{}),(0,T.a)(e.agentIdentifier,C||{}),j.jsAttributes??={},c.bv\u0026\u0026(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const M=e.init,D=[j.beacon,j.errorBeacon];_.has(e.agentIdentifier)||(M.proxy.assets\u0026\u0026(N(M.proxy.assets),D.push(M.proxy.assets)),M.proxy.beacon\u0026\u0026D.push(M.proxy.beacon),x(),(0,l.US)(\"activatedFeatures\",R.B),e.runSoftNavOverSpa\u0026\u0026=!0===M.soft_navigations.enabled\u0026\u0026M.feature_flags.includes(\"soft_nav\")),k.denyList=[...M.ajax.deny_list||[],...M.ajax.block_internal?D:[]],k.ptid=e.agentIdentifier,(0,S.V)(e.agentIdentifier,k),_.has(e.agentIdentifier)||(e.ee=O.ee.get(e.agentIdentifier),e.exposed=L,function(e,t){t||(0,a.Ak)(e.agentIdentifier,\"api\");const l=e.ee.get(\"tracer\");E[e.agentIdentifier]=m.g.OFF,e.ee.on(f.G4.REPLAY_RUNNING,(t=\u003e{E[e.agentIdentifier]=t}));const h=\"api-\",x=h+\"ixn-\";function A(t,r,n,o){const a=e.info;return null===r?delete a.jsAttributes[t]:(0,i.x1)(e.agentIdentifier,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),N(h,n,!0,o||null===r?\"session\":void 0)(t,r)}function T(){}e.log=function(t,{customAttributes:r={},level:i=v.p_.INFO}={}){(0,o.p)(d.xV,[\"API/log/called\"],void 0,n.K7.metrics,e.ee),(0,b.R)(e.ee,t,r,i)},e.wrapLogger=(t,r,{customAttributes:i={},level:a=v.p_.INFO}={})=\u003e{(0,o.p)(d.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,e.ee),(0,y.J)(e.ee,t,r,{customAttributes:i,level:a})},p.forEach((t=\u003e{e[t]=N(h,t,!0,\"api\")})),e.addPageAction=N(h,\"addPageAction\",!0,n.K7.genericEvents),e.recordCustomEvent=N(h,\"recordCustomEvent\",!0,n.K7.genericEvents),e.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),e.runtime.customTransaction=(r||\"http://custom.transaction\")+t,N(h,\"setPageViewName\",!0)()},e.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return A(e,t,\"setCustomAttribute\",r);(0,u.R)(40,typeof t)}else(0,u.R)(39,typeof e)},e.setUserId=function(e){if(\"string\"==typeof e||null===e)return A(\"enduser.id\",e,\"setUserId\",!0);(0,u.R)(41,typeof e)},e.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return A(\"application.version\",e,\"setApplicationVersion\",!1);(0,u.R)(42,typeof e)},e.start=()=\u003e{try{(0,o.p)(d.xV,[\"API/start/called\"],void 0,n.K7.metrics,e.ee),e.ee.emit(\"manual-start-all\")}catch(e){(0,u.R)(23,e)}},e[f.G4.RECORD]=function(){(0,o.p)(d.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(f.G4.RECORD,[],void 0,n.K7.sessionReplay,e.ee)},e[f.G4.PAUSE]=function(){(0,o.p)(d.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(f.G4.PAUSE,[],void 0,n.K7.sessionReplay,e.ee)},e.interaction=function(e){return(new T).get(\"object\"==typeof e?e:{})};const S=T.prototype={createTracer:function(t,r){var i={},a=this,s=\"function\"==typeof r;return(0,o.p)(d.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,e.ee),e.runSoftNavOverSpa||(0,o.p)(x+\"tracer\",[(0,g.t)(),t,i],a,n.K7.spa,e.ee),function(){if(l.emit((s?\"\":\"no-\")+\"fn-start\",[(0,g.t)(),a,s],i),s)try{return r.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw l.emit(\"fn-err\",[arguments,this,t],i),t}finally{l.emit(\"fn-end\",[(0,g.t)()],i)}}}};function N(t,r,i,a){return function(){return(0,o.p)(d.xV,[\"API/\"+r+\"/called\"],void 0,n.K7.metrics,e.ee),(0,w.W)({agentIdentifier:e.agentIdentifier,drained:!!R.B?.[e.agentIdentifier],type:\"data\",name:\"api\",feature:t+r,data:{notSpa:i,bufferGroup:a}}),a\u0026\u0026(0,o.p)(t+r,[i?(0,g.t)():performance.now(),...arguments],i?null:this,a,e.ee),i?void 0:this}}function O(){r.e(478).then(r.bind(r,8778)).then((({setAsyncAPI:t})=\u003e{t(e),(0,a.Ze)(e.agentIdentifier,\"api\")})).catch((t=\u003e{(0,u.R)(27,t),e.ee.abort()}))}[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((t=\u003e{S[t]=N(x,t,void 0,e.runSoftNavOverSpa?n.K7.softNav:n.K7.spa)})),e.setCurrentRouteName=e.runSoftNavOverSpa?N(x,\"routeName\",void 0,n.K7.softNav):N(h,\"routeName\",!0,n.K7.spa),e.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,o.p)(d.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,e.ee),(0,o.p)(\"err\",[t,(0,g.t)(),!1,r,!!E[e.agentIdentifier]],void 0,n.K7.jserrors,e.ee)},c.RI?(0,s.GG)((()=\u003eO()),!0):O()}(e,I),(0,w.W)({agentIdentifier:e.agentIdentifier,drained:!!R.B?.[e.agentIdentifier],type:\"lifecycle\",name:\"initialize\",feature:void 0,data:e.config})),_.add(e.agentIdentifier)}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003ed,K7:()=\u003ec,P3:()=\u003eu,XX:()=\u003ei,Yy:()=\u003es,df:()=\u003eo,qY:()=\u003en,v4:()=\u003ea});const n=\"events\",i=\"jserrors\",o=\"browser/blobs\",a=\"rum\",s=\"browser/logs\",c={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:i,logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},u={[c.pageViewEvent]:1,[c.pageViewTiming]:2,[c.metrics]:3,[c.jserrors]:4,[c.spa]:5,[c.ajax]:6,[c.sessionTrace]:7,[c.softNav]:8,[c.sessionReplay]:9,[c.logging]:10,[c.genericEvents]:11},d={[c.pageViewEvent]:a,[c.pageViewTiming]:n,[c.ajax]:n,[c.spa]:n,[c.softNav]:n,[c.metrics]:i,[c.jserrors]:i,[c.sessionTrace]:o,[c.sessionReplay]:o,[c.logging]:s,[c.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.286.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.286.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-xt9QypT23DNupLy9wXPzK6uGCHucLx9ieBiprVZwJD/HfkKcTY5t9xUrMvJ/ybOBfVDiFPL8R/YCJHdANxjV3g==\",249:\"sha512-KxJzV7dF4ry7RzxsxRBMJPnHjRdZUbseWowgGkDemMtubSveBZAlqlWb/489Lpd5K2u0Q2zTSBK599A9+u9jpA==\",212:\"sha512-ges3wTNuYgFINvgkoryTYKsHZWBqvLFD9qo1XJQWq5OYq+1DVXuGFs9cYogVoQEoCQxuaUdKAXcxF/sl3Ntbrg==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.286.0.PROD\"]=self[\"webpackChunk:NRBA-1.286.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(){this.agentIdentifier=(0,r.LA)(16)}#e(t,...r){if(this[t]!==n.prototype[t])return this[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}recordCustomEvent(e,t){return this.#e(\"recordCustomEvent\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(this[t]!==o.prototype[t]\u0026\u0026this[t]!==n.prototype[t])return this[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(8969);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),t.runtime.harvester.initializedAggregates.push(this.featAggregate),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),E=i(2843),A=i(3878),T=i(782),S=i(1863);class N extends b{static featureName=T.T;constructor(e,t=!0){super(e,T.T,t),p.RI\u0026\u0026((0,E.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,T.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,T.T,this.ee))),this.importAggregator(e))}}var O=i(8154);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),p.RI\u0026\u0026document.addEventListener(\"securitypolicyviolation\",(e=\u003e{(0,x.p)(O.xV,[\"Generic/CSPViolation/Detected\"],void 0,this.featureName,this.ee)})),this.importAggregator(e)}}var I=i(6774),P=i(3304);class j{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,P.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new j(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection: \";if(!e?.reason)return;if(H(e.reason)){try{e.reason.message.startsWith(t)||(e.reason.message=t+e.reason.message)}catch(e){}return C(e.reason)}const r=C(e.reason);return(r.message||\"\").startsWith(t)||(r.message=t+r.message),r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new j(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class M extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",((e,t)=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r,t],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var D=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,D.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,P.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(void 0===p.gm.XMLHttpRequest)return n;if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",J=Y+\"body-\",X=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,X.forEach((e=\u003e{r(Q[te],e,J),r(ee[te],e,J)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,P.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;const he=\"X-NewRelic-App-Data\";class pe extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};ge(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){E(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},ge(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),ge(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCaptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):E(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function E(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin\u0026\u0026r.getAllResponseHeaders().indexOf(he)\u003e=0){var i=r.getResponseHeader(he);i\u0026\u0026((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function ge(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const me={},ve=[\"pushState\",\"replaceState\"];function be(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||me[t.debugId]++||(me[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,ve,\"-\")),t}var ye=i(3738);const{He:we,bD:Re,d3:xe,Kp:Ee,TZ:Ae,Lc:Te,uP:Se,Rz:Ne}=ye;class Oe extends b{static featureName=Ae;constructor(e,t=!0){super(e,Ae,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;be(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Se,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Te,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Ne+xe,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Ne+Ee,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(we,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:Re,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var _e=i(2614);class Ie extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(_e.H3,\"_\").concat(_e.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===_e.g.FULL||e.sessionReplayMode===_e.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee,agentRef:this.#o}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==_e.g.FULL\u0026\u0026this.featAggregate.initializeRecording(_e.g.FULL,!0):(this.#i=_e.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==_e.g.FULL\u0026\u0026(this.recorder.parent.mode=_e.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Pe=i(3962);class je extends b{static featureName=Pe.TZ;constructor(e,t=!0){if(super(e,Pe.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=be(this.ee);Pe.tC.forEach((e=\u003e{(0,A.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Ce=i(7378);const ke={},Le=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function He(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||ke[t.debugId])return t;ke[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,Le,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const Me={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(Me[t.debugId])return t;Me[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const Ke={},Ue=\"setTimeout\",Ve=\"setInterval\",Ge=\"clearTimeout\",Fe=\"-start\",Be=[Ue,\"setImmediate\",Ve,Ge,\"clearImmediate\"];function We(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Ke[t.debugId]++)return t;Ke[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Be.slice(0,2),Ue+\"-\"),r.inPlace(p.gm,Be.slice(2,3),Ve+\"-\"),r.inPlace(p.gm,Be.slice(3),Ge+\"-\"),t.on(Ve+Fe,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ue+Fe,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const ze={};function qe(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||ze[t.debugId])return t;ze[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:Ze,d3:Ye,Kp:Je,$p:Xe,wW:$e,e5:Qe,tH:et,uP:tt,rw:rt,Lc:nt}=Ce;class it extends b{static featureName=Ze;constructor(e,t=!0){if(super(e,Ze,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=He(this.ee),a=De(this.ee),s=We(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=be(this.ee),f=qe(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[tt]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[tt],this[nt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(tt,g),a.on(rt,g),o.on(rt,g),this.ee.on(nt,m),a.on($e,m),o.on($e,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([tt,nt,\"xhr-resolved\"],this.featureName),u.buffer([tt],this.featureName),s.buffer([\"setTimeout\"+Je,\"clearTimeout\"+Ye,tt],this.featureName),c.buffer([tt,\"new-xhr\",\"send-xhr\"+Ye],this.featureName),d.buffer([et+Ye,et+\"-done\",et+Xe+Ye,et+Xe+Je],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([tt],this.featureName),a.buffer([\"propagate\",rt,$e,\"executor-err\",\"resolve\"+Ye],this.featureName),i.buffer([tt,\"no-\"+tt],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,et+Ye),v(d,et+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var ot=i(3333);class at extends b{static featureName=ot.TZ;constructor(e,t=!0){super(e,ot.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled,e.init.performance.resources.enabled];if(p.RI\u0026\u0026(e.init.user_actions.enabled\u0026\u0026(ot.Zp.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),ot.qN.forEach((e=\u003e{const t=(0,v.s)((e=\u003e{(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)}),500,{leading:!0});(0,A.sp)(e,t)}))),e.init.performance.resources.enabled\u0026\u0026p.gm.PerformanceObserver?.supportedEntryTypes.includes(\"resource\"))){new PerformanceObserver((e=\u003e{e.getEntries().forEach((e=\u003e{(0,x.p)(\"browserPerformance.resource\",[e],void 0,this.featureName,this.ee)}))})).observe({type:\"resource\",buffered:!0})}r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var st=i(993),ct=i(3785),ut=i(9414);class dt extends b{static featureName=st.TZ;constructor(e,t=!0){super(e,st.TZ,t);const r=this.ee;(0,ut.J)(r,p.gm.console,\"log\",{level:\"info\"}),(0,ut.J)(r,p.gm.console,\"error\",{level:\"error\"}),(0,ut.J)(r,p.gm.console,\"warn\",{level:\"warn\"}),(0,ut.J)(r,p.gm.console,\"info\",{level:\"info\"}),(0,ut.J)(r,p.gm.console,\"debug\",{level:\"debug\"}),(0,ut.J)(r,p.gm.console,\"trace\",{level:\"trace\"}),this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,ct.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t){super(),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}get api(){return this}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[pe,w,N,Oe,Ie,_,M,at,dt,je,it],loaderType:\"spa\"})})()})();"])</script><script>self.__next_f.push([1,"4:[\"$\",\"html\",null,{\"lang\":\"en\",\"suppressHydrationWarning\":true,\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"link\",null,{\"rel\":\"preconnect\",\"href\":\"https://cdn.segment.com\"}],[\"$\",\"link\",null,{\"rel\":\"preconnect\",\"href\":\"https://prospect-form-plugin.2u.com\"}],[\"$\",\"$L13\",null,{\"type\":\"text/javascript\",\"src\":\"https://beam.edx.org/consent/fa169e97-be64-4cc1-bad3-9534590f9a30/OtAutoBlock.js\"}],[\"$\",\"$L13\",null,{\"src\":\"https://beam.edx.org/scripttemplates/otSDKStub.js\",\"type\":\"text/javascript\",\"data-domain-script\":\"fa169e97-be64-4cc1-bad3-9534590f9a30\"}],[\"$\",\"$L13\",null,{\"id\":\"ot-loader\",\"type\":\"text/javascript\",\"dangerouslySetInnerHTML\":{\"__html\":\"$14\"},\"strategy\":\"afterInteractive\"}],[\"$\",\"$L13\",null,{\"id\":\"script-segment\",\"dangerouslySetInnerHTML\":{\"__html\":\"$15\"},\"strategy\":\"beforeInteractive\"}],\"$L16\",[\"$\",\"$L13\",null,{\"id\":\"script-gtm\",\"dangerouslySetInnerHTML\":{\"__html\":\"(function (w, d, s, l, i) {\\n w[l] = w[l] || [];\\n w[l].push({ \\\"gtm.start\\\": new Date().getTime(), event: \\\"gtm.js\\\" });\\n var f = d.getElementsByTagName(s)[0],\\n j = d.createElement(s),\\n dl = l != \\\"dataLayer\\\" ? \\\"\u0026l=\\\" + l : \\\"\\\";\\n j.async = true;\\n j.src = \\\"https://www.googletagmanager.com/gtm.js?id=\\\" + i + dl;\\n f.parentNode.insertBefore(j, f);\\n})(window, document, \\\"script\\\", \\\"dataLayer\\\", \\\"GTM-543ZGMK2\\\");\\n\"},\"strategy\":\"beforeInteractive\"}],[\"$\",\"$L17\",null,{\"pagetype\":\"other\"}]]}],[\"$\",\"body\",null,{\"className\":\"__className_d65c78\",\"children\":[[\"$\",\"noscript\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"\u003ciframe src=\\\"https://www.googletagmanager.com/ns.html?id=GTM-543ZGMK2\\\" height=\\\"0\\\" width=\\\"0\\\"\\n style=\\\"display:none;visibility:hidden\\\"\u003e\u003c/iframe\u003e\"}}],[\"$\",\"$L18\",null,{\"children\":[\"$\",\"$L19\",null,{}]}],[\"$\",\"$L1a\",null,{\"children\":[\"$\",\"$L1b\",null,{\"children\":\"$L1c\"}]}],[\"$\",\"$L13\",null,{\"id\":\"nr-browser-agent\",\"strategy\":\"beforeInteractive\",\"dangerouslySetInnerHTML\":{\"__html\":\"$1d\"}}]]}]]}]\n1e:T674,\n !function(co,h,e,s,i,o,n){var d='documentElement';var a='className';h[d][a]+=' preampjs fusejs';"])</script><script>self.__next_f.push([1,"\n n.k=e;co._Cohesion=n;co._Preamp={k:s,start:new Date};co._Fuse={k:i};co._Tagular={k:o};\n [e,s,i,o].map(function(x){co[x]=co[x]||function(){(co[x].q=co[x].q||[]).push([].slice.call(arguments))}});\n var b=function(){var u=h[d][a];h[d][a]=u.replace(/ ?preampjs| ?fusejs/g,'')};\n h.addEventListener('DOMContentLoaded',function(){co.setTimeout(b,3e3);\n co._Preamp.docReady=co._Fuse.docReady=!0});var z=h.createElement('script');\n z.async=1;z.src='https://www.edx.org/beam.js';\n z.onerror=function(){var ce='error',f='function';for(var o of co[e].q||[])o[0]===ce\u0026\u0026typeof o[1]==f\u0026\u0026o[1]();co[e]=function(n,cb){n===ce\u0026\u0026typeof cb==f\u0026\u0026cb()};b()};\n h.head.appendChild(z);}\n (window,document,'cohesion','preamp','fuse','tagular',{\"domainAllowlist\":[\"h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com\",\"www.h97m1sqokqgvsbw1eiqol1oc6.js.wpenginepowered.com\",\"edx.org\",\"www.edx.org\"],\"tagular\":{\"sourceKey\":\"src_2euJfAVNt6Z9kQz4e9t1SQBtm8x\",\"writeKey\":\"wk_2euJfDkJVTtEVzsC8BPOb0g9dVj\",\"apiHost\":\"https://www.edx.org/beam/v2/t\",\"multiparty\":true,\"useBeacon\":true,\"cookieDomain\":\"edx.org\"},\"monarch\":{\"sourceId\":\"bdac7c16-924e-4180-bb35-5b2dfff6d308\",\"endpoint\":\"https://www.edx.org/beam\",\"token\":\"b43382aa-9f76-406c-a628-bf96086f1c28\",\"autoRequest\":{\"enabled\":false,\"suppressPlacements\":true,\"timeout\":2000}},\"consent\":{\"onetrust\":{\"enabled\":true,\"optIn\":true},\"required\":true,\"domain\":\".edx.org\"},\"fuse\":{\"enabled\":false},\"cookieDomain\":\"edx.org\"});\n 16:[[\"$\",\"style\",null,{\"children\":\".preampjs [data-preamp], .fusejs [data-fuse] { opacity: 0 !important}\"}],[\"$\",\"script\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"$1e\"}}]]\n1c:[\"$\",\"$L1f\",null,{\"locale\":\"en\",\"now\":\"$D2025-04-08T02:23:09.214Z\",\"timeZone\":\"UTC\",\"messages\":{\"Upgrade\":{\"title\":\"Update to access this page\",\"description\":\"For the best experience it is recommended that you update to the latest version of this app now. Please update now to access the full experience.\",\"ctaHeader\":\"Choose an"])</script><script>self.__next_f.push([1," option:\"},\"LocaleSwitcher\":{\"label\":\"Change language\",\"en\":\"English\",\"es\":\"Spanish\"}},\"children\":[\"$\",\"$L2\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$20\",\"errorStyles\":[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8848c94dc66fe2aa.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],\"errorScripts\":[],\"template\":[\"$\",\"$L3\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[\"$L21\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8848c94dc66fe2aa.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]]],\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]}]\ne:[[\"$\",\"meta\",\"0\",{\"charSet\":\"utf-8\"}],[\"$\",\"meta\",\"1\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1\"}]]\n9:null\n"])</script><script>self.__next_f.push([1,"22:I[89904,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n23:I[2545,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunk"])</script><script>self.__next_f.push([1,"s/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n24:I[6874,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"\"]\n26:I[33063,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js"])</script><script>self.__next_f.push([1,"\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"Image\"]\n27:I[79182,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"21:[[\"$\",\"$L22\",null,{\"searchParams\":\"$undefined\",\"postId\":\"$undefined\",\"cmsUrl\":\"https://cms.edx.org\"}],[\"$\",\"$L23\",null,{\"course\":\"$undefined\",\"navigation\":{\"header\":{\"logo\":{\"url\":\"/trademark-logos/edx-logo-elm.svg\",\"altText\":\"edX Online\",\"title\":\"edX Online\"},\"search\":{\"placeholder\":\"What do you want to learn?\"},\"navButton\":{\"label\":\"Learn\"},\"cta\":{\"signIn\":{\"label\":\"Sign In\",\"url\":\"https://authn.edx.org/login\"},\"register\":{\"label\":\"Register for free\",\"url\":\"https://authn.edx.org/register\"},\"business\":{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org\"}}},\"sections\":[{\"title\":\"By goal\",\"items\":[{\"label\":\"Take a course\",\"hero\":{\"title\":\"Courses\",\"cta\":{\"viewAll\":{\"label\":\"View all courses\",\"url\":\"/search?tab=course\u0026page=1\"},\"learnMore\":{\"label\":\"View all courses with certificates\",\"url\":\"/courses?q=online+courses\"}},\"ctaPosition\":\"left\"},\"productSummaries\":[{\"title\":\"Browse by topic\",\"links\":[{\"url\":\"/courses?q=ai+courses+for+beginners\",\"label\":\"AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=cybersecurity+courses+for+beginners\",\"label\":\"Cybersecurity courses\",\"isExternal\":false},{\"url\":\"/courses?q=data+science+courses\",\"label\":\"Data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=data+analytics+courses+for+beginners\",\"label\":\"Analytics courses\",\"isExternal\":false},{\"url\":\"/courses?q=excel+courses+for+beginners\",\"label\":\"Excel courses\",\"isExternal\":false},{\"url\":\"/courses?q=computer+programming+courses+for+beginners\",\"label\":\"Programming courses\",\"isExternal\":false},{\"url\":\"/courses?q=sql+courses\",\"label\":\"SQL courses\",\"isExternal\":false},{\"url\":\"/courses?q=finance+courses+for+beginners\",\"label\":\"Finance courses\",\"isExternal\":false},{\"url\":\"/courses?q=digital+marketing+courses\",\"label\":\"Digital marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=computer+science+courses\",\"label\":\"Computer science courses\",\"isExternal\":false},{\"url\":\"/courses?q=coding+courses+for+beginners\",\"label\":\"Coding courses\",\"isExternal\":false},{\"url\":\"/courses?q=leadership+courses\",\"label\":\"Leadership courses\",\"isExternal\":false},{\"url\":\"/courses?q=accounting+courses+for+beginners\",\"label\":\"Accounting courses\",\"isExternal\":false},{\"url\":\"/courses?q=google+python+course\",\"label\":\"Google courses\",\"isExternal\":false}]},{\"title\":\"Browse by skill\",\"links\":[{\"url\":\"/courses?q=ai+in+healthcare+course\",\"label\":\"AI in healthcare courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+data+science+course\",\"label\":\"Python data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+for+business+course\",\"label\":\"AI for business courses\",\"isExternal\":false},{\"url\":\"/courses?q=hr+analytics+course\",\"label\":\"HR analytics courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+machine+learning+course\",\"label\":\"Python machine learning courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+marketing+course\",\"label\":\"AI marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=business+marketing+course\",\"label\":\"Business marketing courses\",\"isExternal\":false},{\"url\":\"/courses?q=ai+and+machine+learning+courses\",\"label\":\"AI and machine learning courses\",\"isExternal\":false},{\"url\":\"/courses?q=business+management+course\",\"label\":\"Business management courses\",\"isExternal\":false},{\"url\":\"/courses?q=html+css+course\",\"label\":\"HTML css courses\",\"isExternal\":false}]},{\"title\":\"Browse by difficulty\",\"links\":[{\"url\":\"/courses?q=excel+courses+for+beginners\",\"label\":\"Excel courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=excel+advanced+courses\",\"label\":\"Advanced Excel courses\",\"isExternal\":false},{\"url\":\"/courses?q=python+course+for+beginners\",\"label\":\"Python courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=accounting+courses+for+beginners\",\"label\":\"Accounting courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=ai+courses+for+beginners\",\"label\":\"AI courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=data+analytics+courses+for+beginners\",\"label\":\"Data analytics courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=cybersecurity+courses+for+beginners\",\"label\":\"Cybersecurity courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=hr+courses+for+beginners\",\"label\":\"HR courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=finance+courses+for+beginners\",\"label\":\"Finance courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=coding+courses+for+beginners\",\"label\":\"Coding courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=it+courses+for+beginners\",\"label\":\"IT courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=bookkeeping+courses+for+beginners\",\"label\":\"Bookkeeping courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=computer+programming+courses+for+beginners\",\"label\":\"Computer programming courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=project+management+courses+for+beginners\",\"label\":\"Project management courses for beginners\",\"isExternal\":false},{\"url\":\"/courses?q=trading+courses+for+beginners\",\"label\":\"Trading courses for beginners\",\"isExternal\":false}]},{\"title\":\"Browse by partner\",\"links\":[{\"url\":\"/courses?q=google+ai+course\",\"label\":\"Google AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=mit+ai+course\",\"label\":\"MIT AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=harvard+ai+course\",\"label\":\"Harvard AI courses\",\"isExternal\":false},{\"url\":\"/courses?q=ibm+data+science+course\",\"label\":\"IBM data science courses\",\"isExternal\":false},{\"url\":\"/courses?q=google+python+course\",\"label\":\"Google python courses\",\"isExternal\":false}]}]},{\"label\":\"Earn a certificate\",\"hero\":{\"title\":\"Certificates\",\"subTitle\":\"Self-paced, instructor-led courses and programs that build career-ready skills and elevate your resume.\",\"cta\":{\"viewAll\":{\"label\":\"View all certificates\",\"url\":\"/search?tab=professional-certificate\u0026page=1\"},\"learnMore\":{\"label\":\"Learn more about certificates\",\"url\":\"/certificates\"}},\"ctaPosition\":\"left\"},\"productSummaries\":[{\"title\":\"Professional Certificates\",\"description\":\"A select series of courses in high-demand fields to build your professional skill set.\",\"features\":[\"Instructor-led or self paced\",\"8-16 weeks\"],\"links\":[{\"label\":\"Browse all Professional Certificates\",\"url\":\"/search?tab=professional-certificate\",\"isExternal\":false},{\"label\":\"Browse all XSeries certificates\",\"url\":\"/search?tab=xseries\",\"isExternal\":false}]},{\"title\":\"Executive Education\",\"description\":\"Cohort-based certificate programs in career-critical skills. Aimed at building your professional development to advance or change your career.\",\"features\":[\"Instructor-led\",\"2-12 weeks\"],\"links\":[{\"label\":\"Browse all Executive Education\",\"url\":\"/search?tab=executive-education\",\"isExternal\":false}]}],\"productLists\":[{\"title\":\"Trending certificates\",\"products\":[{\"id\":\"7461d083-bf2e-55bb-af0a-79b2e389a2b8\",\"title\":\"Oxford Executive Leadership Programme\",\"url\":\"/executive-education/university-of-oxford-executive-leadership-programme\",\"owner\":{\"key\":\"OxfordX\",\"name\":\"University of Oxford\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\"}}},{\"id\":\"2933d0bd-43ed-52f0-95f6-12241e257a62\",\"title\":\"Nutrition Science\",\"url\":\"/executive-education/stanford-university-nutrition-science\",\"owner\":{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}}},{\"id\":\"60387e50-0bb8-58cb-be7c-28aff4fd201d\",\"title\":\"Sustainable Finance\",\"url\":\"/executive-education/university-of-cambridge-sustainable-finance\",\"owner\":{\"key\":\"UniversityofCambridge\",\"name\":\"University of Cambridge\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7e2febc-e366-4b23-9fc3-5659cf53d452-7e24533c111d.png\"}}},{\"id\":\"87ef0a37-88f5-4843-888c-166fc9d1644a\",\"title\":\"Agile Project Management\",\"url\":\"/certificates/professional-certificate/umd-usmx-agile-project-management\",\"owner\":{\"key\":\"USMx\",\"name\":\"University System of Maryland\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\"}}},{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"e78d61bc-aa9d-417f-b244-fed28f5737b6\",\"title\":\"Data Analyst\",\"url\":\"/certificates/professional-certificate/ibm-data-analyst\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"b9629ec9-af4e-4ea3-9a14-268209a06a76\",\"title\":\"Introduction to Kubernetes and Cloud Native Technologies\",\"url\":\"/certificates/professional-certificate/linuxfoundationx-introduction-to-kubernetes-and-cloud-native-technologies\",\"owner\":{\"key\":\"LinuxFoundationX\",\"name\":\"The Linux Foundation\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\"}}}]}],\"linkList\":{\"title\":\"Popular topics\",\"links\":[{\"label\":\"Data Science Certificates\",\"url\":\"/certificates/data-science-certificate\",\"isExternal\":false},{\"label\":\"Business Certificates\",\"url\":\"/certificates/business-certificate \",\"isExternal\":false},{\"label\":\"Data Analytics Certificates\",\"url\":\"/certificates/data-analytics-certificate\",\"isExternal\":false},{\"label\":\"Artificial Intelligence (AI) Certificates\",\"url\":\"/certificates/ai-certificates\",\"isExternal\":null},{\"label\":\"Machine Learning Certificates\",\"url\":\"/certificates/machine-learning-certificates\",\"isExternal\":false},{\"label\":\"Python Certificates\",\"url\":\"/certificates/python-certificate\",\"isExternal\":false},{\"label\":\"Project Management Certificates\",\"url\":\"/certificates/project-management-certificate\",\"isExternal\":false},{\"label\":\"Digital Marketing Certificates\",\"url\":\"/certificates/digital-marketing-certificates\",\"isExternal\":false},{\"label\":\"IT Certificates\",\"url\":\"/certificates/it-certificates\",\"isExternal\":false},{\"label\":\"Sustainability Executive Education Programs\",\"url\":\"/executive-education/sustainability\",\"isExternal\":false},{\"label\":\"Data Science Executive Education Programs\",\"url\":\"/executive-education/data-science\",\"isExternal\":false},{\"label\":\"Management Executive Education Programs\",\"url\":\"/executive-education/management\",\"isExternal\":false},{\"label\":\"Data Analytics Executive Education Programs\",\"url\":\"/executive-education/data-analytics\",\"isExternal\":false},{\"label\":\"Product Management Executive Education Programs\",\"url\":\"/executive-education/product-management\",\"isExternal\":false},{\"label\":\"Economics Executive Education Programs\",\"url\":\"/executive-education/economics\",\"isExternal\":false},{\"label\":\"Strategy Executive Education Programs\",\"url\":\"/executive-education/strategy\",\"isExternal\":false},{\"label\":\"Finance Executive Education Programs\",\"url\":\"/executive-education/finance\",\"isExternal\":false},{\"label\":\"Leadership Executive Education Programs\",\"url\":\"/executive-education/leadership\",\"isExternal\":false},{\"label\":\"FinTech Executive Education Programs\",\"url\":\"/executive-education/fintech\",\"isExternal\":false},{\"label\":\"Real Estate Executive Education Programs\",\"url\":\"/executive-education/real-estate\",\"isExternal\":false},{\"label\":\"Blockchain Executive Education Programs\",\"url\":\"/executive-education/blockchain\",\"isExternal\":false},{\"label\":\"Healthcare Executive Education Programs\",\"url\":\"/executive-education/healthcare\",\"isExternal\":false},{\"label\":\"Artificial Intelligence (AI) Executive Education Programs\",\"url\":\"/executive-education/artificial-intelligence\",\"isExternal\":false},{\"label\":\"Marketing Executive Education Programs\",\"url\":\"/executive-education/marketing\",\"isExternal\":false},{\"label\":\"Project Management Executive Education Programs\",\"url\":\"/executive-education/project-management\",\"isExternal\":false},{\"label\":\"Digital Marketing Executive Education Programs\",\"url\":\"/executive-education/digital-marketing\",\"isExternal\":false},{\"label\":\"Operations Management Executive Education Programs\",\"url\":\"/executive-education/operations-management\",\"isExternal\":false},{\"label\":\"Design Executive Education Programs\",\"url\":\"/executive-education/design\",\"isExternal\":false},{\"label\":\"Supply Chain Executive Education Programs\",\"url\":\"/executive-education/supply-chain\",\"isExternal\":false},{\"label\":\"Information Technology Executive Education Programs\",\"url\":\"/executive-education/information-technology\",\"isExternal\":false},{\"label\":\"Cybersecurity Executive Education Programs\",\"url\":\"/executive-education/cybersecurity\",\"isExternal\":false},{\"label\":\"Innovation Executive Education Programs\",\"url\":\"/executive-education/innovation\",\"isExternal\":false},{\"label\":\"Negotiation Executive Education Programs\",\"url\":\"/executive-education/negotiation\",\"isExternal\":false},{\"label\":\"Entrepreneurship Executive Education Programs\",\"url\":\"/executive-education/entrepreneurship\",\"isExternal\":false},{\"label\":\"Law Executive Education Programs\",\"url\":\"/executive-education/law\",\"isExternal\":false},{\"label\":\"Programas de Educación Ejecutiva en Transformación Digital\",\"url\":\"/executive-education/digital-transformation\",\"isExternal\":false},{\"label\":\"Human Resources Executive Education Programs\",\"url\":\"/executive-education/human-resources\",\"isExternal\":false},{\"label\":\"Talent Management Executive Education Programs\",\"url\":\"/executive-education/talent-management\",\"isExternal\":false},{\"label\":\"Sales Executive Education Programs\",\"url\":\"/executive-education/sales\",\"isExternal\":false},{\"label\":\"Accounting Executive Education Programs\",\"url\":\"/executive-education/accounting\",\"isExternal\":false},{\"label\":\"Change Management Executive Education Programs\",\"url\":\"/executive-education/change-management\",\"isExternal\":false},{\"label\":\"Risk Management Executive Education Programs\",\"url\":\"/executive-education/risk-management\",\"isExternal\":false},{\"label\":\"International Relations Executive Education Programs\",\"url\":\"/executive-education/international-relations\",\"isExternal\":false},{\"label\":\"Women's Executive Leadership Programs\",\"url\":\"/executive-education/womens-executive-leadership-program\",\"isExternal\":false}]}},{\"label\":\"Earn a degree\",\"hero\":{\"title\":\"Degrees\",\"subTitle\":\"Degree programs from top institutions around the world to enable your career transformation and advancement.\",\"cta\":{\"viewAll\":{\"label\":\"View all Degrees\",\"url\":\"/search?tab=degree-program\u0026page=1\"}},\"ctaPosition\":\"right\"},\"productSummaries\":[{\"title\":\"Master's \u0026 Doctoral\",\"description\":\"Online degree programs from top institutions taught by expert faculty.\",\"features\":[\"Instructor-led, graduate level classes\",\"1-3 years\"],\"links\":[{\"label\":\"Browse all Master's Degrees\",\"url\":\"/masters\"},{\"label\":\"Browse all Doctorate degrees\",\"url\":\"/doctorate\"}]},{\"title\":\"Bachelor's\",\"description\":\"Online undergraduate degree programs from top institutions taught by expert faculty.\",\"features\":[\"Instructor-led, online classes\",\"2-6 years\"],\"links\":[{\"label\":\"Browse all Bachelor's degrees\",\"url\":\"/bachelors\"}]},{\"title\":\"Paths to degrees\",\"description\":\"A series of graduate-level programs from top institutions, uniquely designed to advance your career by providing a deep level of learning in a specific discipline.\",\"features\":[\"Instructor-led, online classes\",\"2 - 6 months\"],\"links\":[{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"},{\"label\":\"Browse all MicroBachelors® pathways\",\"url\":\"/bachelors/microbachelors\"}]}],\"productLists\":[{\"title\":\"Trending degrees\",\"products\":[{\"id\":\"85f981c8-4e1b-4cc4-b3cc-cd2bd741b405\",\"title\":\"Master of Arts in Psychology\",\"url\":\"/masters/psychology/pepperdine-master-of-arts-in-psychology\",\"owner\":{\"key\":\"Pepperdine\",\"name\":\"Pepperdine University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/9028c889-8b76-4d81-a7ec-622c024550ef-820f45a8df63.png\"}}},{\"id\":\"273b170f-af05-4036-9f51-d865910959e2\",\"title\":\"Master of Social Work\",\"url\":\"/masters/online-msw-programs/denver-master-of-social-work\",\"owner\":{\"key\":\"UniversityofDenver\",\"name\":\"University of Denver\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed4b14c6-ee2c-4a78-a97b-e73bad0485af-27577f044447.png\"}}},{\"id\":\"c106927f-09cc-4b9a-9f8c-c757db45d92a\",\"title\":\"Bachelor of Science in Economics and Management\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-economics-and-management\",\"owner\":{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}}},{\"id\":\"4a8c1f85-f7bb-4ba9-b102-b5864c921fa1\",\"title\":\"Master of Public Health\",\"url\":\"/masters/masters-in-public-health-online/unc-master-of-public-health\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}},{\"id\":\"a50e509c-44ae-4e85-9e12-85af6052c613\",\"title\":\"Doctor of Education in Leadership and Learning in Organizations\",\"url\":\"/doctorate/online-edd-programs/vanderbilt-doctor-of-education-in-leadership-and-learning-in-organizations\",\"owner\":{\"key\":\"Vanderbilt\",\"name\":\"Vanderbilt University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de684a48-2ebc-4596-b466-98ea2cc948b4-864155e2641e.png\"}}},{\"id\":\"35ec5b30-d213-4778-ab2a-ae2783c86502\",\"title\":\"Master of Science Strategic Marketing\",\"url\":\"/masters/surrey-master-of-science-strategic-marketing\",\"owner\":{\"key\":\"UOS\",\"name\":\"University of Surrey\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/fab95b1f-000b-45fe-97a9-89b449974728-7da9db5b85f8.png\"}}}]}],\"linkList\":{\"title\":\"Trending Topics\",\"links\":[{\"label\":\"Master's in Business Administration (MBA)\",\"url\":\"/masters/online-mba\"},{\"label\":\"Master's in Social Work (MSW)\",\"url\":\"/masters/online-msw-programs\"},{\"label\":\"Master's in Psychology\",\"url\":\"/masters/psychology\"},{\"label\":\"Master's in Clinical Psychology\",\"url\":\"/masters/psychology/online-masters-in-clinical-psychology\"},{\"label\":\"Master's in Marriage and Family Therapy (MFT)\",\"url\":\"/masters/psychology/online-mft-programs\"},{\"label\":\"Master's in Applied Behavior Analysis (ABA)\",\"url\":\"/masters/psychology/online-aba-programs\"},{\"label\":\"Master's in Licensed Professional Counseling (LPC)\",\"url\":\"/masters/psychology/online-lpc-programs\"},{\"label\":\"Master of Data Science (MDS)\",\"url\":\"/masters/online-masters-in-data-science\"},{\"label\":\"Master's in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"},{\"label\":\"Master's in Architecture (M.Arch)\",\"url\":\"/masters/online-masters-in-architecture\"},{\"label\":\"Master's in Speech Language Pathology (SLP)\",\"url\":\"/masters/online-slp-programs\"},{\"label\":\"Master's in Public Health (MPH)\",\"url\":\"/masters/masters-in-public-health-online\"},{\"label\":\"Master's in Education\",\"url\":\"/masters/masters-in-education-online\"},{\"label\":\"Master's in Educational Leadership\",\"url\":\"/masters/masters-in-education-online/online-masters-in-educational-leadership\"},{\"label\":\"Master's in Teaching (MAT)\",\"url\":\"/masters/online-mat-programs\"},{\"label\":\"Master's in Nursing (MSN)\",\"url\":\"/masters/online-msn-programs\"},{\"label\":\"Family Nurse Practitioner (FNP)\",\"url\":\"/masters/online-msn-programs/online-fnp-programs\"},{\"label\":\"Psychiatric Mental Health Nurse Practitioner (PMHNP)\",\"url\":\"/masters/online-msn-programs/online-pmhnp-programs\"},{\"label\":\"Acute Care Nurse Practitioner (ACNP)\",\"url\":\"/masters/online-msn-programs/online-acute-care-nurse-practitioner-programs\"},{\"label\":\"Master of Laws (LLM)\",\"url\":\"/masters/online-llm-programs\"},{\"label\":\"Master of Legal Studies\",\"url\":\"/masters/online-master-of-legal-studies\"},{\"label\":\"Master's in Counseling\",\"url\":\"/masters/counseling\"},{\"label\":\"Master's in School Counseling\",\"url\":\"/masters/counseling/online-masters-in-school-counseling\"},{\"label\":\"Master's in Mental Health Counseling\",\"url\":\"/masters/counseling/online-masters-in-mental-health-counseling\"},{\"label\":\"Master's in Counseling \u0026 Psychology\",\"url\":\"/masters/counseling-psychology\"},{\"label\":\"Master of Engineering (MEng)\",\"url\":\"/masters/online-masters-in-engineering\"},{\"label\":\"Master's in Computer Engineering\",\"url\":\"/masters/online-masters-in-engineering/online-computer-engineering-masters\"},{\"label\":\"Master's in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity\"},{\"label\":\"Master's in Information Technology (IT)\",\"url\":\"/masters/online-masters-in-information-technology\"},{\"label\":\"Master's in Information Systems\",\"url\":\"/masters/masters-in-information-systems-online\"},{\"label\":\"Master's in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science\"},{\"label\":\"Master of Library and Information Science (MLIS)\",\"url\":\"/masters/online-mlis-programs\"},{\"label\":\"Master's in International Relations\",\"url\":\"/masters/online-masters-in-international-relations\"},{\"label\":\"Master's in Communication\",\"url\":\"/masters/online-masters-in-communication\"},{\"label\":\"Master's in Design\",\"url\":\"/masters/online-masters-in-design\"},{\"label\":\"Master's in Health Administration (MHA)\",\"url\":\"/masters/online-mha\"},{\"label\":\"Master's in Business\",\"url\":\"/masters/online-masters-in-business\"},{\"label\":\"Master of Accounting\",\"url\":\"/masters/online-masters-in-accounting\"},{\"label\":\"Master's in Entrepreneurship\",\"url\":\"/masters/masters-in-entrepreneurship-online\"},{\"label\":\"Master's in Leadership\",\"url\":\"/masters/masters-in-leadership-online\"},{\"label\":\"Master's in Human Resources\",\"url\":\"/masters/online-masters-in-human-resources\"},{\"label\":\"Master's in Supply Chain Management\",\"url\":\"/masters/online-masters-in-supply-chain-management\"},{\"label\":\"Master's in Public Administration (MPA)\",\"url\":\"/masters/masters-in-public-administration-online\"},{\"label\":\"Master's in Analytics\",\"url\":\"/masters/online-masters-in-analytics\"},{\"label\":\"Maestría en Analítica de Negocios\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-business-analytics\"},{\"label\":\"Master's in Data Analytics\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-data-analytics\"},{\"label\":\"Master's in Project Management (MPM)\",\"url\":\"/masters/masters-in-project-management-online\"},{\"label\":\"Maestría en Cuidado de la Salud\",\"url\":\"/masters/healthcare\"},{\"label\":\"Master's in Nutrition\",\"url\":\"/masters/online-masters-in-nutrition\"},{\"label\":\"Licenciatura en Trabajo Social (BSW)\",\"url\":\"/bachelors/social-work-bsw\"},{\"label\":\"Bachelor of Psychology\",\"url\":\"/bachelors/psychology\"},{\"label\":\"Bachelor of Computer Science in Data Science\",\"url\":\"/bachelors/computer-data-sciences\"},{\"label\":\"Bachelor of Public Health\",\"url\":\"/bachelors/bachelors-in-public-health-online\"},{\"label\":\"Bachelor of Accounting\",\"url\":\"/bachelors/online-accounting-bachelor-degree\"},{\"label\":\"Bachelor of Finance\",\"url\":\"/bachelors/online-bachelors-degree-finance\"},{\"label\":\"Bachelor of Health and Social Service\",\"url\":\"/bachelors/health-social-services\"},{\"label\":\"Bachelor's in Business\",\"url\":\"/bachelors/business\"},{\"label\":\"Doctorate in Social Work (DSW)\",\"url\":\"/doctorate/social-work\"},{\"label\":\"Doctor of Public Health (DrPH)\",\"url\":\"/doctorate/online-drph-programs\"},{\"label\":\"Doctor of Education (EdD)\",\"url\":\"/doctorate/online-edd-programs\"},{\"label\":\"Doctor of Nursing Practice (DNP)\",\"url\":\"/doctorate/online-dnp-programs\"},{\"label\":\"Doctor of Physical Therapy (DPT)\",\"url\":\"/doctorate/online-dpt-programs\"},{\"label\":\"Doctor of Pharmacy (PharmD)\",\"url\":\"/doctorate/online-pharmd-programs\"}]}}]},{\"title\":\"By topic\",\"items\":[{\"label\":\"Artificial Intelligence\",\"hero\":{\"title\":\"Artificial Intelligence\",\"subTitle\":\"Artificial Intelligence (AI) is a unique field of study that combines computer science, robust datasets, and the ability of machines to simulate human intelligence to advance problem-solving techniques and tasks.\",\"cta\":{\"viewAll\":{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?tab=course\u0026skills.skill=Artificial+Intelligence\"},\"learnMore\":{\"label\":\"Learn more about Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"ChatGPT\",\"url\":\"/learn/chatgpt\"},{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"Computer Science\",\"url\":\"/learn/computer-science\"},{\"label\":\"Electronics\",\"url\":\"/learn/electronics\"},{\"label\":\"Automation\",\"url\":\"/learn/automation\"},{\"label\":\"Augmented Reality\",\"url\":\"/learn/augmented-reality\"},{\"label\":\"Internet of Things\",\"url\":\"/learn/iot-internet-of-things\"},{\"label\":\"Software Engineering\",\"url\":\"/learn/software-engineering\"},{\"label\":\"Data Mining\",\"url\":\"/learn/data-mining\"},{\"label\":\"Robotics\",\"url\":\"/learn/robotics\"},{\"label\":\"Deep Learning\",\"url\":\"/learn/deep-learning\"},{\"label\":\"Computer Engineering\",\"url\":\"/learn/computer-engineering\"},{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"},{\"label\":\"Natural Language Processing\",\"url\":\"/learn/natural-language-processing\"},{\"label\":\"Computer Programming\",\"url\":\"/learn/computer-programming\"},{\"label\":\"Computer Vision\",\"url\":\"/learn/computer-vision\"},{\"label\":\"Robotic Process Automation\",\"url\":\"/learn/robotic-process-automation\"},{\"label\":\"Computer Networking\",\"url\":\"/learn/computer-networking\"},{\"label\":\"Mathematical Modeling\",\"url\":\"/learn/mathematical-modeling\"},{\"label\":\"Autonomous Robotics\",\"url\":\"/learn/autonomous-robotics\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"1f905330-28e5-4407-a85e-1d5070c66ae4\",\"title\":\"Foundations of AI\",\"url\":\"/certificates/professional-certificate/ibm-foundations-of-ai\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"8c5c1af9-761b-49b4-9f52-f6f48856d906\",\"title\":\"Computer Science for Artificial Intelligence\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-artifical-intelligence\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"9f0781f8-33c8-41c1-84a7-6c161413070c\",\"title\":\"Fundamentals of Google AI for Web Based Machine Learning\",\"url\":\"/certificates/professional-certificate/google-fundamentals-of-google-ai-for-web-based-machine-learning\",\"owner\":{\"key\":\"Google\",\"name\":\"Google\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/29d2370f-9575-4f8e-b107-753b1abcc5f0-6a48c6833673.png\"}}}],\"cta\":{\"label\":\"View all Artificial Intelligence Certificates\",\"url\":\"/certificates/ai-certificates\"}},{\"title\":\"Executive Education\",\"products\":[{\"id\":\"32ab61e5-44b4-4316-ad59-9f04fc876e0a\",\"title\":\"Artificial Intelligence: Implications for Business Strategy\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-implications-for-business-strategy\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\"}}},{\"id\":\"ac0779b0-d342-42c4-99b3-d2c2ff93f980\",\"title\":\"Ethics of AI\",\"url\":\"/executive-education/the-london-school-of-economics-and-political-science-ethics-of-ai\",\"owner\":{\"key\":\"LSE\",\"name\":\"The London School of Economics and Political Science\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\"}}},{\"id\":\"ce3a934a-08ff-47da-823e-15f99cae32ef\",\"title\":\"Artificial Intelligence in Health Care\",\"url\":\"/executive-education/massachusetts-institute-of-technology-artificial-intelligence-in-health-care\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\"}}}],\"cta\":{\"label\":\"View all Executive Education in Artificial Intelligence\",\"url\":\"/search?tab=executive-education\u0026page=1\u0026skills.skill=Artificial+Intelligence\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"2d5b1959-d856-4a35-8aa4-c6cb67b233a9\",\"title\":\"Introduction to Generative AI\",\"url\":\"/learn/computer-science/ibm-introduction-to-generative-ai\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"3a31db71-de8f-45f1-ae65-11981ed9d680\",\"title\":\"CS50's Introduction to Artificial Intelligence with Python\",\"url\":\"/learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"e994d8a1-b78d-45f9-b91e-9a2ca6baa891\",\"title\":\"Generative AI Mastery: Revolutionizing Game Development\",\"url\":\"/learn/computer-science/hp-generative-ai-mastery-revolutionizing-game-development\",\"owner\":{\"key\":\"HP\",\"name\":\"HP\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\"}}},{\"id\":\"93a42838-e9c4-4c72-8943-af75e3c5fb89\",\"title\":\"Google AI for Anyone\",\"url\":\"/learn/artificial-intelligence/google-google-ai-for-anyone\",\"owner\":{\"key\":\"Google\",\"name\":\"Google\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/29d2370f-9575-4f8e-b107-753b1abcc5f0-6a48c6833673.png\"}}}],\"cta\":{\"label\":\"View all Artificial Intelligence courses\",\"url\":\"/search?q=artificial+intelligence\u0026tab=course\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"9a6bc27b-2d27-4064-801b-951960ba661d\",\"title\":\"Master of Science in Data Science\",\"url\":\"/masters/online-masters-in-data-science/smu-master-of-science-in-data-science\",\"owner\":{\"key\":\"SMU\",\"name\":\"Southern Methodist University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d5918c8-a5c0-4a5c-8e14-26cc753a132d-efd10ea9cd00.png\"}}},{\"id\":\"854a7267-22ae-4341-9f14-3e8f554395bb\",\"title\":\"Master of Science-Business in Data, Insights, and Analytics\",\"url\":\"/masters/online-masters-in-analytics/online-masters-in-data-analytics/university-of-wisconsin-madison-master-of-science-business-in-data-insights-and-analytics\",\"owner\":{\"key\":\"WisconsinX\",\"name\":\"The University of Wisconsin-Madison\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/496e8de4-f4c2-4395-bfa4-5e9daeb60f1d-f8f8e09793a2.png\"}}},{\"id\":\"5c002189-0866-4b10-807e-bcf093346dc0\",\"title\":\"Master of Information and Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity/ucb-master-of-information-and-cybersecurity\",\"owner\":{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}}}],\"cta\":{\"label\":\"View all Masters in Artificial Intelligence\",\"url\":\"/masters/online-masters-in-artificial-intelligence\"}}]},{\"label\":\"Data Science\",\"hero\":{\"title\":\"Data Science\",\"subTitle\":\"Data Science is an interdisciplinary field which utilizes scientific methods, algorithms, and data insights to extract meaning and drive informed decision-making across industries.\",\"cta\":{\"viewAll\":{\"label\":\"View all Data Science courses\",\"url\":\"/search?tab=course\u0026skills.skill=Data+Science\"}},\"ctaPosition\":\"right\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Power BI\",\"url\":\"/learn/power-bi\"},{\"label\":\"SQL\",\"url\":\"/learn/sql\"},{\"label\":\"Analytics\",\"url\":\"/learn/analytics\"},{\"label\":\"MySQL\",\"url\":\"/learn/mysql\"},{\"label\":\"Coding\",\"url\":\"/learn/coding\"},{\"label\":\"PostgreSQL\",\"url\":\"/learn/postgresql\"},{\"label\":\"Big Data\",\"url\":\"/learn/big-data\"},{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"},{\"label\":\"Syntax\",\"url\":\"/learn/syntax\"},{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"},{\"label\":\"TensorFlow\",\"url\":\"/learn/tensorflow\"},{\"label\":\"Probability\",\"url\":\"/learn/probability\"},{\"label\":\"Regression\",\"url\":\"/learn/regression\"},{\"label\":\"Inference\",\"url\":\"/learn/inference\"},{\"label\":\"PyTorch\",\"url\":\"/learn/pytorch\"},{\"label\":\"Grafana\",\"url\":\"/learn/grafana\"},{\"label\":\"Business Intelligence\",\"url\":\"/learn/business-intelligence\"},{\"label\":\"Data Warehouse\",\"url\":\"/learn/data-warehouse\"},{\"label\":\"Data Structures\",\"url\":\"/learn/data-structures\"},{\"label\":\"Data Visualization\",\"url\":\"/learn/data-visualization\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"3c32e3e0-b6fe-4ee4-bd4f-210c6339e074\",\"title\":\"Data Science\",\"url\":\"/certificates/professional-certificate/harvardx-data-science\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"b5598690-9bd8-4d21-b7f3-dc741b50473f\",\"title\":\"IBM Data Science\",\"url\":\"/certificates/professional-certificate/ibm-data-science\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"98ad6cea-24a1-4926-8fc0-13de8dc1c1d1\",\"title\":\"Statistics and Data Science (General Track)\",\"url\":\"/masters/micromasters/mitx-statistics-and-data-science-general-track\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\"}}}],\"cta\":{\"label\":\"View all Data Science certificates\",\"url\":\"/certificates/data-science-certificate\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"c2004e8e-3882-4927-a883-1c5f39a28865\",\"title\":\"Introduction to Data Science with Python\",\"url\":\"/learn/data-science/harvard-university-introduction-to-data-science-with-python\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"9bd10bfb-a8cd-4907-a26d-37fe3ea74919\",\"title\":\"Introduction to Data Science\",\"url\":\"/learn/data-science/ibm-introduction-to-data-science\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"5099587a-6c94-4e2f-872c-66cecbfa8446\",\"title\":\"Foundations of Data Analytics\",\"url\":\"/learn/data-analysis/the-hong-kong-university-of-science-and-technology-foundations-of-data-analytics\",\"owner\":{\"key\":\"HKUSTx\",\"name\":\"The Hong Kong University of Science and Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\"}}}],\"cta\":{\"label\":\"View all Data Science courses\",\"url\":\"/search?q=data+science\u0026tab=course\"}},{\"title\":\"Graduate Degrees\",\"products\":[{\"id\":\"5cf16e5f-8a08-40a6-bc9e-bf82684c5522\",\"title\":\"Master of Science in Applied Data Science\",\"url\":\"/masters/online-masters-in-data-science/syracuse-master-of-science-in-applied-data-science\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"58331700-1a02-4abe-a858-4ebe83200d15\",\"title\":\"Master of Information and Data Science\",\"url\":\"/masters/online-masters-in-data-science/ucb-master-of-information-and-data-science\",\"owner\":{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}}},{\"id\":\"70adbe06-2ef5-446e-97cf-7d26520a9697\",\"title\":\"Master of Applied Data Science\",\"url\":\"/masters/online-masters-in-data-science/unc-master-of-applied-data-science\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}}],\"cta\":{\"label\":\"View all Data Science degrees\",\"url\":\"/masters/online-masters-in-data-science\"}},{\"title\":\"Paths to Degrees\",\"products\":[{\"id\":\"482dee71-e4b9-4b42-a47b-3e16bb69e8f2\",\"title\":\"Data Science\",\"url\":\"/masters/micromasters/uc-san-diegox-data-science\",\"owner\":{\"key\":\"UCSanDiegoX\",\"name\":\"The University of California, San Diego\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/c7f335bb-f97c-4472-af09-65ae60197005-7d797d964ddb.png\"}}},{\"id\":\"4118b1fb-cfe5-457d-b78d-76c8141a2042\",\"title\":\"Healthcare Data Analytics Toolkit\",\"url\":\"/masters/micromasters/mgh-institute-healthcare-data-analytics-toolkit\",\"owner\":{\"key\":\"MGH_Institute\",\"name\":\"MGH Institute of Health Professions\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/fa3fe5e7-5100-40a1-b56b-c44b893d92a6-8dd6dff92a89.png\"}}},{\"id\":\"a2a6a8f9-7b61-49ce-9d62-7e959b776fb7\",\"title\":\"Analytics: Essential Tools and Methods\",\"url\":\"/masters/micromasters/gtx-analytics-essential-tools-and-methods\",\"owner\":{\"key\":\"GTx\",\"name\":\"The Georgia Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\"}}}],\"cta\":{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/micromasters\"}}]},{\"label\":\"Finance\",\"hero\":{\"title\":\"Finance\",\"subTitle\":\"Navigate the complex field of Finance, including money management, investments, and financial planning. Gain insights into market analysis and strategic decision-making, allowing for growth and profitability.\",\"cta\":{\"viewAll\":{\"label\":\"View all Finance courses\",\"url\":\"/search?skills.skill=Finance\"},\"learnMore\":{\"label\":\"Learn more about Finance\",\"url\":\"/learn/finance\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Bitcoin\",\"url\":\"/learn/bitcoin\"},{\"label\":\"Investing\",\"url\":\"/learn/investing\"},{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"},{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"},{\"label\":\"Trading\",\"url\":\"/learn/trading\"},{\"label\":\"Fintech\",\"url\":\"/learn/fintech\"},{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"},{\"label\":\"Banking\",\"url\":\"/learn/banking\"},{\"label\":\"Risk Management\",\"url\":\"/learn/risk-management\"},{\"label\":\"Venture Capital\",\"url\":\"/learn/venture-capital\"},{\"label\":\"Taxes\",\"url\":\"/learn/taxes\"},{\"label\":\"Investment Banking\",\"url\":\"/learn/investment-banking\"},{\"label\":\"Financial Management\",\"url\":\"/learn/financial-management\"},{\"label\":\"Cryptography\",\"url\":\"/learn/cryptography\"},{\"label\":\"Circular Economy\",\"url\":\"/learn/circular-economy\"},{\"label\":\"Macroeconomics\",\"url\":\"/learn/macroeconomics\"},{\"label\":\"Financial Accounting\",\"url\":\"/learn/financial-accounting\"},{\"label\":\"Financial Literacy\",\"url\":\"/learn/financial-literacy\"},{\"label\":\"Personal Finance\",\"url\":\"/learn/personal-finance\"},{\"label\":\"Corporate Finance\",\"url\":\"/learn/corporate-finance\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"1859f52c-3fc0-43fe-a8a1-13660c77e9c3\",\"title\":\"Corporate Finance\",\"url\":\"/certificates/professional-certificate/columbiax-corporate-finance\",\"owner\":{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}}},{\"id\":\"be5cc755-fa82-49f0-a7f5-512ca60cd7f0\",\"title\":\"Financial Decision-Making for Leaders\",\"url\":\"/certificates/professional-certificate/babsonx-financial-decision-making-for-leaders\",\"owner\":{\"key\":\"BabsonX\",\"name\":\"Babson College\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5e657c42-b466-4101-883a-7f2830ff3d54-1cc106481e49.png\"}}},{\"id\":\"20323088-3d02-40de-9418-cc9fc31b011a\",\"title\":\"Risk Management\",\"url\":\"/certificates/professional-certificate/nyif-risk-management\",\"owner\":{\"key\":\"NYIF\",\"name\":\"New York Institute of Finance\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/ecabc090-da26-4831-b96e-9c08f67f320e-ffcfe486232e.png\"}}}],\"cta\":{\"label\":\"View all Finance certificates\",\"url\":\"/search?q=finance\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"fff44379-c896-4b15-ab1d-b92f28acb789\",\"title\":\"Financial Analysis for Decision Making\",\"url\":\"/learn/financial-analysis/babson-college-financial-analysis-for-decision-making\",\"owner\":{\"key\":\"BabsonX\",\"name\":\"Babson College\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5e657c42-b466-4101-883a-7f2830ff3d54-1cc106481e49.png\"}}},{\"id\":\"9ed274f9-9db1-4e08-93a6-0fa07e684970\",\"title\":\"Introduction to Corporate Finance\",\"url\":\"/learn/corporate-finance/columbia-university-introduction-to-corporate-finance\",\"owner\":{\"key\":\"ColumbiaX\",\"name\":\"Columbia University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\"}}},{\"id\":\"9f624cf0-74f5-4293-bbb0-95a41e5543ac\",\"title\":\"Essential Career Skills for Investment Banking and Finance\",\"url\":\"/learn/investment-banking/new-york-institute-of-finance-essential-career-skills-for-investment-banking-and-finance\",\"owner\":{\"key\":\"NYIF\",\"name\":\"New York Institute of Finance\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/ecabc090-da26-4831-b96e-9c08f67f320e-ffcfe486232e.png\"}}}],\"cta\":{\"label\":\"View all Finance courses\",\"url\":\"/search?q=finance\u0026tab=course\"}},{\"title\":\"Graduate Degrees\",\"products\":[{\"id\":\"74f633a8-2eaa-4202-9e31-79f6868934b0\",\"title\":\"Master of Management\",\"url\":\"/masters/ucdavis-master-of-management\",\"owner\":{\"key\":\"UCDavis\",\"name\":\"University of California, Davis\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}}},{\"id\":\"3001f267-a52b-4513-9d5c-bce423e05eb6\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/rice-master-of-business-administration\",\"owner\":{\"key\":\"RICEx\",\"name\":\"Rice University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3e0f3544-6626-4373-afb9-b21e0e66a571-9317ec003c4d.png\"}}},{\"id\":\"97526f98-0ea6-4f43-8574-a58ca13031dd\",\"title\":\"Master of Science in Communications Management\",\"url\":\"/masters/online-masters-in-communication/syracuse-master-of-science-in-communications-management\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}}],\"cta\":{\"label\":\"View all Finance degrees\",\"url\":\"/search?learning_type=Masters\u0026learning_type=Doctorate\u0026learning_type=Certificate\u0026tab=degree-program\u0026page=1\u0026skills.skill=Finance\"}},{\"title\":\"Undergraduate Degrees\",\"products\":[{\"id\":\"159d1753-d974-4b5b-b657-516805797753\",\"title\":\"Bachelor of Science in Finance\",\"url\":\"/bachelors/universityoflondon-bachelor-of-science-in-finance\",\"owner\":{\"key\":\"UniversityofLondon\",\"name\":\"University of London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5427ee88-6dba-46ff-8ed8-87b71e3234da-0af1465ab67e.png\"}}},{\"id\":\"da3a0dc4-f697-48fd-bc7d-44c208608dd5\",\"title\":\"Bachelor of Science in Finance\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-finance\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}},{\"id\":\"b6223778-8769-407a-85e3-3f167d170d24\",\"title\":\"Bachelor of Science in Accounting\",\"url\":\"/bachelors/maryville-university-bachelor-of-science-in-accounting\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Finance degrees\",\"url\":\"/bachelors/online-bachelors-degree-finance\"}}]},{\"label\":\"Business Administration\",\"hero\":{\"title\":\"Business Administration\",\"subTitle\":\"Business Administration is the key to lead and manage operations, organize resources, and direct a team to achieve organizational goals with efficiency and effectiveness.\",\"cta\":{\"viewAll\":{\"label\":\"View all Business Administration Courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"},\"learnMore\":{\"label\":\"Learn more about Business Administration\",\"url\":\"/learn/business-administration\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Excel\",\"url\":\"/learn/excel\"},{\"label\":\"Marketing\",\"url\":\"/learn/marketing\"},{\"label\":\"Digital Marketing\",\"url\":\"/learn/digital-marketing\"},{\"label\":\"Entrepreneurship\",\"url\":\"/learn/entrepreneurship\"},{\"label\":\"Success\",\"url\":\"/learn/success\"},{\"label\":\"CEO\",\"url\":\"/learn/ceo\"},{\"label\":\"Management\",\"url\":\"/learn/management\"},{\"label\":\"Sales\",\"url\":\"/learn/sales\"},{\"label\":\"Accounting\",\"url\":\"/learn/accounting\"},{\"label\":\"Leadership\",\"url\":\"/learn/leadership\"},{\"label\":\"Innovation\",\"url\":\"/learn/innovation\"},{\"label\":\"Procurement\",\"url\":\"/learn/procurement\"},{\"label\":\"Scrum\",\"url\":\"/learn/scrum\"},{\"label\":\"Zapier\",\"url\":\"/learn/zapier\"},{\"label\":\"Ecommerce\",\"url\":\"/learn/ecommerce\"},{\"label\":\"Project Management\",\"url\":\"/learn/project-management\"},{\"label\":\"Agile\",\"url\":\"/learn/agile\"},{\"label\":\"ServiceNow\",\"url\":\"/learn/servicenow\"},{\"label\":\"Business Plan\",\"url\":\"/learn/business-plan\"},{\"label\":\"Retail\",\"url\":\"/learn/retail\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"e09b8c3f-520d-4e1b-a174-b2a8f5d70f1a\",\"title\":\"PreMBA Essentials for Professionals\",\"url\":\"/certificates/professional-certificate/imperialbusinessx-pre-mba-essentials-for-professionals\",\"owner\":{\"key\":\"ImperialX\",\"name\":\"Imperial College London\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b7b5c4b8-9908-4caa-8e02-453a2a960b0b-9cda9ffb8e95.png\"}}},{\"id\":\"2fc3236d-78a9-45a1-8c0c-fc290e74259e\",\"title\":\"Supply Chain Management\",\"url\":\"/masters/micromasters/mitx-supply-chain-management\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\"}}},{\"id\":\"59488f04-79a1-442d-9485-ca84562d6e12\",\"title\":\"Business Management\",\"url\":\"/masters/micromasters/iimbx-business-management\",\"owner\":{\"key\":\"IIMBx\",\"name\":\"Indian Institute of Management Bangalore\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/c2e6b3f5-9c1f-41f0-b692-f2173d05a256-7729f0b9d72b.png\"}}}],\"cta\":{\"label\":\"View all Business Administration certificates\",\"url\":\"/certificates/business-certificate\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"a00ec61d-e2db-45c8-92c9-4727056c2f4a\",\"title\":\"The Foundations of Happiness at Work\",\"url\":\"/learn/happiness/university-of-california-berkeley-the-foundations-of-happiness-at-work\",\"owner\":{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}}},{\"id\":\"002fcc00-5258-4760-ae83-8e8f1280e3bd\",\"title\":\"Entrepreneurial Operations: Launching a Startup\",\"url\":\"/learn/entrepreneurship/babson-college-entrepreneurial-operations-launching-a-startup\",\"owner\":{\"key\":\"BabsonX\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/5e657c42-b466-4101-883a-7f2830ff3d54-1cc106481e49.png\"}}},{\"id\":\"032359a2-9c75-467b-941e-0a0e56735627\",\"title\":\"Sport Business Foundations\",\"url\":\"/learn/sports-business/university-of-alaska-fairbanks-sport-business-foundations\",\"owner\":{\"key\":\"AlaskaX\",\"name\":\"University of Alaska Fairbanks\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\"}}}],\"cta\":{\"label\":\"View all Business Administration courses\",\"url\":\"/search?tab=course\u0026subject=Business+%26+Management\"}},{\"title\":\"Graduate Degrees\",\"products\":[{\"id\":\"74f633a8-2eaa-4202-9e31-79f6868934b0\",\"title\":\"Master of Management\",\"url\":\"/masters/ucdavis-master-of-management\",\"owner\":{\"key\":\"UCDavis\",\"name\":\"University of California, Davis\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/3a33451f-9a20-41f0-9cd1-5f3624a0940e-be0782e0ed48.png\"}}},{\"id\":\"1be98dfc-6b32-4f4c-8beb-02a2b1ef9183\",\"title\":\"Master of Business Administration\",\"url\":\"/masters/online-mba/unc-master-of-business-administration\",\"owner\":{\"key\":\"UNC-CH\",\"name\":\"The University of North Carolina at Chapel Hill\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/283be432-c4de-4818-83c5-bd77a2de49d6-2a29798bfd41.png\"}}},{\"id\":\"97526f98-0ea6-4f43-8574-a58ca13031dd\",\"title\":\"Master of Science in Communications Management\",\"url\":\"/masters/online-masters-in-communication/syracuse-master-of-science-in-communications-management\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}}],\"cta\":{\"label\":\"View all Business Administration degrees\",\"url\":\"/masters/online-masters-in-business\"}},{\"title\":\"Path to degrees\",\"products\":[{\"id\":\"d1768ac3-9e71-45ee-9174-2d553968c8a5\",\"title\":\"Introduction to Marketing\",\"url\":\"/learn/marketing/university-of-british-columbia-introduction-to-marketing\",\"owner\":{\"key\":\"UBCx\",\"name\":\"University of British Columbia\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\"}}},{\"id\":\"1c30e9b3-78ee-4c57-9af9-922153073d99\",\"title\":\"Business Foundations\",\"url\":\"/learn/business-administration/university-of-british-columbia-business-foundations\",\"owner\":{\"key\":\"UBCx\",\"name\":\"University of British Columbia\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\"}}},{\"id\":\"38dde1fd-e9a4-4f4b-9c87-87a3d0161830\",\"title\":\"Project Management\",\"url\":\"/masters/micromasters/ritx-project-management\",\"owner\":{\"key\":\"RITx\",\"name\":\"Rochester Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\"}}}],\"cta\":{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"}}]},{\"label\":\"Cybersecurity\",\"hero\":{\"title\":\"Cybersecurity\",\"subTitle\":\"Cybersecurity is a subset of information technology (IT) focused on protecting digital systems and information. Cybersecurity specialists play key roles in the protection of IT systems against unauthorized access to data systems, centers and other systems.\",\"cta\":{\"viewAll\":{\"label\":\"View all Cybersecurity Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Cyber+Security\"},\"learnMore\":{\"label\":\"Learn more about Cybersecurity\",\"url\":\"/learn/cybersecurity\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Information Security\",\"url\":\"/learn/information-security\"},{\"label\":\"Computer Security\",\"url\":\"/learn/computer-security\"},{\"label\":\"Cloud Computing\",\"url\":\"/learn/cloud-computing\"},{\"label\":\"Encryption\",\"url\":\"/learn/encryption\"},{\"label\":\"Security Administration\",\"url\":\"/learn/security-administration\"},{\"label\":\"Security Software\",\"url\":\"/learn/security-software\"},{\"label\":\"Vulnerability Management\",\"url\":\"/learn/vulnerability-management\"},{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"},{\"label\":\"Data Encryption\",\"url\":\"/learn/data-encryption\"},{\"label\":\"SaaS\",\"url\":\"/learn/software-as-a-service\"},{\"label\":\"User Experience (UX)\",\"url\":\"/learn/user-experience-ux\"},{\"label\":\"Cybersecurity\",\"url\":\"/learn/cybersecurity\"},{\"label\":\"UX Design\",\"url\":\"/learn/ux-design\"},{\"label\":\"Network Security\",\"url\":\"/learn/network-security\"},{\"label\":\"Security Testing\",\"url\":\"/learn/security-testing\"},{\"label\":\"Data Management\",\"url\":\"/learn/data-management\"},{\"label\":\"Technical Analysis\",\"url\":\"/learn/technical-analysis\"},{\"label\":\"Encryption Software\",\"url\":\"https://www.edx.org/learn/encryption-software\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"54c7ce9c-5a40-4e12-ab87-d562833387c4\",\"title\":\"Computer Science for Cybersecurity\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-cybersecurity\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"57e4cbf4-6b8a-4cd2-a164-380453d5c424\",\"title\":\"Cybersecurity Analyst\",\"url\":\"/certificates/professional-certificate/ibm-cybersecurity-analyst\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"5931b9af-b058-4612-9108-2301741a0740\",\"title\":\"Essentials of Cybersecurity\",\"url\":\"/certificates/professional-certificate/uwashingtonx-essentials-cybersecurity\",\"owner\":{\"key\":\"UWashingtonX\",\"name\":\"University of Washington\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity certificates\",\"url\":\"/search?q=cybersecurity\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"88391405-e329-495d-bf72-5de13bbf1846\",\"title\":\"CS50's Introduction to Cybersecurity\",\"url\":\"/learn/cybersecurity/harvard-university-cs50-s-introduction-to-cybersecurity\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"cc2b4496-bccb-4ddc-b6d9-a6ad7d05d28f\",\"title\":\"Beginners Guide to Cybersecurity\",\"url\":\"/learn/cybersecurity/ibm-beginners-guide-to-cybersecurity\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"6bc0aff3-4ff1-4a1a-a93c-38dd2168becd\",\"title\":\"Finding Your Cybersecurity Career Path\",\"url\":\"/learn/cybersecurity/university-of-washington-finding-your-cybersecurity-career-path\",\"owner\":{\"key\":\"UWashingtonX\",\"name\":\"University of Washington\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity courses\",\"url\":\"/search?q=cybersecurity\u0026tab=course\u0026page=1\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"780e11a3-0b47-424f-8a03-3f0a9072c5ec\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity/syracuse-master-of-science-in-cybersecurity\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}},{\"id\":\"5c002189-0866-4b10-807e-bcf093346dc0\",\"title\":\"Master of Information and Cybersecurity\",\"url\":\"/masters/online-masters-in-cybersecurity/ucb-master-of-information-and-cybersecurity\",\"owner\":{\"key\":\"BerkeleyX\",\"name\":\"University of California, Berkeley\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\"}}},{\"id\":\"de971614-e9f1-4dc5-9081-5dec52d5ac4e\",\"title\":\"Master of Science in Cybersecurity\",\"url\":\"/masters/maryville-university-master-of-science-in-cybersecurity\",\"owner\":{\"key\":\"Maryville\",\"name\":\"Maryville University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\"}}}],\"cta\":{\"label\":\"View all Cybersecurity degrees\",\"url\":\"/masters/online-masters-in-cybersecurity\"}},{\"title\":\"Paths to degrees\",\"products\":[{\"id\":\"8ac6657e-a06a-4a47-aba7-5c86b5811fa1\",\"title\":\"Cybersecurity\",\"url\":\"/masters/micromasters/ritx-cybersecurity\",\"owner\":{\"key\":\"RITx\",\"name\":\"Rochester Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\"}}},{\"id\":\"1c6f7157-3148-4359-b6f2-6c2e4f527151\",\"title\":\"Principles of Cybersecurity\",\"url\":\"/masters/micromasters/usmx-principles-of-cybersecurity\",\"owner\":{\"key\":\"UMBC\",\"name\":\"University of Maryland Baltimore County\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/097ca727-d3f4-43d0-8baf-9baf23c1314b-29d4b0840da2.png\"}}},{\"id\":\"9a18f293-0cb9-447a-a0ec-532c527bb72e\",\"title\":\"Database Management Systems\",\"url\":\"/masters/micromasters/umbc-database-management-systems\",\"owner\":{\"key\":\"USMx\",\"name\":\"University System of Maryland\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\"}}}],\"cta\":{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"}}]},{\"label\":\"Computer Science\",\"hero\":{\"title\":\"Computer Science\",\"subTitle\":\"Computer Science focuses on the design, development, and testing of software. It uses technology to problem solve by applying algorithms and coding to operating systems, artificial intelligence, machine learning, and informatics in nearly every industry. \",\"cta\":{\"viewAll\":{\"label\":\"View all Computer Science Courses\",\"url\":\"/search?tab=course\u0026skills.skill=Computer+Science\"},\"learnMore\":{\"label\":\"Learn more about Computer Science\",\"url\":\"/learn/computer-science\"}},\"ctaPosition\":\"left\"},\"linkList\":{\"title\":\"Related Topics\",\"links\":[{\"label\":\"Decoding\",\"url\":\"/learn/decoding\"},{\"label\":\"Information Technology\",\"url\":\"/learn/information-technology\"},{\"label\":\"Software Development\",\"url\":\"/learn/software-development\"},{\"label\":\"Numba\",\"url\":\"/learn/numba\"},{\"label\":\"YAML\",\"url\":\"/learn/yaml\"},{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"GParted\",\"url\":\"/learn/gparted\"},{\"label\":\"Finance\",\"url\":\"/learn/finance\"},{\"label\":\"CakePHP\",\"url\":\"/learn/cakephp\"},{\"label\":\"Artificial Intelligence\",\"url\":\"/learn/artificial-intelligence\"}]},\"productLists\":[{\"title\":\"Certificates\",\"products\":[{\"id\":\"e250b08e-be2a-4b48-a43c-c9ae47f6cf14\",\"title\":\"Computer Science for Python Programming\",\"url\":\"/certificates/professional-certificate/harvardx-computer-science-for-python-programming\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"a11c408f-0986-4393-8268-8bc16500cdf3\",\"title\":\"Introduction to Python Programming\",\"url\":\"/certificates/professional-certificate/the-georgia-institute-of-technology-introduction-to-python-programming\",\"owner\":{\"key\":\"GTx\",\"name\":\"The Georgia Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\"}}},{\"id\":\"b6c81b35-e8e2-46e1-8165-2dd36f8e5f58\",\"title\":\"IBM Applied AI Developer\",\"url\":\"/certificates/professional-certificate/ibm-ibm-applied-ai-developer\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}}],\"cta\":{\"label\":\"View all Computer Science certificates\",\"url\":\"/search?q=computer+science\u0026tab=program\u0026program_type=Professional+Certificate\"}},{\"title\":\"Courses\",\"products\":[{\"id\":\"05f61d04-5acc-452b-9c34-6d447af6437f\",\"title\":\"Computer Science 101\",\"url\":\"/learn/computer-science/stanford-university-computer-science-101\",\"owner\":{\"key\":\"StanfordOnline\",\"name\":\"Stanford University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\"}}},{\"id\":\"da1b2400-322b-459b-97b0-0c557f05d017\",\"title\":\"CS50's Introduction to Computer Science\",\"url\":\"/learn/computer-science/harvard-university-cs50-s-introduction-to-computer-science\",\"owner\":{\"key\":\"HarvardX\",\"name\":\"Harvard University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\"}}},{\"id\":\"956319ec-8665-4039-8bc6-32c9a9aea5e9\",\"title\":\"Introduction to Computer Science and Programming Using Python\",\"url\":\"/learn/computer-science/massachusetts-institute-of-technology-introduction-to-computer-science-and-programming-using-python\",\"owner\":{\"key\":\"MITx\",\"name\":\"Massachusetts Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\"}}}],\"cta\":{\"label\":\"View all Computer Science courses\",\"url\":\"/search?q=computer+science\u0026tab=course\"}},{\"title\":\"Degrees\",\"products\":[{\"id\":\"b6c81b35-e8e2-46e1-8165-2dd36f8e5f58\",\"title\":\"IBM Applied AI Developer\",\"url\":\"/certificates/professional-certificate/ibm-ibm-applied-ai-developer\",\"owner\":{\"key\":\"IBM\",\"name\":\"IBM\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\"}}},{\"id\":\"7f9a65f5-45ec-4106-bf78-21331f3bdaa4\",\"title\":\"Bachelor of Science, Computer Science\",\"url\":\"/bachelor-of-science-computer-science\",\"owner\":{\"key\":\"Simmons\",\"name\":\"Simmons University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/78fe11c7-e0da-4425-afb6-3d74bfb4f606-ad36acd8a318.png\"}}},{\"id\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"title\":\"Master of Science in Computer Science\",\"url\":\"/masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"owner\":{\"key\":\"SyracuseUniversity\",\"name\":\"Syracuse University\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\"}}}],\"cta\":{\"label\":\"View all Computer Science degrees\",\"url\":\"/masters/online-masters-in-computer-science\"}},{\"title\":\"Path to degrees\",\"products\":[{\"id\":\"c4adc3c7-e3be-46ea-a9cd-d94af61ece32\",\"title\":\"Cloud Computing\",\"url\":\"/masters/micromasters/usmx-umgc-cloud-computing\",\"owner\":{\"key\":\"USMx\",\"name\":\"University System of Maryland\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\"}}},{\"id\":\"a2a6a8f9-7b61-49ce-9d62-7e959b776fb7\",\"title\":\"Analytics: Essential Tools and Methods\",\"url\":\"/masters/micromasters/gtx-analytics-essential-tools-and-methods\",\"owner\":{\"key\":\"GTx\",\"name\":\"The Georgia Institute of Technology\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\"}}},{\"id\":\"0f56cf5f-a40a-4c65-8c4e-5dee9ec0be62\",\"title\":\"Software Development Foundations\",\"url\":\"/masters/micromasters/ubcx-software-development-foundations\",\"owner\":{\"key\":\"UBCx\",\"name\":\"University of British Columbia\",\"logo\":{\"url\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\"}}}],\"cta\":{\"label\":\"Browse all MicroMasters® pathways\",\"url\":\"/masters/micromasters\"}}]},{\"label\":\"View all topics\",\"hero\":{\"title\":\"Popular topics\",\"cta\":{\"viewAll\":{\"label\":\"View all topics\",\"url\":\"/learn\"}},\"ctaPosition\":\"left\"},\"linkLists\":[{\"title\":\"Computer Programming\",\"url\":\"/learn/computer-programming\",\"links\":[{\"label\":\"Python\",\"url\":\"/learn/python\"},{\"label\":\"JavaScript\",\"url\":\"/learn/javascript\"},{\"label\":\"C\",\"url\":\"/learn/c-programming\"},{\"label\":\"Algorithms\",\"url\":\"/learn/algorithms\"},{\"label\":\"Linux\",\"url\":\"/learn/linux\"}]},{\"title\":\"Data Analysis\",\"url\":\"/learn/data-analysis\",\"links\":[{\"label\":\"Machine Learning\",\"url\":\"/learn/machine-learning\"},{\"label\":\"SQL\",\"url\":\"/learn/sql\"},{\"label\":\"Statistics\",\"url\":\"/learn/statistics\"},{\"label\":\"R\",\"url\":\"/learn/r-programming\"},{\"label\":\"Excel\",\"url\":\"/learn/excel\"}]},{\"title\":\"Economics\",\"url\":\"/learn/economics\",\"links\":[{\"label\":\"Trading\",\"url\":\"/learn/trading\"},{\"label\":\"Investing\",\"url\":\"/learn/investing\"},{\"label\":\"Stocks\",\"url\":\"/learn/stocks\"},{\"label\":\"Blockchain\",\"url\":\"/learn/blockchain\"},{\"label\":\"Cryptocurrency\",\"url\":\"/learn/cryptocurrency\"}]},{\"title\":\"Biology\",\"url\":\"/learn/biology\",\"links\":[{\"label\":\"STEM\",\"url\":\"/learn/stem\"},{\"label\":\"Genetics\",\"url\":\"/learn/genetics\"},{\"label\":\"Neuroscience\",\"url\":\"/learn/neuroscience\"},{\"label\":\"Nutrition\",\"url\":\"/learn/nutrition\"},{\"label\":\"Human Anatomy\",\"url\":\"/learn/human-anatomy\"}]},{\"title\":\"Physics\",\"url\":\"/learn/physics\",\"links\":[{\"label\":\"Dynamics\",\"url\":\"/learn/dynamics\"},{\"label\":\"Nature\",\"url\":\"/learn/nature\"},{\"label\":\"Planets\",\"url\":\"/learn/planets\"},{\"label\":\"Architecture\",\"url\":\"/learn/architecture\"},{\"label\":\"Mechanics\",\"url\":\"/learn/mechanics\"}]},{\"title\":\"Language\",\"url\":\"/learn/language\",\"links\":[{\"label\":\"Writing\",\"url\":\"/learn/writing\"},{\"label\":\"Spanish\",\"url\":\"/learn/spanish\"},{\"label\":\"English\",\"url\":\"/learn/english\"},{\"label\":\"Italian\",\"url\":\"/learn/italian\"},{\"label\":\"Japanese\",\"url\":\"/learn/japanese\"}]},{\"title\":\"Social Science\",\"url\":\"/learn/social-science\",\"links\":[{\"label\":\"Psychology\",\"url\":\"/learn/psychology\"},{\"label\":\"Education\",\"url\":\"/learn/education\"},{\"label\":\"Politics\",\"url\":\"/learn/politics\"},{\"label\":\"Behavioral Psychology\",\"url\":\"/learn/behavioral-psychology\"},{\"label\":\"Government\",\"url\":\"/learn/government\"}]},{\"title\":\"Math\",\"url\":\"/learn/math\",\"links\":[{\"label\":\"Probability\",\"url\":\"/learn/probability\"},{\"label\":\"Algebra\",\"url\":\"/learn/algebra\"},{\"label\":\"Calculus\",\"url\":\"/learn/calculus\"},{\"label\":\"Logic\",\"url\":\"/learn/logic\"},{\"label\":\"Geometry\",\"url\":\"/learn/geometry\"}]},{\"title\":\"Humanities\",\"url\":\"/learn/humanities\",\"links\":[{\"label\":\"Music\",\"url\":\"/learn/music-arts\"},{\"label\":\"Art\",\"url\":\"/learn/art\"},{\"label\":\"Philosophy\",\"url\":\"/learn/philosophy\"},{\"label\":\"Geography\",\"url\":\"/learn/geography\"},{\"label\":\"History\",\"url\":\"/learn/history\"}]}]}]},{\"items\":[{\"label\":\"Career resources\",\"hero\":{\"title\":\"Career resources\",\"subTitle\":\"Find resources that help you make progress towards your next career goal.\",\"cta\":{\"viewAll\":{\"label\":\"Access the Career Resource Center\",\"url\":\"https://careers.edx.org/\"}},\"ctaPosition\":\"left\"},\"productResources\":[{\"title\":\"Access career tips\",\"description\":\"Explore career articles in our Idea Hub\",\"links\":[{\"label\":\"Hybrid Jobs: A 4-Minute Primer on Fast-Growing, Lucrative Career Paths\",\"url\":\"/resources/hybrid-jobs-a-4-minute-primer-on-fast-growing-lucrative-career-paths\"},{\"label\":\"How to Write an Effective CV – 5 Steps From the Experts\",\"url\":\"/resources/how-to-write-an-effective-cv-5-steps-experts\"},{\"label\":\"The Employability Skills Checklist\",\"url\":\"/resources/the-employability-skills-checklist\"},{\"label\":\"Computer science careers: Why computer science is for everyone\",\"url\":\"https://www.edx.org/resources/computer-science-careers\"},{\"label\":\"Building a career in data science and analytics\",\"url\":\"https://www.edx.org/resources/data-science-analytics-career-guide\"}],\"cta\":{\"label\":\"Go to Idea Hub\",\"url\":\"https://www.edx.org/resources\"}},{\"title\":\"How to guides\",\"description\":\"Find the next steps to start your new career\",\"links\":[{\"label\":\"How to Become a Software Developer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-developer\"},{\"label\":\"How to Become a Data Scientist\",\"url\":\"https://www.edx.org/become/how-to-become-a-data-scientist\"},{\"label\":\"How to Become a Software Engineer\",\"url\":\"https://www.edx.org/become/how-to-become-a-software-engineer-without-a-degree\"},{\"label\":\"How to Become a Social Media Manager\",\"url\":\"https://www.edx.org/become/how-to-become-a-social-media-manager\"},{\"label\":\"How to Become a Cybersecurity Analyst\",\"url\":\"https://www.edx.org/become/how-to-become-a-cybersecurity-analyst\"}],\"cta\":{\"label\":\"View all guides\",\"url\":\"https://www.edx.org/become\"}},{\"title\":\"Career paths\",\"description\":\"Gain insights to chart your own career journey.\",\"links\":null,\"cta\":{\"label\":\"Discover career paths\",\"url\":\"https://careers.edx.org/browse-by-industry\"}},{\"title\":\"Guides \u0026 templates\",\"description\":\"Use our career guides and templates to propel your career forward.\",\"links\":null,\"cta\":{\"label\":\"Access guides \u0026 templates\",\"url\":\"https://careers.edx.org/guides-and-templates\"}},{\"title\":\"Skills Quiz\",\"description\":\"Find the right skills to learn for your dream job.\",\"links\":null,\"cta\":{\"label\":\"Take the quiz\",\"url\":\"https://skills.edx.org\"}}]},{\"label\":\"Schools \u0026 Partners\",\"url\":\"/schools-partners\"}]},{\"title\":\"Still unsure?\",\"subTitle\":\"Try a course.\",\"items\":[{\"cta\":{\"label\":\"Find online courses\",\"url\":\"/courses?q=online+courses\"}}]}]},\"activeBanner\":{\"backgroundColor\":\"blue\",\"backgroundColorEs\":\"blue\",\"content\":[\"Unlock the future — join us for a worldwide AI learning event April 8 and \",[\"$\",\"b\",\"1\",{\"children\":\"earn a free Microsoft certificate\"}],\". \",[\"$\",\"a\",\"3\",{\"href\":\"https://www.edx.org/microsoft-ai-skills-fest\",\"className\":\"underline text-inherit\",\"children\":\"Learn more\"}],\".\"],\"contentEs\":[\"Desbloquea el futuro: únete a nuestro evento de aprendizaje de IA el 8 de abril y obtén un certificado gratuito de Microsoft. \",[\"$\",\"a\",\"1\",{\"href\":\"https://www.edx.org/microsoft-ai-skills-fest\",\"className\":\"underline text-inherit\",\"children\":\"Más información\"}],\".\"],\"campaignId\":\"microsoft-ai-skills-fest-en\",\"campaignIdEs\":\"microsoft-ai-skills-fest-es\"},\"program\":\"$undefined\"}],[\"$\",\"div\",null,{\"style\":{\"minHeight\":50},\"children\":[[\"$\",\"$L13\",null,{\"src\":\"/scripts/newrelic\"}],[\"$\",\"main\",null,{\"children\":[\"$\",\"article\",null,{\"className\":\"container prose\",\"children\":[[\"$\",\"div\",null,{\"className\":\"max-w-3xl mx-auto py-14\",\"children\":[[\"$\",\"span\",null,{\"children\":\"Error code: 404\"}],[\"$\",\"h1\",null,{\"className\":\"pt-0\",\"children\":\"We can't seem to find the page you're looking for.\"}],[\"$\",\"h3\",null,{\"className\":\"font-normal \",\"children\":\"Here are some helpful links instead:\"}],[\"$\",\"ul\",null,{\"className\":\"list-none pl-0\",\"children\":[[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"$L24\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"/\",\"children\":\"Home\"}]}],[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"$L24\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"/search\",\"children\":\"Search courses and programs\"}]}],[\"$\",\"li\",null,{\"className\":\"pl-0\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-primary hover:text-primary underline\",\"href\":\"https://authn.edx.org/login\",\"children\":\"Create account\"}]}]]}]]}],\"$L25\"]}]}]]}],[\"$\",\"div\",null,{\"className\":\"bg-primary text-primary-foreground pt-16\",\"children\":[\"$\",\"footer\",null,{\"className\":\"flex justify-between max-w-screen-xl mx-auto px-4 pb-4 \",\"children\":[\"$\",\"div\",null,{\"className\":\"flex flex-col w-full\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap justify-between mb-6 w-full\",\"children\":[[\"$\",\"$L24\",null,{\"href\":\"/\",\"className\":\"mb-6\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/trademark-logos/edx-by-2u-white.svg\",\"alt\":\"edX homepage\",\"title\":\"edX homepage\",\"width\":127,\"height\":67,\"className\":\"optanon-category-C0001\",\"data-ot-ignore\":true}]}],[\"$\",\"div\",null,{\"children\":[\"$\",\"div\",null,{\"className\":\"mb-4 justify-center flex flex-row\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.facebook.com/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Facebook page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"32\",\"height\":\"32\",\"viewBox\":\"0 0 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"1\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://x.com/edXOnline\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our X page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"48\",\"height\":\"48\",\"viewBox\":\"0 0 48 48\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"2\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.linkedin.com/school/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our LinkedIn page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"20\",\"height\":\"20\",\"viewBox\":\"0 0 20 20\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"fill-rule\":\"evenodd\",\"clip-rule\":\"evenodd\",\"d\":\"M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"3\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.reddit.com/r/edX/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Reddit page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"40\",\"height\":\"40\",\"viewBox\":\"-2 -2 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z\",\"fill\":\"currentColor\"}]}]}]}]}]]}]}]]}],false,[\"$\",\"div\",null,{\"className\":\"my-6\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap md:flex-nowrap justify-between\",\"children\":[[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Browse Courses\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Learn AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/artificial-intelligence\",\"children\":\"Learn AI\"}]}],[\"$\",\"li\",\"Learn ChatGPT\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/chatgpt\",\"children\":\"Learn ChatGPT\"}]}],[\"$\",\"li\",\"Learn Spanish\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/spanish\",\"children\":\"Learn Spanish\"}]}],[\"$\",\"li\",\"Learn Python\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/python\",\"children\":\"Learn Python\"}]}],[\"$\",\"li\",\"Learn Excel\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/excel\",\"children\":\"Learn Excel\"}]}],[\"$\",\"li\",\"Learn Software Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/software-engineering\",\"children\":\"Learn Software Engineering\"}]}],[\"$\",\"li\",\"Learn Blockchain\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/blockchain\",\"children\":\"Learn Blockchain\"}]}],[\"$\",\"li\",\"Learn Computer Programming\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/computer-programming\",\"children\":\"Learn Computer Programming\"}]}],[\"$\",\"li\",\"Learn Economics\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/economics\",\"children\":\"Learn Economics\"}]}],[\"$\",\"li\",\"Learn Architecture\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/architecture\",\"children\":\"Learn Architecture\"}]}],[\"$\",\"li\",\"Learn Project Management\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/project-management\",\"children\":\"Learn Project Management\"}]}],[\"$\",\"li\",\"Learn Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/business-administration\",\"children\":\"Learn Business Administration\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Courses\",{\"href\":\"/learn\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Courses\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"step-by-step guides\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Become a Cybersecurity Analyst\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-cybersecurity-analyst\",\"children\":\"Become a Cybersecurity Analyst\"}]}],[\"$\",\"li\",\"Become a Data Scientist\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-data-scientist\",\"children\":\"Become a Data Scientist\"}]}],[\"$\",\"li\",\"Become a Social Media Manager\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-social-media-manager\",\"children\":\"Become a Social Media Manager\"}]}],[\"$\",\"li\",\"Become a Software Developer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-developer\",\"children\":\"Become a Software Developer\"}]}],[\"$\",\"li\",\"Become a Software Engineer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-engineer-without-a-degree\",\"children\":\"Become a Software Engineer\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Guides\",{\"href\":\"/become\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Guides\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Complete your bachelor's online\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Bachelor's in Business\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/business\",\"children\":\"Bachelor's in Business\"}]}],[\"$\",\"li\",\"Bachelor's in Computer Science / Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/computer-data-sciences\",\"children\":\"Bachelor's in Computer Science / Data Science\"}]}],[\"$\",\"li\",\"Bachelor's in Health and Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/health-social-services\",\"children\":\"Bachelor's in Health and Nursing\"}]}],[\"$\",\"li\",\"Bachelor's in Accounting\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-accounting-bachelor-degree\",\"children\":\"Bachelor's in Accounting\"}]}],[\"$\",\"li\",\"Bachelor's in Finance\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-bachelors-degree-finance\",\"children\":\"Bachelor's in Finance\"}]}],[\"$\",\"li\",\"Bachelor's in Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/psychology\",\"children\":\"Bachelor's in Psychology\"}]}],[\"$\",\"li\",\"Bachelor's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/bachelors-in-public-health-online\",\"children\":\"Bachelor's in Public Health\"}]}],[\"$\",\"li\",\"Bachelor's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/social-work-bsw\",\"children\":\"Bachelor's in Social Work\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Undergraduate Degrees\",{\"href\":\"/bachelors\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Undergraduate Degrees\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Earn your online graduate degree\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Master's in Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-mba\",\"children\":\"Master's in Business Administration\"}]}],[\"$\",\"li\",\"Master's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-public-health-online\",\"children\":\"Master's in Public Health\"}]}],[\"$\",\"li\",\"Master's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msw-programs\",\"children\":\"Master's in Social Work\"}]}],[\"$\",\"li\",\"Master's in Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msn-programs\",\"children\":\"Master's in Nursing\"}]}],[\"$\",\"li\",\"Master's in Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-data-science\",\"children\":\"Master's in Data Science\"}]}],[\"$\",\"li\",\"Master's in Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-engineering\",\"children\":\"Master's in Engineering\"}]}],[\"$\",\"li\",\"Master's in Speech Pathology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Speech Pathology\"}]}],[\"$\",\"li\",\"Master's in Counseling/Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Counseling/Psychology\"}]}],[\"$\",\"li\",\"Master's Degree in Healthcare\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/healthcare\",\"children\":\"Master's Degree in Healthcare\"}]}],[\"$\",\"li\",\"Master's Degree in Education\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-education-online\",\"children\":\"Master's Degree in Education\"}]}],[\"$\",\"li\",\"Master's Degree in AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-artificial-intelligence\",\"children\":\"Master's Degree in AI\"}]}],[\"$\",\"li\",\"Master's Degree in Computer Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-computer-science\",\"children\":\"Master's Degree in Computer Science\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Graduate Degrees\",{\"href\":\"/masters\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Graduate Degrees\"}],[\"$\",\"a\",\"see more Doctorate Degrees\",{\"href\":\"/doctorate\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Doctorate Degrees\"}]]}]]}]]}],[\"$\",\"div\",null,{\"className\":\"my-4 border-t-[1px] border-solid border-primary-foreground\"}]]}],[\"$\",\"$L27\",null,{\"links\":{\"edx\":{\"title\":\"edx\",\"links\":[{\"label\":\"Partner With Us\",\"url\":\"https://business.edx.org/partner\"},{\"label\":\"About\",\"url\":\"/about-us\"},{\"label\":\"edX For Business\",\"url\":\"https://business.edx.org/?_gl=1*y0gcxr*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NDczLjQ1LjAuMA..\"},{\"label\":\"Affiliates\",\"url\":\"/affiliate-program\"},{\"label\":\"Open edX\",\"url\":\"http://open.edx.org/?_gl=1*lt6kx3*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTQ5LjU5LjAuMA..\"},{\"label\":\"2U Advisory Council\",\"url\":\"/advisory-groups\"},{\"label\":\"Careers\",\"url\":\"/careers\"},{\"label\":\"News\",\"url\":\"https://press.edx.org/?_gl=1*8w80my*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NTgzLjI1LjAuMA..\"}]},\"connect\":{\"title\":\"Connect\",\"links\":[{\"label\":\"Idea Hub\",\"url\":\"/resources\"},{\"label\":\"Contact Us\",\"url\":\"https://courses.edx.org/support/contact_us?_gl=1*13dq6q5*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE0NjYyLjYuMC4w\"},{\"label\":\"Help Center\",\"url\":\"https://support.edx.org/?_gl=1*1ej7jnc*_gcl_au*NDExMDUyMjIxLjE3MTUxMDI2MjM.*_ga*MTQzNjQ4NzY3NC4xNzA3MzE1NzUx*_ga_D3KS4KMDT0*MTcyMTkxMjUxNC4xODEuMS4xNzIxOTE1MDgxLjUuMC4w\"},{\"label\":\"Security\",\"url\":\"/policy/security\"},{\"label\":\"Media Kit\",\"url\":\"/media-kit\"}]},\"legal\":{\"title\":\"Legal\",\"links\":[{\"label\":\"Terms of Service \u0026 Honor Code\",\"url\":\"/edx-terms-service\"},{\"label\":\"Privacy Policy\",\"url\":\"/edx-privacy-policy\"},{\"label\":\"Cookie Policy\",\"url\":\"/edx-privacy-policy/cookies\"},{\"label\":\"Accessibility Policy\",\"url\":\"/accessibility\"},{\"label\":\"Trademark Policy\",\"url\":\"/trademarks\"},{\"label\":\"Modern Slavery Statement\",\"url\":\"/modern-slavery-statement\"},{\"label\":\"Sitemap\",\"url\":\"/sitemap\"},{\"label\":\"Your Privacy Choices\",\"url\":\"#\"}]}}}],[\"$\",\"div\",null,{\"className\":\"flex flex-wrap-reverse justify-between\",\"children\":[[\"$\",\"p\",null,{\"className\":\"text-primary-foreground text-[1rem]\",\"children\":[\"© 2024 edX LLC. All rights reserved.\",[\"$\",\"br\",null,{}],[\"$\",\"span\",null,{\"children\":\"| 深圳市恒宇博科技有限公司\"}]]}],[\"$\",\"div\",null,{\"className\":\"flex gap-1\",\"children\":[[\"$\",\"a\",null,{\"href\":\"https://itunes.apple.com/us/app/edx/id945480667?mt=8\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/images/apple-store-badge-en.png\",\"alt\":\"Download on the App Store\",\"title\":\"Download on the App Store\",\"width\":120,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}],[\"$\",\"a\",null,{\"href\":\"https://play.google.com/store/apps/details?id=org.edx.mobile\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/images/google-play-badge-en.png\",\"alt\":\"Get it on Google Play\",\"title\":\"Get it on Google Play\",\"width\":135,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}]]}]]}]]}]}]}]]\n"])</script><script>self.__next_f.push([1,"28:I[38680,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n29:T55f,\u003cp\u003eThis course harnesses science-backed techniques applicable across different learning platforms, equipping you with the strategies you need to thrive as an online learner.\u003c/p\u003e\n\u003cp\u003eIn this course, you will:\u003c/p\u003e\n\u003cp\u003eReflect on your Identity as a Learner: Learn about the history and benefits of learning online and reflect on how embarking on this new journey of learning online fits into your broader narrative as a lifelong learner. \u003c/p\u003e\n\u003cp\u003eDevelop Digital Literacy Skills: Acquire essential skills for navigating and utilizing online learning technologies effectively, including familiarity with Learning Management Systems and the unique features of the edX platform.\u003c/p\u003e\n\u003cp\u003eEnhance Metacognitive Skills: Learn to develop awareness of your own learning behaviors and thought processes, a key aspect of successful online learning.\u003c/p\u003e\n\u003cp\u003eApply Effective Study Strategies: Master a range of study strategies based on current research, covering awareness"])</script><script>self.__next_f.push([1,", balance, community engagement, and dedication to learning.\u003c/p\u003e\n\u003cp\u003eLeverage Community Resources: Understand how to effectively utilize peer interactions and community resources to enhance your learning experience.\u003c/p\u003e\n\u003cp\u003eImprove Time Management: Cultivate strong time management skills tailored for online learning, including techniques like the Pomodoro method and understanding your chronotype for optimal learning.\u003c/p\u003e2a:T55f,\u003cp\u003eThis course harnesses science-backed techniques applicable across different learning platforms, equipping you with the strategies you need to thrive as an online learner.\u003c/p\u003e\n\u003cp\u003eIn this course, you will:\u003c/p\u003e\n\u003cp\u003eReflect on your Identity as a Learner: Learn about the history and benefits of learning online and reflect on how embarking on this new journey of learning online fits into your broader narrative as a lifelong learner. \u003c/p\u003e\n\u003cp\u003eDevelop Digital Literacy Skills: Acquire essential skills for navigating and utilizing online learning technologies effectively, including familiarity with Learning Management Systems and the unique features of the edX platform.\u003c/p\u003e\n\u003cp\u003eEnhance Metacognitive Skills: Learn to develop awareness of your own learning behaviors and thought processes, a key aspect of successful online learning.\u003c/p\u003e\n\u003cp\u003eApply Effective Study Strategies: Master a range of study strategies based on current research, covering awareness, balance, community engagement, and dedication to learning.\u003c/p\u003e\n\u003cp\u003eLeverage Community Resources: Understand how to effectively utilize peer interactions and community resources to enhance your learning experience.\u003c/p\u003e\n\u003cp\u003eImprove Time Management: Cultivate strong time management skills tailored for online learning, including techniques like the Pomodoro method and understanding your chronotype for optimal learning.\u003c/p\u003e2b:T68d,\u003cp\u003eThis is an introductory-level course in supervised learning, with a focus on regression and classification methods. The syllabus includes: linear and polynomial regression, logistic regression and linear discriminant analysis; cross"])</script><script>self.__next_f.push([1,"-validation and the bootstrap, model selection and regularization methods (ridge and lasso); nonlinear models, splines and generalized additive models; tree-based methods, random forests and boosting; support-vector machines; neural networks and deep learning; survival models; multiple testing. Some unsupervised learning methods are discussed: principal components and clustering (k-means and hierarchical).\u003c/p\u003e\n\u003cp\u003eThis is not a math-heavy class, so we try and describe the methods without heavy reliance on formulas and complex mathematics. We focus on what we consider to be the important elements of modern data science. Computing is done in R. There are lectures devoted to R, giving tutorials from the ground up, and progressing with more detailed sessions that implement the techniques in each chapter. We also offer a separate version of the course called \u003ca href=\"https://www.edx.org/learn/data-analysis-statistics/stanford-university-statistical-learning-with-python\" rel=\"noopener\" target=\"_blank\"\u003eStatistical Learning with Python\u003c/a\u003e – the chapter lectures are the same, but the lab lectures and computing are done using Python.\u003c/p\u003e\n\u003cp\u003eThe lectures cover all the material in An Introduction to Statistical Learning, with Applications in R (second addition) by James, Witten, Hastie and Tibshirani (Springer, 2021). The pdf for this book is available for free on the \u003ca href=\"https://www.statlearning.com/\"\u003ebook website\u003c/a\u003e.\u003c/p\u003e2c:T68d,\u003cp\u003eThis is an introductory-level course in supervised learning, with a focus on regression and classification methods. The syllabus includes: linear and polynomial regression, logistic regression and linear discriminant analysis; cross-validation and the bootstrap, model selection and regularization methods (ridge and lasso); nonlinear models, splines and generalized additive models; tree-based methods, random forests and boosting; support-vector machines; neural networks and deep learning; survival models; multiple testing. Some unsupervised learning methods are discussed: principal compone"])</script><script>self.__next_f.push([1,"nts and clustering (k-means and hierarchical).\u003c/p\u003e\n\u003cp\u003eThis is not a math-heavy class, so we try and describe the methods without heavy reliance on formulas and complex mathematics. We focus on what we consider to be the important elements of modern data science. Computing is done in R. There are lectures devoted to R, giving tutorials from the ground up, and progressing with more detailed sessions that implement the techniques in each chapter. We also offer a separate version of the course called \u003ca href=\"https://www.edx.org/learn/data-analysis-statistics/stanford-university-statistical-learning-with-python\" rel=\"noopener\" target=\"_blank\"\u003eStatistical Learning with Python\u003c/a\u003e – the chapter lectures are the same, but the lab lectures and computing are done using Python.\u003c/p\u003e\n\u003cp\u003eThe lectures cover all the material in An Introduction to Statistical Learning, with Applications in R (second addition) by James, Witten, Hastie and Tibshirani (Springer, 2021). The pdf for this book is available for free on the \u003ca href=\"https://www.statlearning.com/\"\u003ebook website\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"25:[\"$\",\"$L28\",null,{\"title\":\"Popular courses\",\"ctaUrl\":\"/search?tab=course\",\"ctaLabel\":\"View all courses\",\"products\":[{\"productUuid\":\"0e575a39-da1e-4e33-bb3b-e96cc6ffc58e\",\"productName\":\"How to Learn Online\",\"productSlug\":\"learn/how-to-learn/edx-how-to-learn-online\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/0e575a39-da1e-4e33-bb3b-e96cc6ffc58e-403e4a4aaada.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":\"edX\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$29\",\"shortDescription\":\"\u003cp\u003eThis course will prepare you with strategies to be a successful online learner. The edX learning team has curated powerful, science-backed techniques which you can start using right away on any learning platform.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHistory, benefits, and foundational concepts of online learning\u003c/li\u003e\\n\u003cli\u003eHow to leverage your prior educational experiences for success learning online\u003c/li\u003e\\n\u003cli\u003eTechnology fundamentals for online learning, including building your digital confidence, using an LMS (Learning Management System), and making the most of online accessibility features\u003c/li\u003e\\n\u003cli\u003eStudy strategies for online learning, anchored in the ABCDs: Awareness, Balance, Community, and Dedication\u003c/li\u003e\\n\u003cli\u003eTime management skills to help integrate learning into your busy life\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"locationRestrictions\":null,\"partnerKeys\":[\"edX\"],\"objectID\":\"6360003000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"0e575a39-da1e-4e33-bb3b-e96cc6ffc58e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"How to Learn Online\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/how-to-learn/edx-how-to-learn-online\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/0e575a39-da1e-4e33-bb3b-e96cc6ffc58e-403e4a4aaada.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Education \u0026 Teacher Training\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"edX\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"$2a\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eThis course will prepare you with strategies to be a successful online learner. The edX learning team has curated powerful, science-backed techniques which you can start using right away on any learning platform.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003eHistory, benefits, and foundational concepts of online learning\u003c/li\u003e\\n\u003cli\u003eHow to leverage your prior educational experiences for success learning online\u003c/li\u003e\\n\u003cli\u003eTechnology fundamentals for online learning, including building your digital confidence, using an LMS (Learning Management System), and making the most of online accessibility features\u003c/li\u003e\\n\u003cli\u003eStudy strategies for online learning, anchored in the ABCDs: Awareness, Balance, Community, and Dedication\u003c/li\u003e\\n\u003cli\u003eTime management skills to help integrate learning into your busy life\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerKeys\":[{\"value\":\"edX\",\"matchLevel\":\"none\",\"matchedWords\":[]}]}},{\"productUuid\":\"3a31db71-de8f-45f1-ae65-11981ed9d680\",\"productName\":\"CS50's Introduction to Artificial Intelligence with Python\",\"productSlug\":\"learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/3a31db71-de8f-45f1-ae65-11981ed9d680-b801bb328333.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":\"Harvard University\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"\u003cp\u003eThis course explores the concepts and algorithms at the foundation of modern artificial intelligence, diving into the ideas that give rise to technologies like game-playing engines, handwriting recognition, and machine translation. Through hands-on projects, students gain exposure to the theory behind graph search algorithms, classification, optimization, machine learning, large language models, and other topics in artificial intelligence as they incorporate them into their own Python programs. By course’s end, students emerge with experience in libraries for machine learning as well as knowledge of artificial intelligence principles that enable them to design intelligent systems of their own.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn to use machine learning in Python in this introductory course on artificial intelligence.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003egraph search algorithms\u003c/li\u003e\\n\u003cli\u003eadversarial search\u003c/li\u003e\\n\u003cli\u003eknowledge representation\u003c/li\u003e\\n\u003cli\u003elogical inference\u003c/li\u003e\\n\u003cli\u003eprobability theory\u003c/li\u003e\\n\u003cli\u003eBayesian networks\u003c/li\u003e\\n\u003cli\u003eMarkov models\u003c/li\u003e\\n\u003cli\u003econstraint satisfaction\u003c/li\u003e\\n\u003cli\u003emachine learning\u003c/li\u003e\\n\u003cli\u003ereinforcement learning\u003c/li\u003e\\n\u003cli\u003eneural networks\u003c/li\u003e\\n\u003cli\u003enatural language processing\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"locationRestrictions\":null,\"partnerKeys\":[\"HarvardX\"],\"objectID\":\"6360524000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"3a31db71-de8f-45f1-ae65-11981ed9d680\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"CS50's Introduction to Artificial Intelligence with Python\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/artificial-intelligence/harvard-university-cs50-s-introduction-to-artificial-intelligence-with-python\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/3a31db71-de8f-45f1-ae65-11981ed9d680-b801bb328333.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Computer Science\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"Harvard University\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"\u003cp\u003eThis course explores the concepts and algorithms at the foundation of modern artificial intelligence, diving into the ideas that give rise to technologies like game-playing engines, handwriting recognition, and machine translation. Through hands-on projects, students gain exposure to the theory behind graph search algorithms, classification, optimization, machine learning, large language models, and other topics in artificial intelligence as they incorporate them into their own Python programs. By course’s end, students emerge with experience in libraries for machine learning as well as knowledge of artificial intelligence principles that enable them to design intelligent systems of their own.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eLearn to use machine learning in Python in this introductory course on artificial intelligence.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003egraph search algorithms\u003c/li\u003e\\n\u003cli\u003eadversarial search\u003c/li\u003e\\n\u003cli\u003eknowledge representation\u003c/li\u003e\\n\u003cli\u003elogical inference\u003c/li\u003e\\n\u003cli\u003eprobability theory\u003c/li\u003e\\n\u003cli\u003eBayesian networks\u003c/li\u003e\\n\u003cli\u003eMarkov models\u003c/li\u003e\\n\u003cli\u003econstraint satisfaction\u003c/li\u003e\\n\u003cli\u003emachine learning\u003c/li\u003e\\n\u003cli\u003ereinforcement learning\u003c/li\u003e\\n\u003cli\u003eneural networks\u003c/li\u003e\\n\u003cli\u003enatural language processing\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerKeys\":[{\"value\":\"HarvardX\",\"matchLevel\":\"none\",\"matchedWords\":[]}]}},{\"productUuid\":\"ef2fc3ac-b0bc-4004-bd30-d610832d0cdd\",\"productName\":\"Statistical Learning with R\",\"productSlug\":\"learn/statistics/stanford-university-statistical-learning\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/ef2fc3ac-b0bc-4004-bd30-d610832d0cdd-b971c6b5f47b.png\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":\"Stanford University\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$2b\",\"shortDescription\":\"\u003cp\u003eLearn some of the main tools used in statistical modeling and data science. We cover both traditional as well as exciting new methods, and how to use them in R. \u003cem\u003eCourse material updated in 2021 for second edition of the course textbook.\u003c/em\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eOverview of statistical learning\u003c/li\u003e\\n\u003cli\u003eLinear regression\u003c/li\u003e\\n\u003cli\u003eClassification\u003c/li\u003e\\n\u003cli\u003eResampling methods\u003c/li\u003e\\n\u003cli\u003eLinear model selection and regularization\u003c/li\u003e\\n\u003cli\u003eMoving beyond linearity\u003c/li\u003e\\n\u003cli\u003eTree-based methods\u003c/li\u003e\\n\u003cli\u003eSupport vector machines\u003c/li\u003e\\n\u003cli\u003eDeep learning\u003c/li\u003e\\n\u003cli\u003eSurvival modeling\u003c/li\u003e\\n\u003cli\u003eUnsupervised learning\u003c/li\u003e\\n\u003cli\u003eMultiple testing\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"locationRestrictions\":null,\"partnerKeys\":[\"StanfordOnline\"],\"objectID\":\"6357934000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"ef2fc3ac-b0bc-4004-bd30-d610832d0cdd\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"Statistical Learning with R\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/statistics/stanford-university-statistical-learning\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/ef2fc3ac-b0bc-4004-bd30-d610832d0cdd-b971c6b5f47b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Data Analysis \u0026 Statistics\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"Stanford University\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"$2c\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eLearn some of the main tools used in statistical modeling and data science. We cover both traditional as well as exciting new methods, and how to use them in R. \u003cem\u003eCourse material updated in 2021 for second edition of the course textbook.\u003c/em\u003e\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003eOverview of statistical learning\u003c/li\u003e\\n\u003cli\u003eLinear regression\u003c/li\u003e\\n\u003cli\u003eClassification\u003c/li\u003e\\n\u003cli\u003eResampling methods\u003c/li\u003e\\n\u003cli\u003eLinear model selection and regularization\u003c/li\u003e\\n\u003cli\u003eMoving beyond linearity\u003c/li\u003e\\n\u003cli\u003eTree-based methods\u003c/li\u003e\\n\u003cli\u003eSupport vector machines\u003c/li\u003e\\n\u003cli\u003eDeep learning\u003c/li\u003e\\n\u003cli\u003eSurvival modeling\u003c/li\u003e\\n\u003cli\u003eUnsupervised learning\u003c/li\u003e\\n\u003cli\u003eMultiple testing\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerKeys\":[{\"value\":\"StanfordOnline\",\"matchLevel\":\"none\",\"matchedWords\":[]}]}},{\"productUuid\":\"a01716cf-27f7-4f6d-b6fb-88394a3523c1\",\"productName\":\"Graphic Design Essentials\",\"productSlug\":\"learn/graphic-design/lci-education-graphic-design-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/a01716cf-27f7-4f6d-b6fb-88394a3523c1-bd4ca99a6788.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":\"LCI Education\",\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/896c0232-66fb-4b55-8fc1-2c75ba76db4c-05c9ce243e9b.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eThis \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eonline \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003ecourse from LaSalle College Vancouver will introduce you\u003c/span\u003e to the basics of design, graphic and visual communication, image making, typography and the overall creative process, starting from the client mandate to the final presentations.\u003cspan lang=\\\"EN-CA\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eUpon completion, \u003cspan lang=\\\"EN-CA\\\"\u003e you will be able to apply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThis \u003cspan lang=\\\"EN\\\"\u003eshort \u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003ecourse is for anyone looking to build or switch towards a rewarding Graphic Design career. \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eLaSalle\u003cspan lang=\\\"EN-US\\\"\u003e College's graduates have been recognized by the Association of Registered Graphic Designers (RGD), a testament to the excellence we bring to the field of graphic arts.\u003c/span\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAcquire the essential skills to become a working Graphic Designer from the basics of color theory to presenting a project to a client.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eApply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eUse visual language, understand composition, create presentations and communication plans, \u003c/span\u003einterpret and design a visual composition. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eAnalyze a client mandate and develop \u003c/span\u003eideas\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"courseCount\":null,\"locationRestrictions\":null,\"partnerKeys\":[\"LCIEducation\"],\"objectID\":\"6360475000\",\"_highlightResult\":{\"productUuid\":{\"value\":\"a01716cf-27f7-4f6d-b6fb-88394a3523c1\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productName\":{\"value\":\"Graphic Design Essentials\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productSlug\":{\"value\":\"learn/graphic-design/lci-education-graphic-design-essentials\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productImageUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/cdn-cgi/image/width=auto,height=auto,quality=75,format=webp/media/course/image/a01716cf-27f7-4f6d-b6fb-88394a3523c1-bd4ca99a6788.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productType\":{\"value\":\"Course\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"attributes\":[{\"value\":\"Communication\",\"matchLevel\":\"none\",\"matchedWords\":[]}],\"partnerName\":{\"value\":\"LCI Education\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerLogoUrl\":{\"value\":\"https://prod-discovery.edx-cdn.org/organization/logos/896c0232-66fb-4b55-8fc1-2c75ba76db4c-05c9ce243e9b.png\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"fullDescription\":{\"value\":\"\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eThis \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eonline \u003c/span\u003e\u003cspan lang=\\\"EN-CA\\\"\u003ecourse from LaSalle College Vancouver will introduce you\u003c/span\u003e to the basics of design, graphic and visual communication, image making, typography and the overall creative process, starting from the client mandate to the final presentations.\u003cspan lang=\\\"EN-CA\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eUpon completion, \u003cspan lang=\\\"EN-CA\\\"\u003e you will be able to apply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThis \u003cspan lang=\\\"EN\\\"\u003eshort \u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003ecourse is for anyone looking to build or switch towards a rewarding Graphic Design career. \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eLaSalle\u003cspan lang=\\\"EN-US\\\"\u003e College's graduates have been recognized by the Association of Registered Graphic Designers (RGD), a testament to the excellence we bring to the field of graphic arts.\u003c/span\u003e\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"shortDescription\":{\"value\":\"\u003cp\u003eAcquire the essential skills to become a working Graphic Designer from the basics of color theory to presenting a project to a client.\u003c/p\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"productOverview\":{\"value\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eApply the rules of visual language and visual composition to create a meaningful visual design.\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eUse visual language, understand composition, create presentations and communication plans, \u003c/span\u003einterpret and design a visual composition. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-CA\\\"\u003eAnalyze a client mandate and develop \u003c/span\u003eideas\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"matchLevel\":\"none\",\"matchedWords\":[]},\"partnerKeys\":[{\"value\":\"LCIEducation\",\"matchLevel\":\"none\",\"matchedWords\":[]}]}}],\"children\":\"$undefined\"}]\n"])</script><script>self.__next_f.push([1,"5:[null,\"$L2d\"]\n"])</script><script>self.__next_f.push([1,"12:{\"metadata\":[[\"$\",\"title\",\"0\",{\"children\":\"Learn Veeam With Online Courses and Programs | edX\"}],[\"$\",\"meta\",\"1\",{\"name\":\"description\",\"content\":\"Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today.\"}],[\"$\",\"link\",\"2\",{\"rel\":\"canonical\",\"href\":\"https://www.edx.org/learn/veeam\"}],[\"$\",\"meta\",\"3\",{\"property\":\"og:title\",\"content\":\"Learn Veeam With Online Courses and Programs | edX\"}],[\"$\",\"meta\",\"4\",{\"property\":\"og:description\",\"content\":\"Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today.\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:url\",\"content\":\"https://www.edx.org/learn/veeam\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:site_name\",\"content\":\"edX\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:locale\",\"content\":\"EN_US\"}],[\"$\",\"meta\",\"8\",{\"name\":\"twitter:card\",\"content\":\"summary\"}],[\"$\",\"meta\",\"9\",{\"name\":\"twitter:creator\",\"content\":\"@edXOnline\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:title\",\"content\":\"Learn Veeam With Online Courses and Programs | edX\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:description\",\"content\":\"Take online Veeam courses. Learn how to use Veeam to secure your data and advance your IT education and career with edX today.\"}],[\"$\",\"link\",\"12\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"16x16\"}]],\"error\":null,\"digest\":\"$undefined\"}\nc:{\"metadata\":\"$12:metadata\",\"error\":null,\"digest\":\"$undefined\"}\n"])</script><script>self.__next_f.push([1,"2f:I[58604,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n30:I[55221,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chun"])</script><script>self.__next_f.push([1,"ks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n32:I[70540,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n33:I[45220,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f5"])</script><script>self.__next_f.push([1,"06444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n34:I[73766,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n35:I[10549,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\","])</script><script>self.__next_f.push([1,"\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"Accordion\"]\n36:I[10549,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"AccordionItem\"]\n37:I[10549,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/"])</script><script>self.__next_f.push([1,"chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"AccordionTrigger\"]\n38:I[10549,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"AccordionContent\"]\n2e:T1333,"])</script><script>self.__next_f.push([1,"{\"@context\":\"https://schema.org\",\"@type\":\"ItemList\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"url\":\"https://www.edx.org/learn/software-development/ibm-software-programming-and-database-basics\"},{\"@type\":\"ListItem\",\"position\":2,\"url\":\"https://www.edx.org/learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications\"},{\"@type\":\"ListItem\",\"position\":3,\"url\":\"https://www.edx.org/learn/operating-systems/ibm-hardware-and-operating-systems\"},{\"@type\":\"ListItem\",\"position\":4,\"url\":\"https://www.edx.org/learn/information-technology/the-georgia-institute-of-technology-information-and-communication-technology-ict-accessibility\"},{\"@type\":\"ListItem\",\"position\":5,\"url\":\"https://www.edx.org/certificates/professional-certificate/ibm-information-technology-support\"},{\"@type\":\"ListItem\",\"position\":6,\"url\":\"https://www.edx.org/learn/information-technology/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-hardware\"},{\"@type\":\"ListItem\",\"position\":7,\"url\":\"https://www.edx.org/learn/computer-science/amazon-web-services-introduction-to-information-technology-and-aws-cloud\"},{\"@type\":\"ListItem\",\"position\":8,\"url\":\"https://www.edx.org/learn/economics/the-international-monetary-fund-cyber-risk-security\"},{\"@type\":\"ListItem\",\"position\":9,\"url\":\"https://www.edx.org/learn/information-systems/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-enterprise-systems\"},{\"@type\":\"ListItem\",\"position\":10,\"url\":\"https://www.edx.org/learn/computer-programming/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-programming\"},{\"@type\":\"ListItem\",\"position\":11,\"url\":\"https://www.edx.org/learn/software-development/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-software-development\"},{\"@type\":\"ListItem\",\"position\":12,\"url\":\"https://www.edx.org/learn/war-and-conflict/the-university-of-queensland-global-media-war-and-technology\"},{\"@type\":\"ListItem\",\"position\":13,\"url\":\"https://www.edx.org/learn/data-analysis/rochester-institute-of-technology-data-analytics-and-visualization-in-health-care\"},{\"@type\":\"ListItem\",\"position\":14,\"url\":\"https://www.edx.org/learn/teacher-training/raspberry-pi-foundation-teach-kids-computing-computing-systems-and-networks\"},{\"@type\":\"ListItem\",\"position\":15,\"url\":\"https://www.edx.org/learn/tourism-management/the-hong-kong-polytechnic-university-innovation-and-technology-management-in-tourism-and-hospitality\"},{\"@type\":\"ListItem\",\"position\":16,\"url\":\"https://www.edx.org/learn/health-informatics/israelx-health-informatics-for-better-and-safer-healthcare\"},{\"@type\":\"ListItem\",\"position\":17,\"url\":\"https://www.edx.org/learn/globalization/columbia-university-freedom-of-expression-and-information-in-the-time-of-globalization-advanced-course\"},{\"@type\":\"ListItem\",\"position\":18,\"url\":\"https://www.edx.org/certificates/professional-certificate/dartmouth-imtx-c-programming-with-linux\"},{\"@type\":\"ListItem\",\"position\":19,\"url\":\"https://www.edx.org/certificates/professional-certificate/uwashingtonx-it-project-management\"},{\"@type\":\"ListItem\",\"position\":20,\"url\":\"https://www.edx.org/certificates/professional-certificate/upvalenciax-it-fundamentals-for-business-professionals\"},{\"@type\":\"ListItem\",\"position\":21,\"url\":\"https://www.edx.org/certificates/professional-certificate/usmx-championing-the-digital-enterprise\"},{\"@type\":\"ListItem\",\"position\":22,\"url\":\"https://www.edx.org/masters/micromasters/doanex-healthcare-administration\"},{\"@type\":\"ListItem\",\"position\":23,\"url\":\"https://www.edx.org/bachelors/information-science-usc-sl\"},{\"@type\":\"ListItem\",\"position\":24,\"url\":\"https://www.edx.org/certificate/maryville-university-undergraduate-certificate-in-data-science\"},{\"@type\":\"ListItem\",\"position\":25,\"url\":\"https://www.edx.org/certificate/maryville-university-post-baccalaureate-certificate-in-big-data\"},{\"@type\":\"ListItem\",\"position\":26,\"url\":\"https://www.edx.org/masters/maryville-university-master-of-arts-in-management-and-leadership\"},{\"@type\":\"ListItem\",\"position\":27,\"url\":\"https://www.edx.org/learn/web-accessibility/the-world-wide-web-consortium-w3c-introduction-to-web-accessibility\"},{\"@type\":\"ListItem\",\"position\":28,\"url\":\"https://www.edx.org/learn/gis-geographic-information-systems/university-of-alaska-fairbanks-gis-foundations\"},{\"@type\":\"ListItem\",\"position\":29,\"url\":\"https://www.edx.org/learn/technology/ibm-technical-support-basics-for-everyone\"},{\"@type\":\"ListItem\",\"position\":30,\"url\":\"https://www.edx.org/learn/c-programming/dartmouth-college-c-programming-language-foundations\"},{\"@type\":\"ListItem\",\"position\":31,\"url\":\"https://www.edx.org/learn/drones/wageningen-university-research-drones-for-agriculture-prepare-and-design-your-drone-uav-mission\"},{\"@type\":\"ListItem\",\"position\":32,\"url\":\"https://www.edx.org/learn/it-support/ibm-it-support-case-studies\"}]}"])</script><script>self.__next_f.push([1,"2d:[[\"$\",\"$L22\",null,{\"searchParams\":{},\"postId\":417,\"cmsUrl\":\"https://cms.edx.org\"}],[\"$\",\"$L23\",null,{\"course\":\"$undefined\",\"navigation\":\"$21:1:props:navigation\",\"activeBanner\":{\"backgroundColor\":\"blue\",\"backgroundColorEs\":\"blue\",\"content\":[\"Unlock the future — join us for a worldwide AI learning event April 8 and \",[\"$\",\"b\",\"1\",{\"children\":\"earn a free Microsoft certificate\"}],\". \",[\"$\",\"a\",\"3\",{\"href\":\"https://www.edx.org/microsoft-ai-skills-fest\",\"className\":\"underline text-inherit\",\"children\":\"Learn more\"}],\".\"],\"contentEs\":[\"Desbloquea el futuro: únete a nuestro evento de aprendizaje de IA el 8 de abril y obtén un certificado gratuito de Microsoft. \",[\"$\",\"a\",\"1\",{\"href\":\"https://www.edx.org/microsoft-ai-skills-fest\",\"className\":\"underline text-inherit\",\"children\":\"Más información\"}],\".\"],\"campaignId\":\"microsoft-ai-skills-fest-en\",\"campaignIdEs\":\"microsoft-ai-skills-fest-es\"},\"program\":\"$undefined\"}],[\"$\",\"div\",null,{\"style\":{\"minHeight\":50},\"children\":[[[\"$\",\"script\",\"0\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n {\\n \\\"@context\\\": \\\"https://schema.org\\\",\\n \\\"@type\\\" : \\\"Organization\\\",\\n \\\"name\\\" : \\\"edX\\\",\\n \\\"url\\\" : \\\"https://www.edx.org\\\",\\n \\\"logo\\\": \\\"/images/logos/edx-logo-elm.svg\\\",\\n \\\"sameAs\\\" : [\\n \\\"https://www.facebook.com/edX\\\",\\n \\\"https://twitter.com/edXOnline\\\",\\n \\\"https://www.linkedin.com/company/edx\\\",\\n \\\"http://www.instagram.com/edxonline\\\",\\n \\\"https://www.youtube.com/user/edxonline\\\"\\n ]\\n }\\n \"}}],[\"$\",\"script\",\"1\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"{\\\"@context\\\":\\\"https://schema.org\\\",\\\"@type\\\":\\\"BreadcrumbList\\\",\\\"itemListElement\\\":[{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":1,\\\"name\\\":\\\"Home\\\",\\\"item\\\":\\\"https://www.edx.org/\\\"},{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":2,\\\"name\\\":\\\"Learn\\\",\\\"item\\\":\\\"https://www.edx.org/learn\\\"},{\\\"@type\\\":\\\"ListItem\\\",\\\"position\\\":3,\\\"name\\\":\\\"Veeam\\\"}]}\"}}],[\"$\",\"script\",\"2\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"[{\\\"@context\\\":\\\"https://schema.org\\\",\\\"@type\\\":\\\"WebSite\\\",\\\"url\\\":\\\"https://www.edx.org/learn/veeam\\\",\\\"name\\\":\\\"Learn Veeam With Online Courses and Programs\\\",\\\"alternateName\\\":\\\"edX Online\\\"}]\"}}],[\"$\",\"script\",\"3\",{\"type\":\"application/ld+json\",\"dangerouslySetInnerHTML\":{\"__html\":\"$2e\"}}]],[\"$\",\"main\",null,{\"id\":\"page-id-417\",\"children\":[\"$\",\"article\",null,{\"className\":\"container prose mt-8 md:mt-auto\",\"children\":[[[\"$\",\"$L17\",\"0\",{\"pagetype\":\"learn-more\",\"children\":[]}]],[[\"$\",\"$L2f\",\"1\",{\"variant\":\"no-image\",\"theme\":\"secondary\",\"titleOverride\":\"Learn Veeam with online courses and programs\",\"title\":\"Learn Veeam With Online Courses and Programs\",\"path\":\"learn/veeam\",\"image\":\"$undefined\",\"subnavItems\":[{\"id\":\"browse-online-veeam-courses\",\"name\":\"Browse online Veeam courses\"},{\"id\":\"explore-jobs-that-use-veeam\",\"name\":\"Explore jobs that use Veeam\"},{\"id\":\"veeam-f-a-q\",\"name\":\"Veeam FAQ\"}],\"children\":[\"$\",\"p\",null,{\"className\":\"mb-8\",\"children\":\"With in-depth Veeam tutorials, you can build a robust knowledge base of the data management platform and its unique use cases. Discover how to learn Veeam with edX today.\"}],\"location\":\"learn-header\",\"htmlId\":\"create-account-button\",\"hasBreadcrumbs\":\"$undefined\",\"showSlantStripe\":\"$undefined\",\"slant\":\"$undefined\",\"titleClassName\":\"$undefined\"}]],[[\"$\",\"div\",\"2\",{\"className\":\"flex flex-wrap py-12\",\"children\":[\"$\",\"div\",null,{\"children\":[[\"$\",\"img\",\"0\",{\"loading\":\"lazy\",\"decoding\":\"async\",\"className\":\"hidden lg:block float-right ml-4 mb-4\",\"src\":\"https://images.ctfassets.net/ii9ehdcj88bc/40gRkTcppcpHFWSn4fvkhg/133ea1467b694f6eb4332094c89916b5/Veeam.png\",\"alt\":\"Veeam | Introduction Image Description\",\"width\":\"435\",\"height\":\"245\",\"children\":\"$undefined\"}],[\"$\",\"h2\",\"1\",{\"children\":[\"$\",\"b\",null,{\"children\":\"What is Veeam?\"}]}],[\"$\",\"p\",\"2\",{\"children\":\"Veeam is a software platform that offers tools for backup, anti-malware protection, analytics, and disaster recovery. To enhance IT security, Veeam can provide real-time system monitoring, with proactive alerts and automated remediation. In cases of data loss or security breaches, Veeam can help users restore system integrity via its backup and data recovery tools.\"}],[\"$\",\"p\",\"3\",{\"children\":[\"Veeam software can be deployed within physical and virtual environments, as well as cloud infrastructures. These features allow companies to manage their data in ways that fit their individual needs, so Veeam can be used across a variety of industries, from small businesses to the federal government.\",[\"$\",\"sup\",\"1\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#42diVNJteGg4j7iL2LBZzD\",\"children\":\"1\"}]}]]}]]}]}]],[[\"$\",\"div\",\"3\",{\"className\":\"fullwidth bg-putty-100\",\"children\":[[\"$\",\"$L30\",\"0\",{\"theme\":\"gray\",\"children\":[]}],[\"$\",\"a\",\"1\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Browse online Veeam courses\",\"id\":\"browse-online-veeam-courses\",\"children\":\"$undefined\"}],\"$L31\",[\"$\",\"div\",\"3\",{\"className\":\"pt-0 pb-6 fullwidth bg-putty-100\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"mb-8 mt-0 text-2xl\",\"children\":\"Related Topics\"}],[\"$\",\"div\",null,{\"className\":\"flex gap-3 overflow-x-auto scroll-smooth not-prose\",\"children\":[\"$\",\"$L18\",null,{\"children\":[[\"$\",\"$L32\",\".$0\",{\"href\":\"/learn/information-technology\",\"text\":\"Information Technology\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"information technology\",\"position\":\"1\"}],[\"$\",\"$L32\",\".$1\",{\"href\":\"/learn/computer-science\",\"text\":\"Computer Science\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"computer science\",\"position\":\"2\"}],[\"$\",\"$L32\",\".$2\",{\"href\":\"/learn/information-systems\",\"text\":\"Information Systems\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"information systems\",\"position\":\"3\"}],[\"$\",\"$L32\",\".$3\",{\"href\":\"/learn/cloud-computing\",\"text\":\"Cloud Computing\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"cloud computing\",\"position\":\"4\"}],[\"$\",\"$L32\",\".$4\",{\"href\":\"/learn/coding\",\"text\":\"Coding\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"coding\",\"position\":\"5\"}],[\"$\",\"$L32\",\".$5\",{\"href\":\"/learn/windows-10-security\",\"text\":\"Windows 10 Security\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"windows 10 security\",\"position\":\"6\"}],[\"$\",\"$L32\",\".$6\",{\"href\":\"/learn/hackerone\",\"text\":\"HackerOne\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"hackerone\",\"position\":\"7\"}],[\"$\",\"$L32\",\".$7\",{\"href\":\"/learn/data-science\",\"text\":\"Data Science\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"data science\",\"position\":\"8\"}],[\"$\",\"$L32\",\".$8\",{\"href\":\"/learn/operating-systems\",\"text\":\"Operating Systems\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"operating systems\",\"position\":\"9\"}],[\"$\",\"$L32\",\".$9\",{\"href\":\"/learn/design\",\"text\":\"Design\",\"html_id\":\"topic-link\",\"location\":\"related-topics\",\"class_name\":\"bg-background text-primary text-xs border-[.0625rem] border-putty-light px-2 py-1 rounded-[0.4375rem] whitespace-nowrap hover:text-white hover:bg-primary\",\"name\":\"design\",\"position\":\"10\"}]]}]}],[\"$\",\"div\",null,{\"className\":\"pt-4\",\"children\":[\"$\",\"$L18\",null,{\"children\":[\"$\",\"$L32\",null,{\"href\":\"/learn\",\"text\":\"View all topics\",\"html_id\":\"view-all-topics-link\",\"location\":\"related-topics\",\"class_name\":\"text-gray-dark text-sm underline hover:text-[1f1f1f]\"}]}]}]]}],[\"$\",\"div\",\"4\",{\"className\":\"flex flex-col gap-2 pb-10\",\"children\":[[\"$\",\"$L33\",\"0\",{\"id\":\"$undefined\",\"children\":[\"$\",\"div\",null,{\"id\":\"\",\"children\":[[\"$\",\"h3\",\"0\",{\"children\":[\"$\",\"b\",null,{\"children\":\"Why use Veeam?\"}]}],[\"$\",\"p\",\"1\",{\"children\":[\"You can use Veeam to handle your system’s backups on a regular schedule and at scale. This way, you won’t worry about falling behind even as your operations grow. You can reap several other benefits using Veeam software, including:\",[\"$\",\"sup\",\"1\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#52NPOHZ9jKDxkBpMMcZTME\",\"children\":\"2\"}]}]]}],[\"$\",\"p\",\"2\",{\"children\":\"$undefined\"}],[\"$\",\"ul\",\"3\",{\"children\":[[\"$\",\"li\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Backup and recovery for physical, virtual, and cloud systems.\"}]}],[\"$\",\"li\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Monitoring and analytics in real-time with Veeam ONE.\"}]}],[\"$\",\"li\",\"2\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Cloud mobility, with native support for major platforms like Google Cloud, Azure, and AWS. \"}]}],[\"$\",\"li\",\"3\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Ransomware and data security with backups that let you restore your systems to the latest healthy state in the event of a breach or malware attack. \"}]}],[\"$\",\"li\",\"4\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Disaster recovery for events such as fires, floods, hurricanes, etc.\"}]}],[\"$\",\"li\",\"5\",{\"children\":[\"$\",\"p\",null,{\"children\":\"Data reuse, with backups that allow you to repurpose your data in other environments.\"}]}]]}],[\"$\",\"p\",\"4\",{\"children\":\"$undefined\"}],[\"$\",\"h3\",\"5\",{\"children\":[\"$\",\"b\",null,{\"children\":\"Veeam tutorial curriculum\"}]}],[\"$\",\"p\",\"6\",{\"children\":\"Veeam courses will likely start with the basics, like learning what Veeam is and how to download and install Veeam. These beginner courses could also include an introduction to the different features and products across the platform, such as Veeam Backup and Replication, Veeam Community Edition, Enterprise Manager, ONE, Orchestrator, and Data Platform Essentials.\"}],[\"$\",\"p\",\"7\",{\"children\":\"$undefined\"}],[\"$\",\"p\",\"8\",{\"children\":\"At advanced levels, you can learn about Veeam Agent job configurations for backups and restorations, as well as the implementation and execution of disaster recovery operations from start to finish. Ultimately, Veeam tutorials can teach you how to configure and maintain a full data management system that can also integrate with other supported services.\"}],[\"$\",\"p\",\"9\",{\"children\":\"$undefined\"}],[\"$\",\"p\",\"10\",{\"children\":[\"Expand your knowledge of IT with edX. Discover a wide range of learning formats to accommodate your preferences, including accelerated \",[\"$\",\"span\",\"1\",{\"data-boot-camp-link\":\"https://www.edx.org/boot-camps\",\"children\":\"boot camps\"}],\" and comprehensive \",[\"$\",\"a\",\"3\",{\"className\":\"text-link underline\",\"href\":\"https://www.edx.org/bachelors/\",\"children\":\"bachelor’s degree\"}],\" programs. For more advanced learners, pursuing a \",[\"$\",\"a\",\"5\",{\"className\":\"text-link underline\",\"href\":\"https://www.edx.org/masters\",\"children\":\"master’s degree\"}],\" may be the goal, while busy professionals in leadership positions may benefit from \",[\"$\",\"a\",\"7\",{\"className\":\"text-link underline\",\"href\":\"https://www.edx.org/executive-education\",\"children\":\"executive education courses\"}],\".\"]}]]}]}],[\"$\",\"a\",\"1\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Explore jobs that use Veeam\",\"id\":\"explore-jobs-that-use-veeam\",\"children\":\"$undefined\"}],[\"$\",\"$L33\",\"2\",{\"id\":\"$undefined\",\"children\":[\"$\",\"div\",null,{\"id\":\"\",\"children\":[[\"$\",\"h2\",\"0\",{\"children\":[\"$\",\"b\",null,{\"children\":\"Explore jobs that use Veeam\"}]}],[\"$\",\"p\",\"1\",{\"children\":\"Many jobs that can use Veeam will often take advantage of its backup features. These roles can include:\"}],[\"$\",\"p\",\"2\",{\"children\":\"$undefined\"}],[\"$\",\"ul\",\"3\",{\"children\":[[\"$\",\"li\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Database administrator:\"}],\" Ensures the company’s information and records are secure and up to date.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#1TyUfpLQEWEhDuaiMG4nPU\",\"children\":\"3\"}]}]]}]}],[\"$\",\"li\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"System administrator:\"}],\" Oversees a company’s hardware and software assets to ensure they’re available when needed without downtime.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#6859NNRow1u0fYjRfc6mhm\",\"children\":\"4\"}]}]]}]}],[\"$\",\"li\",\"2\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Data center system engineer:\"}],\" Builds and diagnoses issues within a company’s data center, especially on in-house infrastructure.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#7GQMLi604AKTGt9QPYthnY\",\"children\":\"5\"}]}]]}]}],[\"$\",\"li\",\"3\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"Network administrator:\"}],\" Configures, maintains, and upgrades a company’s computer network.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#2zvjrbNH8qFo3OjRSr2N1T\",\"children\":\"6\"}]}]]}]}],[\"$\",\"li\",\"4\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"b\",\"0\",{\"children\":\"IT support technician:\"}],\" Helps a company’s staff work with the technology.\",[\"$\",\"sup\",\"2\",{\"children\":[\"$\",\"a\",null,{\"href\":\"#426fGKIZCv2eRiaxKvsokW\",\"children\":\"7\"}]}]]}]}]]}],[\"$\",\"p\",\"4\",{\"children\":\"$undefined\"}],[\"$\",\"p\",\"5\",{\"children\":\"Veeam has also started to focus on addressing the threat of ransomware, so you can learn Veeam and pursue a career in cybersecurity if the field interests you.\"}],[\"$\",\"p\",\"6\",{\"children\":\"$undefined\"}],[\"$\",\"p\",\"7\",{\"children\":[\"Each of these roles will have different education and skills requirements. For example, you may be able to build relevant skills in a \",[\"$\",\"span\",\"1\",{\"data-boot-camp-link\":\"https://www.edx.org/boot-camps/cybersecurity\",\"children\":\"cybersecurity bootcamp\"}],\" or develop your programming skills in a \",[\"$\",\"span\",\"3\",{\"data-boot-camp-link\":\"https://www.edx.org/boot-camps/coding\",\"children\":\"coding boot camp\"}],\".\"]}]]}]}]]}],[\"$\",\"$L34\",\"5\",{\"theme\":\"gradient\",\"children\":[],\"columns\":4}],[\"$\",\"a\",\"6\",{\"className\":\"subnav-item -mt-1\",\"name\":\"Veeam FAQ\",\"id\":\"veeam-f-a-q\",\"children\":\"$undefined\"}],[\"$\",\"$1\",\"7\",{\"children\":[[\"$\",\"a\",null,{\"className\":\"subnav-item\",\"id\":\"frequently-asked-questions\"}],[\"$\",\"div\",null,{\"className\":\"flex flex-col py-4 lg:pt-16\",\"children\":[[\"$\",\"h2\",null,{\"className\":\"mt-2 mb-4 text-3xl font-bold \",\"children\":\"Frequently Asked Questions\"}],[\"$\",\"$L35\",null,{\"type\":\"multiple\",\"className\":\"flex flex-col gap-3 [\u0026_button]:no-underline [\u0026_button]:text-gray-dark [\u0026_button:hover]:text-gray-dark\",\"children\":[[\"$\",\"$L36\",\".$0\",{\"value\":\"What is Veeam Backup?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L37\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What is Veeam Backup?\"}]]}],[\"$\",\"$L38\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Veeam Backup, available with the company’s flagship Veeam Backup and Replication software, is a data management and security solution. It creates image-level backups of physical, virtual, and cloud machines that the company can restore later if it needs to. It also works with network-attached storage (NAS) systems and functions at scale, which means it's able to adapt to any company size.\"}]}]]}],[\"$\",\"$L36\",\".$2\",{\"value\":\"What is Veeam ONE?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L37\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What is Veeam ONE?\"}]]}],[\"$\",\"$L38\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Veeam ONE is the platform’s proactive monitoring and analytics solution. It conducts real-time system analysis with predefined alarms for different events, which include possible symptoms of ransomware. It also issues detailed reports on trends and usage that let you know more about the status of your system. It has automatic response capabilities to resolve common backup issues with predefined actions or custom ones that you can script and tie to any alarm.\"}]}]]}],[\"$\",\"$L36\",\".$4\",{\"value\":\"What does Veeam do?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L37\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"What does Veeam do?\"}]]}],[\"$\",\"$L38\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Veeam is a data management platform that creates backups of on-site and cloud workloads. It can handle different types of backups that companies choose based on what they feel they should secure. An image-level backup images the entire system, a volume-level backup images a section or partition, and a file-level backup images specified items.\"}]}]]}],[\"$\",\"$L36\",\".$6\",{\"value\":\"Are Veeam and VMware the same?\",\"className\":\"AccordionTextItem_item__adF2E AccordionTextItem_item__adF2E\",\"children\":[[\"$\",\"$L37\",null,{\"className\":\"AccordionTextItem_trigger__CiZ_J AccordionTextItem_trigger__CiZ_J\",\"children\":[false,[\"$\",\"span\",null,{\"children\":\"Are Veeam and VMware the same?\"}]]}],[\"$\",\"$L38\",null,{\"className\":\"AccordionTextItem_content__G0vl3 AccordionTextItem_content__G0vl3\",\"children\":[\"$\",\"p\",null,{\"children\":\"Veeam and VMware are not the same: Veeam provides data backup services, whereas VMware’s main product allows users to create virtual machines that run on Linux and Windows servers. The two companies are partners, and Veeam works well with VMware because it’s storage-agnostic and software-defined.\"}]}]]}]]}]]}]]}],[\"$\",\"ol\",\"8\",{\"children\":[[\"$\",\"li\",\"0\",{\"id\":\"42diVNJteGg4j7iL2LBZzD\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.veeam.com/solutions/industry/government/solutions.html\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Data Backup \u0026 Protection for U.S. Federal Government\"}],\". (2023). \",[\"$\",\"i\",\"2\",{\"children\":\"Veeam\"}],\".\",[\"$\",\"i\",\"4\",{\"children\":\"$undefined\"}],\"Retrieved April 11, 2023.\"]}]}],[\"$\",\"li\",\"1\",{\"id\":\"52NPOHZ9jKDxkBpMMcZTME\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.veeam.com/data-protection-platform.html\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Data Protection and Management Solutions\"}],\". (2023). \",[\"$\",\"i\",\"2\",{\"children\":\"Veeam. \"}],\"Retrieved May 11, 2023.\"]}]}],[\"$\",\"li\",\"2\",{\"id\":\"1TyUfpLQEWEhDuaiMG4nPU\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/database-administrators.htm\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Database Administrators and Architects\"}],\". (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics\"}],\".\",[\"$\",\"i\",\"4\",{\"children\":\"$undefined\"}],\"Retrieved April 28, 2023.\"]}]}],[\"$\",\"li\",\"3\",{\"id\":\"6859NNRow1u0fYjRfc6mhm\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Network and Computer Systems Administrators\"}],\". (2023). \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics\"}],\".\",[\"$\",\"i\",\"4\",{\"children\":\"$undefined\"}],\"Retrieved April 28, 2023.\"]}]}],[\"$\",\"li\",\"4\",{\"id\":\"7GQMLi604AKTGt9QPYthnY\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/database-administrators.htm\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Database Administrators and Architects\"}],\". (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics\"}],\".\",[\"$\",\"i\",\"4\",{\"children\":\"$undefined\"}],\"Retrieved April 28, 2023.\"]}]}],[\"$\",\"li\",\"5\",{\"id\":\"2zvjrbNH8qFo3OjRSr2N1T\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Network and Computer Systems Administrators\"}],\". (2023). \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics\"}],\".\",[\"$\",\"i\",\"4\",{\"children\":\"$undefined\"}],\"Retrieved April 28, 2023.\"]}]}],[\"$\",\"li\",\"6\",{\"id\":\"426fGKIZCv2eRiaxKvsokW\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"a\",\"0\",{\"className\":\"text-link underline external\",\"href\":\"https://www.bls.gov/ooh/computer-and-information-technology/computer-support-specialists.htm\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":\"Computer Support Specialists\"}],\". (2022). \",[\"$\",\"i\",\"2\",{\"children\":\"U.S. Bureau of Labor Statistics. \"}],\"Retrieved April 28, 2023.\"]}]}]]}]]}]]]}]}]]}],[\"$\",\"div\",null,{\"className\":\"bg-primary text-primary-foreground pt-16\",\"children\":[\"$\",\"footer\",null,{\"className\":\"flex justify-between max-w-screen-xl mx-auto px-4 pb-4 \",\"children\":[\"$\",\"div\",null,{\"className\":\"flex flex-col w-full\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap justify-between mb-6 w-full\",\"children\":[[\"$\",\"$L24\",null,{\"href\":\"/\",\"className\":\"mb-6\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/trademark-logos/edx-by-2u-white.svg\",\"alt\":\"edX homepage\",\"title\":\"edX homepage\",\"width\":127,\"height\":67,\"className\":\"optanon-category-C0001\",\"data-ot-ignore\":true}]}],[\"$\",\"div\",null,{\"children\":[\"$\",\"div\",null,{\"className\":\"mb-4 justify-center flex flex-row\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.facebook.com/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Facebook page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"32\",\"height\":\"32\",\"viewBox\":\"0 0 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M14 13.5h2.5l1-4H14v-2c0-1.03 0-2 2-2h1.5V2.14c-.326-.043-1.557-.14-2.857-.14C11.928 2 10 3.657 10 6.7v2.8H7v4h3V22h4v-8.5z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"1\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://x.com/edXOnline\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our X page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"48\",\"height\":\"48\",\"viewBox\":\"0 0 48 48\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M21.2144 25.4036L12.2784 35.5671H14.3952L22.1576 26.7441L28.3528 35.5671H35.5L26.1296 22.2239L35.5 11.5671H33.3832L25.1912 20.8866L18.6472 11.5671H11.5M32.6192 34.0052H29.3672L14.3968 13.0523H17.6496\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"2\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.linkedin.com/school/edx/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our LinkedIn page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"20\",\"height\":\"20\",\"viewBox\":\"0 0 20 20\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"fill-rule\":\"evenodd\",\"clip-rule\":\"evenodd\",\"d\":\"M19.959 11.719v7.379h-4.278v-6.885c0-1.73-.619-2.91-2.167-2.91-1.182 0-1.886.796-2.195 1.565-.113.275-.142.658-.142 1.043v7.187h-4.28s.058-11.66 0-12.869h4.28v1.824l-.028.042h.028v-.042c.568-.875 1.583-2.126 3.856-2.126 2.815 0 4.926 1.84 4.926 5.792zM2.421.026C.958.026 0 .986 0 2.249c0 1.235.93 2.224 2.365 2.224h.028c1.493 0 2.42-.989 2.42-2.224C4.787.986 3.887.026 2.422.026zM.254 19.098h4.278V6.229H.254v12.869z\",\"fill\":\"currentColor\"}]}]}]}]}],[\"$\",\"div\",\"3\",{\"className\":\"mx-2 flex flex-col\",\"children\":[\"$\",\"a\",null,{\"href\":\"https://www.reddit.com/r/edX/\",\"target\":\"_blank\",\"role\":\"button\",\"aria-label\":\"Visit our Reddit page\",\"children\":[\"$\",\"div\",null,{\"className\":\"flex text-primary bg-white border border-solid border-primary h-12 w-12 items-center justify-center rounded-full\",\"children\":[\"$\",\"svg\",null,{\"width\":\"40\",\"height\":\"40\",\"viewBox\":\"-2 -2 24 24\",\"fill\":\"none\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"role\":\"img\",\"focusable\":false,\"aria-hidden\":true,\"children\":[\"$\",\"path\",null,{\"d\":\"M18 10.1c0-1-.8-1.8-1.8-1.7-.4 0-.9.2-1.2.5-1.4-.9-3-1.5-4.7-1.5l.8-3.8 2.6.6c0 .7.6 1.2 1.3 1.2.7 0 1.2-.6 1.2-1.3 0-.7-.6-1.2-1.3-1.2-.5 0-.9.3-1.1.7L11 2.9h-.2c-.1 0-.1.1-.1.2l-1 4.3C8 7.4 6.4 7.9 5 8.9c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5c.1.1.3.3.5.3v.5c0 2.7 3.1 4.9 7 4.9s7-2.2 7-4.9v-.5c.6-.3 1-.9 1-1.6zM6 11.4c0-.7.6-1.2 1.2-1.2.7 0 1.2.6 1.2 1.2s-.6 1.2-1.2 1.2c-.7 0-1.2-.5-1.2-1.2zm7 3.3c-.9.6-1.9 1-3 .9-1.1 0-2.1-.3-3-.9-.1-.1-.1-.3 0-.5.1-.1.3-.1.4 0 .7.5 1.6.8 2.5.7.9.1 1.8-.2 2.5-.7.1-.1.3-.1.5 0s.2.3.1.5zm-.3-2.1c-.7 0-1.2-.6-1.2-1.2s.6-1.2 1.2-1.2c.7 0 1.2.6 1.2 1.2.1.7-.5 1.2-1.2 1.2z\",\"fill\":\"currentColor\"}]}]}]}]}]]}]}]]}],false,[\"$\",\"div\",null,{\"className\":\"my-6\",\"children\":[[\"$\",\"div\",null,{\"className\":\"flex flex-wrap md:flex-nowrap justify-between\",\"children\":[[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Browse Courses\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Learn AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/artificial-intelligence\",\"children\":\"Learn AI\"}]}],[\"$\",\"li\",\"Learn ChatGPT\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/chatgpt\",\"children\":\"Learn ChatGPT\"}]}],[\"$\",\"li\",\"Learn Spanish\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/spanish\",\"children\":\"Learn Spanish\"}]}],[\"$\",\"li\",\"Learn Python\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/python\",\"children\":\"Learn Python\"}]}],[\"$\",\"li\",\"Learn Excel\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/excel\",\"children\":\"Learn Excel\"}]}],[\"$\",\"li\",\"Learn Software Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/software-engineering\",\"children\":\"Learn Software Engineering\"}]}],[\"$\",\"li\",\"Learn Blockchain\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/blockchain\",\"children\":\"Learn Blockchain\"}]}],[\"$\",\"li\",\"Learn Computer Programming\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/computer-programming\",\"children\":\"Learn Computer Programming\"}]}],[\"$\",\"li\",\"Learn Economics\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/economics\",\"children\":\"Learn Economics\"}]}],[\"$\",\"li\",\"Learn Architecture\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/architecture\",\"children\":\"Learn Architecture\"}]}],[\"$\",\"li\",\"Learn Project Management\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/project-management\",\"children\":\"Learn Project Management\"}]}],[\"$\",\"li\",\"Learn Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/learn/business-administration\",\"children\":\"Learn Business Administration\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Courses\",{\"href\":\"/learn\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Courses\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"step-by-step guides\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Become a Cybersecurity Analyst\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-cybersecurity-analyst\",\"children\":\"Become a Cybersecurity Analyst\"}]}],[\"$\",\"li\",\"Become a Data Scientist\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-data-scientist\",\"children\":\"Become a Data Scientist\"}]}],[\"$\",\"li\",\"Become a Social Media Manager\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-social-media-manager\",\"children\":\"Become a Social Media Manager\"}]}],[\"$\",\"li\",\"Become a Software Developer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-developer\",\"children\":\"Become a Software Developer\"}]}],[\"$\",\"li\",\"Become a Software Engineer\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/become/how-to-become-a-software-engineer-without-a-degree\",\"children\":\"Become a Software Engineer\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Guides\",{\"href\":\"/become\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Guides\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Complete your bachelor's online\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Bachelor's in Business\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/business\",\"children\":\"Bachelor's in Business\"}]}],[\"$\",\"li\",\"Bachelor's in Computer Science / Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/computer-data-sciences\",\"children\":\"Bachelor's in Computer Science / Data Science\"}]}],[\"$\",\"li\",\"Bachelor's in Health and Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/health-social-services\",\"children\":\"Bachelor's in Health and Nursing\"}]}],[\"$\",\"li\",\"Bachelor's in Accounting\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-accounting-bachelor-degree\",\"children\":\"Bachelor's in Accounting\"}]}],[\"$\",\"li\",\"Bachelor's in Finance\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/online-bachelors-degree-finance\",\"children\":\"Bachelor's in Finance\"}]}],[\"$\",\"li\",\"Bachelor's in Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/psychology\",\"children\":\"Bachelor's in Psychology\"}]}],[\"$\",\"li\",\"Bachelor's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/bachelors-in-public-health-online\",\"children\":\"Bachelor's in Public Health\"}]}],[\"$\",\"li\",\"Bachelor's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/bachelors/social-work-bsw\",\"children\":\"Bachelor's in Social Work\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Undergraduate Degrees\",{\"href\":\"/bachelors\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Undergraduate Degrees\"}]]}]]}],[\"$\",\"div\",null,{\"className\":\"mr-12 mb-6 grow\",\"children\":[[\"$\",\"span\",null,{\"className\":\"uppercase font-roboto text-[1rem] font-normal text-left pb-6\",\"children\":\"Earn your online graduate degree\"}],[\"$\",\"ul\",null,{\"className\":\"my-6 list-none\",\"children\":[[\"$\",\"li\",\"Master's in Business Administration\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-mba\",\"children\":\"Master's in Business Administration\"}]}],[\"$\",\"li\",\"Master's in Public Health\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-public-health-online\",\"children\":\"Master's in Public Health\"}]}],[\"$\",\"li\",\"Master's in Social Work\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msw-programs\",\"children\":\"Master's in Social Work\"}]}],[\"$\",\"li\",\"Master's in Nursing\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-msn-programs\",\"children\":\"Master's in Nursing\"}]}],[\"$\",\"li\",\"Master's in Data Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-data-science\",\"children\":\"Master's in Data Science\"}]}],[\"$\",\"li\",\"Master's in Engineering\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-engineering\",\"children\":\"Master's in Engineering\"}]}],[\"$\",\"li\",\"Master's in Speech Pathology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Speech Pathology\"}]}],[\"$\",\"li\",\"Master's in Counseling/Psychology\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-slp-programs\",\"children\":\"Master's in Counseling/Psychology\"}]}],[\"$\",\"li\",\"Master's Degree in Healthcare\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/healthcare\",\"children\":\"Master's Degree in Healthcare\"}]}],[\"$\",\"li\",\"Master's Degree in Education\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/masters-in-education-online\",\"children\":\"Master's Degree in Education\"}]}],[\"$\",\"li\",\"Master's Degree in AI\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-artificial-intelligence\",\"children\":\"Master's Degree in AI\"}]}],[\"$\",\"li\",\"Master's Degree in Computer Science\",{\"className\":\"mb-2 hover:underline text-[1rem]\",\"children\":[\"$\",\"a\",null,{\"className\":\"text-white hover:text-white\",\"href\":\"/masters/online-masters-in-computer-science\",\"children\":\"Master's Degree in Computer Science\"}]}]]}],[\"$\",\"div\",null,{\"className\":\"flex flex-col text-[1rem]\",\"children\":[[\"$\",\"a\",\"see more Graduate Degrees\",{\"href\":\"/masters\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Graduate Degrees\"}],[\"$\",\"a\",\"see more Doctorate Degrees\",{\"href\":\"/doctorate\",\"className\":\"hover:underline text-[1rem] text-white hover:text-white\",\"children\":\"see more Doctorate Degrees\"}]]}]]}]]}],[\"$\",\"div\",null,{\"className\":\"my-4 border-t-[1px] border-solid border-primary-foreground\"}]]}],[\"$\",\"$L27\",null,{\"links\":\"$21:3:props:children:props:children:props:children:3:props:links\"}],[\"$\",\"div\",null,{\"className\":\"flex flex-wrap-reverse justify-between\",\"children\":[[\"$\",\"p\",null,{\"className\":\"text-primary-foreground text-[1rem]\",\"children\":[\"© 2024 edX LLC. All rights reserved.\",[\"$\",\"br\",null,{}],[\"$\",\"span\",null,{\"children\":\"| 深圳市恒宇博科技有限公司\"}]]}],[\"$\",\"div\",null,{\"className\":\"flex gap-1\",\"children\":[[\"$\",\"a\",null,{\"href\":\"https://itunes.apple.com/us/app/edx/id945480667?mt=8\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/images/apple-store-badge-en.png\",\"alt\":\"Download on the App Store\",\"title\":\"Download on the App Store\",\"width\":120,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}],[\"$\",\"a\",null,{\"href\":\"https://play.google.com/store/apps/details?id=org.edx.mobile\u0026external_link=true\",\"target\":\"_blank\",\"rel\":\"noopener noreferrer\",\"children\":[\"$\",\"$L26\",null,{\"src\":\"/images/google-play-badge-en.png\",\"alt\":\"Get it on Google Play\",\"title\":\"Get it on Google Play\",\"width\":135,\"height\":40,\"data-ot-ignore\":true,\"className\":\"optanon-category-C0001\"}]}]]}]]}]]}]}]}]]\n"])</script><script>self.__next_f.push([1,"39:I[40645,[\"5105\",\"static/chunks/0e5ce63c-e5678294ec164d13.js\",\"9642\",\"static/chunks/c233e9bd-b7c9422fb889c5f2.js\",\"9910\",\"static/chunks/a4634e51-f019cc1ab047e185.js\",\"9690\",\"static/chunks/8cc6faea-b2797766ef923a86.js\",\"4390\",\"static/chunks/d648eb28-2e60f8fd6112f90f.js\",\"1551\",\"static/chunks/1551-a32ba51ea27eb996.js\",\"7268\",\"static/chunks/7268-ff18385b2655ac37.js\",\"3063\",\"static/chunks/3063-0c08aa3ace92d48f.js\",\"2769\",\"static/chunks/2769-3881453dae2bd98b.js\",\"4027\",\"static/chunks/4027-042478c0003133da.js\",\"9158\",\"static/chunks/9158-e6e425b5f6f826e4.js\",\"3929\",\"static/chunks/3929-dead225d00ed24b3.js\",\"965\",\"static/chunks/965-e858088f7146e0b7.js\",\"4334\",\"static/chunks/4334-7aa27f1f3aec8263.js\",\"9800\",\"static/chunks/9800-4a3b7102fbe3de1f.js\",\"9304\",\"static/chunks/9304-f8932c9966ddf481.js\",\"6090\",\"static/chunks/6090-d5fd1335f506444c.js\",\"1992\",\"static/chunks/1992-56c53a964d08613b.js\",\"6314\",\"static/chunks/6314-9d7343e5e11143fa.js\",\"5614\",\"static/chunks/5614-8f8d2222b07c224f.js\",\"289\",\"static/chunks/app/%5Blocale%5D/learn/%5Bcategory%5D/page-a7f3d623fb966ddb.js\"],\"default\"]\n3a:T687,\u003cp\u003eNow is a great time to launch a rewarding career in Information Technology (IT) support - no experience or degree is required to get started. The US Bureau of Labor Statistics forecasts a 9% growth in jobs through 2030, averaging 70,000 openings each year, and a medium salary of $58,000 annually for an entry-level Computer Support Specialist. With over 400,000 US job openings, Computer Tech Support Specialists are in high demand.\u003c/p\u003e \r\n \r\n\u003cp\u003eIn this self-paced, certificate program for beginners, you will learn IT support and build competency in IT fundamentals topics, including hardware, operating systems, software, system administration, programming, databases, networking, cybersecurity, and cloud computing, as well as critical skills covered such as customer service and troubleshooting. Mastery of these skills is essential for IT Helpdesk Support and also provides multiple options to grow your career as they are required skills for ma"])</script><script>self.__next_f.push([1,"ny technology jobs, including Software Engineer, Data Analyst, and Data Scientist.\u003c/p\u003e\r\n \r\n\u003cp\u003eThis Professional Certificate program from IBM is built by experts to prepare you for an entry-level job in Technical Support. If you can dedicate a few hours per week, you can complete the program in 3 to 6 months. By the end of the program, you will be equipped with job-ready skills employers look for, whether you are just starting out your IT career or changing jobs.\u003c/p\u003e\r\n\r\n\u003cp\u003eWhen you successfully complete the program you’ll receive dual credentials, IBM Digital Badges for each course to help your profile stand out, as well as a Professional Certificate to showcase your job readiness to potential employers.\u003c/p\u003e3b:T84e,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cimg style=\"max-height:175px\" align=\"right\" alt=\"\" src=\"https://www.edx.org/sites/default/files/edx-prize-logo-2019-winner.png\"/\u003e In this C Programming with Linux Professional Certificate program of seven short courses, you will learn how to write, read and debug computer programs in the C programming language while also becoming familiar with the Linux operating system. \u003c/p\u003e\r\n\r\n\u003cp\u003eBeginners, even those without any programming experience, will be able to immediately start coding in C through our new coding tools within the web browser. No need to install anything! \u003c/p\u003e\r\n\r\n\u003cp\u003eWhy learn C and not another programming language? Did you know that smartphones, your car’s navigation system, robots, drones, trains, and almost all electronic devices have some C-code running under the hood? C is used in any circumstance where speed and flexibility are important, such as in embedded systems or high-performance computing.\u003c/p\u003e\r\n\r\n\u003cp\u003eC is a foundational programming language taught at engineering schools around the world, and represents one of the building blocks of modern computer information technology. Invented in the 1970’s. It is still one of the most stable and popular programming languages in the world.\u003c/p\u003e\r\n\r\n\u003cp\u003eAlong with the C programming language comes Linux, an essential operating system used by most computer scientists and developers. Linux powers almost all supercomputers and most of the servers worldwide as well as all android devices and most internet of things devices. This Professional Certificate Program will introduce the Linux command line and Linux tools for C programmers; both of which are must-have skills in today’s tech industries.\u003c/p\u003e\r\n \r\n\u003cp\u003eYou will practice through guided exercises and short coding demonstrations, as well as more elaborate assignments.\u003c/p\u003e\r\n\r\n\u003cp\u003eOur dedicated international course team is excited to introduce you to the world of coding and guide you along your path to becoming a skilled C programmer and help you pursue a career in computer engineering. \u003c/p\u003e\r\n\r\n\u003cp\u003eThis course has received financial support from the Patrick and Lina Drahi Foundation.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"3c:T734,\u003cp\u003eThis introductory program is designed to give business professionals the basic background on Information Technology (IT) to let them get the most in their interaction with IT professionals, either from their company or from external corporation, as they will have a deeper understanding when identifying requirements, evaluating workloads or supervising results in the IT field.\u003c/p\u003e\r\n\r\n\u003cp\u003eThrough this program, you will learn the basic concepts of information systems and their application, and gain familiarity with the terminology used within the IT field.\u003c/p\u003e\r\n\r\nThis program covers the following topic areas:\r\n\u003cul\u003e\r\n\u003cli\u003e\u003cstrong\u003eInformation Systems and Office Application Software in Organizations:\u003c/strong\u003e\r\nStandard office suite tools, office systems (email, conferencing, etc...), basics of desktop operating systems. Internet, web browsers, Electronic Data Interchange and enterprise wide systems.\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eHardware and Systems Technology:\u003c/strong\u003e\r\nComputers and their components, data representation and processing. Computer networks, client/server architecture, operating systems architecture and wireless computing.\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eInformation Systems Software Development:\u003c/strong\u003e\r\nSoftware development, systems development, information processing, user interface design and standards, software project management.\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eProgramming Concepts and Data Management:\u003c/strong\u003e\r\nProgramming languages and logic, object oriented methods, data types and structures, file types, databases, SQL. Web technologies and development, data warehousing and data mining.\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eBusiness, Social, and Ethical Implications and Issues:\u003c/strong\u003e\r\nEconomic effects, business strategies, privacy concerns, security threats and controls, intellectual property and careers in information technology.\u003c/li\u003e\r\n\u003c/ul\u003e3d:T9bb,"])</script><script>self.__next_f.push([1,"\u003cp\u003eOrganizations are pressured to become digital enterprises for good reason. Today every company is a technology company at its core. Only through integrated information technology systems designed for business analytics can companies sense and respond to changing market demands. \u003c/p\u003e \r\n\r\n\u003cp\u003eBusiness agility demands a digital enterprise. \u003c/p\u003e \r\n\r\n\u003cp\u003eDigital technologies have the potential to transform organizations into lean, agile businesses that are strongly focused on their customers. But, just introducing digital technologies into an enterprise is not enough. Without the right organizational culture, business processes, and active people training, you will not realize the full value of digital technologies. \u003c/p\u003e \r\n\r\n\u003cp\u003eIn this program, we help you see the dynamic capabilities of your organization. Using the fitness landscape model we help managers see where they are in relation to other organizations and how to reconfigure their dynamic capabilities to move higher up the competitive fitness landscape. \u003c/p\u003e\r\n\r\n\u003cp\u003eThese “dynamic capabilities” include both the social and the digital - how we work and the technologies that support it.. Terabytes of processing and machine learning won’t be the solution to your business problems on their own. As companies pursue big data and cloud computing strategies to improve their decision making with actionable insights - the technologies will change. To truly sustainably improve the customer experience and achieve the competitive advantage that the power of data promises, you need the social technologies and processes that are able to adapt along with your data strategy. \u003c/p\u003e \r\n\r\n\u003cp\u003eThis ability to reconfigure and deploy new capabilities within the organization by creating, extending, or modifying the existing resources is a “dynamic capability.” With the speed of technology disruption, business leaders must enable their company to adapt. \u003c/p\u003e\r\n\r\n\u003cp\u003eThis certificate will also teach you about how to discover data sources in your company, and leverage those structured and unstructured data to improve your whole business. From supply chain sourcing to marketing and delivery. \u003c/p\u003e\r\n\r\n\u003cp\u003eThese lessons will help you make the right choices about digital transformation to make your organization better fulfill its mission and delight customers. To get there you must first understand the vision of a digital enterprise, what it looks like, how it operates, and why it’s so powerful in delivering results.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"3e:T45e,How to use management and leadership frameworks, theories, and case studies to address complex issues in healthcare organizations,How to manage the economic environment in healthcare,Financial Management techniques to prepare budgets, financial forecasts, assess investment alternatives, and leverage capital structures within healthcare organizations,Evaluate the value of new healthcare delivery systems and interventions on the basis of quality, safety, efficiency and cost effectiveness using accumulated data,Evaluate health policy as it applies to industry economics, needs demands and quality of care,Apply advocacy skills including quality of care, patients-rights, cultural competency and preventative care,Apply leadership frameworks, skills and functions of management in planning, organizing leadership and systems control,Evidence-based methods for planning, organizing, leading, and advocating for patients, families and communities in the public health sector,Demonstrate an understanding of healthcare system providers, financing, consumerism, past and future trends and regulatory and legal framework.3f:T6a7,\u003cp\u003eThe Healthcare Administration MicroMasters program consists of 3 courses and a capstone. After completing, you can also apply to Doane University to complete your \u003ca href=\"https://www.doane.edu/programs/master-of-business-administration\" target=\"_blank\" \u003eMBA \u003cstrong\u003eonline\u003c/strong\u003e\u003c/a\u003e for approximately $10,500 (more details below).\u003c/p\u003e \r\n\r\n\u003cp\u003eThe demand for skilled Healthcare Administrators is projected to grow 17 percent between 2016 and 2026, \u003c/p\u003e \r\n\r\n\u003cp\u003eThe Healthcare Administration MicroMasters program will introduce learners to management and leadership frameworks, theories and case studies specific to healthcare organizations. It will also prepare students with the skills to manage the complex issues inherent in healthcare systems and lead in the public health sector.\u003c/p\u003e \r\n\r\n\u003cp\u003eLearners will examine a variety of evidence-based methods to advocate for patients, families, and communi"])</script><script>self.__next_f.push([1,"ties, as well as within healthcare organizations. They will also explore financial management techniques -- preparing budgets, developing financial forecasts, assessing investment alternatives, and leveraging capital structures all within the context of healthcare organizations -- and explore the healthcare system's economic environment by taking on managerial roles.\u003c/p\u003e\r\n\r\n\u003cp\u003eLearners will also gain foundational understanding for the role of information technology in the healthcare field, developing familiarity with information systems designed to mitigate data loss, create consistent care, and offer research solutions. Whether students are working in entry-level positions or have a roles as healthcare executives, the Healthcare Administration program will provide the path.\u003c/p\u003e40:T594,We live in the Information Age, and we’re experiencing a paradigm shift. As \r\ncomputing technology advances, so too does our ability to explore and \r\nanalyze mountains of data that would have been impossible until recently.\r\n\r\nBusinesses and organizations everywhere see big opportunity in data science \r\n— and that means there are plenty of opportunities for data science \r\nprofessionals to explore. Careers across computer and information \r\ntechnology, including those related to data science, are projected to grow \r\nat nearly three times the national average from 2019 to 2029 — and projections suggest the global data science and \r\nbig data industry will be worth $274 billion by 2022, according to the International Data Corporation (IDC).\r\n\r\nWith your 100% online certificate in data science from Maryville University, you can learn the fundamentals of data science \r\nand begin preparing for a career in this booming and vital field. Here, you \r\ncan learn from experienced data science professionals and work with \r\nstate-of-the-art industry tools like Python, R, MySQL, Spark, Amazon Web \r\nServices, Databricks, Keras, TensorFlow, and PyTorch.\r\n\r\nOur curriculum allows you to go beyond theory and experience practical, \r\nreal-world learn"])</script><script>self.__next_f.push([1,"ing based on actual case studies, challenges, and \r\nopportunities in data science, so you can apply what you learn to your \r\ncareer in real time — or pursue further education.41:T5d3,Your big data certificate can mean big opportunities.We have access to more \r\ninformation than ever before, and data informs how businesses and \r\norganizations across industries and around the world operate. With cloud \r\ncomputing, the Internet of Things, smartphones, and the growth of websites, \r\nsocial media platforms, and apps that gather data, this trend will only \r\nincrease.According to the U.S. Bureau of Labor Statistics, careers across \r\ncomputer and information technology, including big data, are projected to \r\ngrow at nearly three times the national average from 2019 to 2029. \r\nMoreover, big data and business analytics firms worldwide are projected to \r\nsee double-digit growth in revenue each year through 2022, when the \r\nindustry will be worth $274 billion, according to the International Data \r\nCorporation (IDC).At Maryville, we offer a 100% online Post-Baccalaureate \r\nCertificate in Big Data to help you upskill, reskill, or retool as you \r\nprepare for what’s next in your career. If you already have a STEM-related \r\nbachelor’s degree or background in data or computer science, your \r\nprofessional certificate can help you expand your understanding of this \r\nfuture-focused field. Learn the skills to become the expert your \r\norganization needs to make raw data usable utilizing data wrangling, \r\nunderstand data mining practices, apply machine learning to data sets, and \r\nnavigate the booming field of big data. Prepare to build a bright future \r\nfor yourself.42:T95e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEste programa introductorio a las ciencias de la computación está diseñado para que un profesional de un campo ajeno a la informática y a las tecnologías de la información y comunicación (financiero, administrativo, gerencial) adquiera los conocimientos básicos en TIC necesarios para poder relacionarse de forma eficaz con los especialistas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados en el campo de las tecnologías de la información y comunicación de forma mucho más efectiva.\u003c/p\u003e\r\n\r\n\u003cp\u003eA través de este programa de Certificación Profesional, aprenderás los conceptos básicos de los sistemas de información y su aplicación, y te familiarizarás con la terminología utilizada en las TIC.\u003c/p\u003e\r\n\r\n\u003cp\u003eEsta Certificación Profesional abarca las siguientes áreas temáticas:\r\n\u003cul\u003e\r\n\u003cli\u003e\u003cstrong\u003eSistemas de Información y software de oficina en las corporaciones modernas: \u003c/strong\u003eherramientas estándares de oficina, sistemas de colaboración (correo electrónico, conferencia, etc ...), conceptos básicos de los sistemas operativos de escritorio, redes, Internet, navegadores web, Electronic Data Interchange y sistemas de gestión empresarial (ERP, CRM, BI, etc..)\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eTecnología de hardware y sistemas: \u003c/strong\u003eordenadores y sus componentes, representación y procesamiento de datos, equipamiento de redes de ordenadores, arquitectura cliente / servidor, arquitectura de sistemas operativos e informática inalámbrica\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eDesarrollo de Software de Sistemas de Información:\u003c/strong\u003e desarrollo de software, desarrollo de sistemas, procesamiento de información, diseño y estándares de interfaces de usuario, gestión de proyectos de software\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eConceptos de programación y gestión de datos: \u003c/strong\u003elenguajes de programación y lógica, métodos orientados a objetos, tipos y estructuras de datos, tipos de archivo, bases de datos, SQL, tecnologías web y desarrollo, data warehousing y minería de datos\u003c/li\u003e\r\n\r\n\u003cli\u003e\u003cstrong\u003eImplicaciones sociales y éticas de las TIC:\u003c/strong\u003e Efectos económicos, estrategias empresariales, ergonomía, privacidad, amenazas y controles de seguridad, propiedad intelectual y carreras en tecnología de la información\u003c/li\u003e\r\n\u003c/p\u003e"])</script><script>self.__next_f.push([1,"43:Ta3d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eTwenty-first century societies are highly connected, digitalized and networked. According to the International Data Corporation, by 2025 there will be 175 zetabytes of digital assets on the web. These include data, multimedia files, computing resources, software and more. There also social networks, many of which are purposely cultivated, which serve as a great source of collaboration and harnessing of collective wisdom. Meanwhile, Industry 4.0, or the Industrial Internet, provides an abundance of new opportunities for deploying intelligent applications in areas such as automation, monitoring, correction, decision, prediction and customization. Properly sourced data and harnessed knowledge are crucial for enabling business excellence. Competitive advantage is no longer achieved through an organization’s internal operational excellence and competition with rival firms, but through competency building, harnessing collective wisdom, and collaboration through networks. New value chains that lead to superior customer experience are often realized by applying newfound technological knowledge to fields such as processes management, machine learning, Big Data, automated decision-making and business model innovation.\u003c/p\u003e \r\n \r\n\u003cp\u003eBalancing theories and practice, and supplemented by in-depth case studies and practical illustrations, this program equips you with the skills and knowledge to strategize investments in digital transformations in an Industry 4.0 world. It covers everything from mining data, harnessing/sharing knowledge in organizations, leveraging the cloud for collaboration, competency building, innovation and fostering learning communities to identifying the skills today’s knowledge workers need. Case studies focus on healthcare, manufacturing, logistics, engineering, education, and the public sector. Learners may also join a vibrant online learning community made up of current and past learners, to co-learn together both during and after the program.\u003c/p\u003e\r\n \r\n\u003cp\u003eBased on two proven courses that have been on offer for the past three to five years, this program is designed to help managers and consultants from a non-technical background decide where to invest and design their digital transformation strategies in connected, networked societies, and develop smart products, services, systems in manufacturing, logistics, transportation, engineering, businesses, education and the home. Most learners who took the two MOOCs that form part of this program had backgrounds in product development, engineering, research, human resources, IT, logistics, and corporate planning.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"44:Tb17,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLearn foundations of GIS concepts and technology to view, understand, query, visualize, and interpret spatial data to reveal patterns and relationships for problem-solving and better decision making.\u003c/p\u003e\r\n\r\n\u003cp\u003e“GIS is about uncovering meaning and insights from within data.” Jack Dangermond, CEO of Esri, the creators of ArcGIS.\u003c/p\u003e\r\n\r\n\u003cp\u003eGeographic Information Systems (GIS) was once an esoteric technology limited to geographers and data scientists. It is now available to everyone. Thousands of organizations in virtually every field are using GIS to analyze data, make maps that reveal patterns and relationships, share insights, and solve complex problems of local to global significance.\u003c/p\u003e \r\n\r\n\u003cp\u003eThere is a growing need for a workforce skilled in GIS. This professional GIS certificate program will provide a comprehensive introduction to state-of-the-art methods and modern applications of GIS with the goal to prepare students for entry-level GIS jobs and undergraduate programs in geospatial sciences. Using the industry leading ArcGIS Pro GIS software, students will work with GIS datasets to support better decision making across many applications through data analysis of geographic data.\u003c/p\u003e\r\n\r\n\u003cp\u003eGIS is a growing technology field with widespread applications in government agencies and private industries. The global GIS market size stood at $7.5 billion in 2019, and it is expected to reach $25.6 billion by 2030 (\u003ca href=\"https://www.psmarketresearch.com/press-release/global-geographic-information-system-market\"\u003eSource\u003c/a\u003e).\u003c/p\u003e\r\n\r\n\u003cp\u003eThe rising investments in GIS-based infrastructure and solutions by the government sector, for military and aerospace applications, and by the private sector for real-time decision-making in industries such as construction, utilities, mining, and healthcare are the key factors driving the growth in the GIS applications.\u003c/p\u003e\r\n\r\n\u003cp\u003e\"The skills I have acquired from this program give me a boost in performing my tasks as a GIS Analyst. The courses are well structured. The Professional Certificate I have obtained became the reason for me to be invited as resource speaker in a local professional assembly and GIS workshops.\"\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ci\u003eArnold T. Tanondong, M.Sc.\u003c/br\u003e\r\nJ.H. Cerilles State College, Philippines\u003c/i\u003e\r\n\r\n\u003cp\u003e\"The ability to represent any kind of data on a map is very powerful. The material and the exercises in this program are about real world situations. This allows learners to create meaningful presentations of data to inform decisions that can allow a community, an organization, or even a country, to move forward.\"\u003c/p\u003e\r\n\r\n\u003ci\u003eYiorgos Theodoropoulos, GIS Essentials Learner\u003c/i\u003e\r\n\r\n\u003cp\u003e\u003cimg src=\"https://images.ctfassets.net/ii9ehdcj88bc/1N5N0fUMfskqh69SaOISWE/c45273d07183dd9b4a28010d171bc154/edxprize-2023-finalist.png\" alt=\"edX Prize Finalist 2023\"\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"45:T41d,\u003cp\u003eEngage and inspire students through technology.\u003c/p\u003e \r\n\r\n\u003cp\u003eLearn how to create enhanced learning opportunities using the latest tools and techniques to connect with today’s digital-first learners.\u003c/p\u003e \r\n\r\n\u003cp\u003eOur Instructional Design and Technology MicroMasters program combines theory, research, and practical applications to help students gain the skills they need to analyze and implement technology-enhanced learning experiences. Our curriculum covers a wide range of career-relevant topics, including learning theories, instructional design, multimedia design, assessment and evaluation, and emerging technologies such as artificial intelligence.\u003c/p\u003e \r\n\r\n\u003cp\u003eThis MicroMasters program equips you with the knowledge and skills needed to excel in the rapidly growing field of online teaching and learning. The program is designed to help students gain the knowledge that can help them advance their careers in K-12 schools; institutions of higher learning; non-profit organizations; or workforce training, upskilling, and development.\u003c/p\u003e46:T4af,\u003cp\u003eClassical detectors and sensors are ubiquitous – examples include heat sensors in cars and light detectors in camera cell phones. Leveraging advances in the theory of noise and measurement, an important paradigm of quantum metrology has emerged. Here, ultra-precision measurement devices collect maximal information from the world around us at the quantum limit. This enables a new frontier of perception that promises to impact machine learning, sensing platforms, autonomous navigation, surveillance strategies, information processing, and communication systems.\u003c/p\u003e \r\n\r\n\u003cp\u003eIn this MicroMasters, students will learn the fundamentals of state-of-the-art quantum detectors and sensors.\u003c/p\u003e \r\n\r\n\u003cp\u003eIn addition, they will also learn the important foundational principles of quantum computing. They will be introduced to state-of -the-art quantum computing architectures and their working principles and will also gain hands-on experience programming real quantum machines.\u003c/p"])</script><script>self.__next_f.push([1,"\u003e\r\n\r\n\u003cp\u003eCourses in this program are designed to introduce both physics and engineering aspects of quantum technologies, in particular quantum detectors/sensors/networking/computing, with minimal prerequisite courses.\u003c/p\u003e47:T7a2,\u003cp\u003eIn the race towards a fault-tolerant quantum computer, the semiconducting qubit platform is, thus far, the only one that has been shown to be scalable. Germanium qubits are a new type of semiconducting qubits, and their progress has been exceptionally fast since the development of the material in 2018.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program “Quantum 301: Quantum Computing with Semiconductor Technology” is a combination of two advanced level courses about semiconducting quantum technologies. You will learn about the physics behind Germanium qubits, their advantages, and challenges compared to other qubit platforms, and the electrical components that are needed to control them. In addition, you will familiarize yourself with different companies from the semiconducting industry, their fabrication facilities, and the latest developments in the field. You will gain insight into how to embed machine learning into Germanium and other semiconductor qubit tuning and control workflows. You will be able to develop basic machine learning control algorithms and know how to embed them into experimental quantum computing workflow.\u003c/p\u003e\r\n\r\n\u003cp\u003eTo benefit fully from this program, prior knowledge about different fabrication methods, in addition to the previous courses on Edx.org is recommended:\r\n\u003cul\u003e\r\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/fundamentals-of-quantum-information\"\u003eFundamentals of Quantum Information\u003c/a\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/hardware-of-quantum-computer\"\u003eThe Hardware of a Quantum Computer\u003c/a\u003e\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eThis program is a collaboration between several parties, all of whom have state-of-the-art facilities for fabrication, control, or application of Germanium qubits. By taking this course you will have the opportunity to learn about Germanium qubits and artificial intelligen"])</script><script>self.__next_f.push([1,"ce assisted qubit control from professionals in the field who are conducting innovative research that is not being done elsewhere.\u003c/p\u003e48:Tb39,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis program delves into the theory and art of map making, a practice that has evolved over thousands of years and has been revolutionized by modern computer technology. It is designed to immerse students in the use of advanced computer techniques to address technical design issues, enabling them to create accurate and meaningful automated geographic mapping products. Through a series of comprehensive hands-on exercises, students will utilize Geographic Information Systems (GIS) software to produce typical GIS mapping products, thereby gaining valuable practical experience in the application of geotechnologies.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe courses within this program provide a robust combination of theoretical foundations and practical applications aimed at solving complex social and ecological problems through the use of geotechnologies. These geotechnologies encompass GIS, remote sensing (which involves examining the world through imagery collected by drones, aircraft, and satellites), and positioning systems such as GPS and Global Navigation Satellite Systems. Students will engage with a broad range of social and environmental themes through an array of readings, videos, and interactive exercises. This multifaceted approach ensures that students learn the critical fundamentals of mapping tools, including projections, symbology, classification, and analysis.\u003c/p\u003e\r\n\r\n\u003cp\u003eThroughout the duration of the program, students will not only build web mapping applications, such as interactive dashboards and multimedia story maps, but they will also have the opportunity to collect and map their own field data. This practical experience is crucial in helping students develop the skills and confidence needed to use maps as powerful analytical tools. By engaging in these activities, students will learn how to effectively communicate complex data and spatial information through visually compelling and informative maps.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program emphasizes the importance of using geotechnologies to address real-world problems and promotes the development of solutions that contribute to a more sustainable and resilient future. By the end of the program, students will have a deep understanding of how to leverage these technologies to analyze and interpret spatial data, making them well-equipped to tackle a variety of challenges in both social and ecological contexts.\u003c/p\u003e\r\n\r\n\u003cp\u003eOverall, this program prepares students to be leaders in the field of geotechnologies, providing them with the knowledge and practical skills necessary to make significant contributions to society. Whether they are interested in environmental conservation, urban planning, disaster response, or any other field that relies on spatial data, students will find that this program equips them with the tools to create positive change through the power of mapping and geographic analysis.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"49:T10c8,"])</script><script>self.__next_f.push([1,"\u003cp\u003eData scientists bring value to organizations across industries because they are able to solve complex challenges with data and drive important decision-making processes. Not only is there a huge demand, but there is a significant shortage of qualified data scientists with 54% of the most rigorous data science positions requiring a degree higher than a bachelor’s.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis MicroMasters® program in Statistics and Data Science (SDS) was developed by MITx and the \u003ca href=\"https://idss.mit.edu/academics/micromasters-program-in-statistics-and-data-science-sds/\"\u003eMIT Institute for Data, Systems, and Society (IDSS)\u003c/a\u003e. It is a multidisciplinary approach comprised of four separate tracks with four online courses each and a virtually proctored exam. Each track focuses on a combination of methods-centered courses and domain analysis courses to provide you with foundational knowledge and hands-on training. All learners complete the Probability and Machine Learning courses, two other courses determined by the chosen track, and the Capstone Exam.\r\n\r\n\u003cp\u003eData scientists bring value to organizations across industries because they are able to solve complex challenges with data and drive important decision-making processes. Not only is there a huge demand, but there is a significant shortage of qualified data scientists with 54% of the most rigorous data science positions requiring a degree higher than a bachelor’s.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis MicroMasters® program in Statistics and Data Science (SDS) was developed by MITx and the MIT Institute for Data, Systems, and Society (IDSS). It is a multidisciplinary approach comprised of four separate tracks with four online courses each and a virtually proctored exam. Each track focuses on three methods-centered courses and a domain analysis course to provide you with foundational knowledge and hands-on training in a discipline of your choice. All learners complete the Probability and Machine Learning courses. The track you choose determines your third methods course and a final domain analysis course.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eGeneral Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to become an informed and effective practitioner of data science who adds value to your organization across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-general-track\"\u003eYou are currently exploring the General track\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eMethods Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you with in-depth knowledge of data science and time series analysis and will enable you to conduct rigorous analysis, inform decision-making processes, and contribute to evidence-based practices across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-methods-track\"\u003eExplore the Methods track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eSocial Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to extract meaningful insights from social, cultural, economic, and policy-related data and equip you to tackle complex real-world problems and contribute to cutting-edge advancements in AI and data-driven solutions within all social sciences.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-social-sciences-track\"\u003eExplore the Social Sciences track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eTime Series and Social Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will equip you to analyze the impact of interventions on time series data, preparing you for roles in economics, public policy, and social sciences where understanding temporal dynamics is crucial for informed decision-making and policy formulation.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-time-series-and-social-sciences-track\"\u003eExplore the Time Series and Social Sciences track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eAll tracks are taught by MIT faculty and administered by IDSS at a similar pace and level of rigor as an on-campus course at MIT. The program is designed for learners who want to acquire sophisticated and rigorous training in data science without leaving their day job but without compromising quality. There is no application process, but college-level calculus and comfort with mathematical reasoning and Python programming are highly recommended if you want to excel.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"4a:T13b9,"])</script><script>self.__next_f.push([1,"\u003cp\u003eData scientists bring value to organizations across industries because they are able to solve complex challenges with data and drive important decision-making processes. Not only is there a huge demand, but there is a significant shortage of qualified data scientists with 54% of the most rigorous data science positions requiring a degree higher than a bachelor’s.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis MicroMasters® program in Statistics and Data Science (SDS) was developed by MITx and the \u003ca href=\"https://idss.mit.edu/academics/micromasters-program-in-statistics-and-data-science-sds/\"\u003eMIT Institute for Data, Systems, and Society (IDSS)\u003c/a\u003e. It is a multidisciplinary approach comprised of four separate tracks with four online courses each and a virtually proctored exam. Each track focuses on a combination of methods-centered courses and domain analysis courses to provide you with foundational knowledge and hands-on training. All learners complete the Probability and Machine Learning courses, two other courses determined by the chosen track, and the Capstone Exam.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eGeneral Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to become an informed and effective practitioner of data science who adds value to your organization across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-general-track\"\u003eExplore the General track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eMethods Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you with in-depth knowledge of data science and time series analysis and will enable you to conduct rigorous analysis, inform decision-making processes, and contribute to evidence-based practices across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-methods-track\"\u003eYou are currently exploring the Methods track\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eSocial Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to extract meaningful insights from social, cultural, economic, and policy-related data and equip you to tackle complex real-world problems and contribute to cutting-edge advancements in AI and data-driven solutions within all social sciences.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-social-sciences-track\"\u003eExplore the Social Sciences track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eTime Series and Social Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will equip you to analyze the impact of interventions on time series data, preparing you for roles in economics, public policy, and social sciences where understanding temporal dynamics is crucial for informed decision-making and policy formulation.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-time-series-and-social-sciences-track\"\u003eExplore the Time Series and Social Sciences track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eAll tracks are taught by MIT faculty and administered by IDSS at a similar pace and level of rigor as an on-campu\u003cp\u003eTo earn the MicroMasters program certificate in Statistics and Data Science, learners must complete and successfully earn a certificate in the four required courses and pass a virtually-proctored capstone exam.\u003c/p\u003e\r\n\r\n\u003cp\u003eMicroMasters programs are designed to offer learners a pathway to an advanced degree and can count as credit toward completing a Master’s degree program. Learners who successfully earn this MicroMasters program certificate may apply for admission to several Master’s programs, and if accepted, the MicroMasters program certificate will count towards the degree.\u003c/p\u003e\r\n\r\n\u003cp\u003eLearners who successfully complete this MicroMasters program certificate have the opportunity to apply to the MIT Doctoral Program in Social and Engineering Systems (SES) offered through the MIT Institute for Data, Systems, and Society (IDSS).\u003c/p\u003e \r\n\r\n\u003cp\u003eLearners can use their MicroMasters program certificate to demonstrate their preparation in Statistics and Data Science fundamentals to the SES Admissions Committee. Learners admitted to SES can expect that their MicroMasters coursework will be recognized with credit for corresponding SES core classes, and for satisfying the SES Information, Systems, and Decision Science requirements. More information on the MIT SES Doctoral Program can be found \u003ca href=\"https://idss.mit.edu/academics/ses_doc/\"\u003ehere\u003c/a\u003e.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn addition, learners who successfully earn the MicroMasters program certificate in Statistics and Data Science are now eligible to earn credit at a number of universities across the globe to fast track their pursuit of a full Master’s degree. A list of pathways to graduate programs can be found \u003ca href=\"https://micromasters.mit.edu/ds/pathways-graduate-programs/\"\u003ehere\u003c/a\u003e.\u003c/p\u003es course at MIT. The program is designed for learners who want to acquire sophisticated and rigorous training in data science without leaving their day job but without compromising quality. There is no application process, but college-level calculus and comfort with mathematical reasoning and Python programming are highly recommended if you want to excel.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"4b:Tafb,"])</script><script>self.__next_f.push([1,"\u003cp\u003eData scientists bring value to organizations across industries because they are able to solve complex challenges with data and drive important decision-making processes. Not only is there a huge demand, but there is a significant shortage of qualified data scientists with 54% of the most rigorous data science positions requiring a degree higher than a bachelor’s.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis MicroMasters® program in Statistics and Data Science (SDS) was developed by MITx and the \u003ca href=\"https://idss.mit.edu/academics/micromasters-program-in-statistics-and-data-science-sds/\"\u003eMIT Institute for Data, Systems, and Society (IDSS)\u003c/a\u003e. It is a multidisciplinary approach comprised of four separate tracks with four online courses each and a virtually proctored exam. Each track focuses on a combination of methods-centered courses and domain analysis courses to provide you with foundational knowledge and hands-on training. All learners complete the Probability and Machine Learning courses, two other courses determined by the chosen track, and the Capstone Exam.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eGeneral Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to become an informed and effective practitioner of data science who adds value to your organization across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-general-track\"\u003eExplore the General track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eMethods Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you with in-depth knowledge of data science and time series analysis and will enable you to conduct rigorous analysis, inform decision-making processes, and contribute to evidence-based practices across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-methods-track\"\u003eExplore the Methods track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eSocial Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to extract meaningful insights from social, cultural, economic, and policy-related data and equip you to tackle complex real-world problems and contribute to cutting-edge advancements in AI and data-driven solutions within all social sciences.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-social-sciences-track\"\u003eYou are currently exploring the Social Sciences track\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eTime Series and Social Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will equip you to analyze the impact of interventions on time series data, preparing you for roles in economics, public policy, and social sciences where understanding temporal dynamics is crucial for informed decision-making and policy formulation.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-time-series-and-social-sciences-track\"\u003eExplore the Time Series and Social Sciences track here\u003c/a\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"4c:T414,Master the foundations of data science, data analysis, time series with interventions, and machine learning.,Analyze big data and make data-driven predictions through probabilistic modeling and statistical inference; identify and deploy appropriate modeling and methodologies in order to extract meaningful information for decision making.,Develop and build machine learning algorithms to extract meaningful information from seemingly unstructured data; learn popular unsupervised learning methods, including clustering methodologies and supervised methods such as deep neural networks.,Understand the interplay between statistics and computation for the analysis of real data.,Learn the methods for harnessing and analyzing data to answer questions of cultural, social, economic, and policy interest, and then assess that knowledge.,Finishing this track of the MicroMasters program will prepare you for job titles such as: Data Scientist, Data Analyst, Business Intelligence Analyst, Systems Analyst, Data Engineer in Social Sciences contexts.4d:Tcf0,"])</script><script>self.__next_f.push([1,"\u003cp\u003eData scientists bring value to organizations across industries because they are able to solve complex challenges with data and drive important decision-making processes. Not only is there a huge demand, but there is a significant shortage of qualified data scientists with 54% of the most rigorous data science positions requiring a degree higher than a bachelor’s.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis MicroMasters® program in Statistics and Data Science (SDS) was developed by MITx and the \u003ca href=\"https://idss.mit.edu/academics/micromasters-program-in-statistics-and-data-science-sds/\"\u003eMIT Institute for Data, Systems, and Society (IDSS)\u003c/a\u003e. It is a multidisciplinary approach comprised of four separate tracks with four online courses each and a virtually proctored exam. Each track focuses on a combination of methods-centered courses and domain analysis courses to provide you with foundational knowledge and hands-on training. All learners complete the Probability and Machine Learning courses, two other courses determined by the chosen track, and the Capstone Exam.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eGeneral Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to become an informed and effective practitioner of data science who adds value to your organization across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-general-track\"\u003eYou are currently exploring the General track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eMethods Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you with in-depth knowledge of data science and time series analysis and will enable you to conduct rigorous analysis, inform decision-making processes, and contribute to evidence-based practices across industries.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-methods-track\"\u003eExplore the Methods track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eSocial Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will prepare you to extract meaningful insights from social, cultural, economic, and policy-related data and equip you to tackle complex real-world problems and contribute to cutting-edge advancements in AI and data-driven solutions within all social sciences.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-social-sciences-track\"\u003eExplore the Social Sciences track here\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eTime Series and Social Sciences Track\u003c/b\u003e\u003cbr\u003e\r\nThis track will equip you to analyze the impact of interventions on time series data, preparing you for roles in economics, public policy, and social sciences where understanding temporal dynamics is crucial for informed decision-making and policy formulation.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003ca href=\"https://www.edx.org/masters/micromasters/mitx-statistics-and-data-science-time-series-and-social-sciences-track\"\u003eYou are currently exploring the Time Series and Social Sciences track\u003c/a\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eAll tracks are taught by MIT faculty and administered by IDSS at a similar pace and level of rigor as an on-campus course at MIT. The program is designed for learners who want to acquire sophisticated and rigorous training in data science without leaving their day job but without compromising quality. There is no application process, but college-level calculus and comfort with mathematical reasoning and Python programming are highly recommended if you want to excel.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"4e:T420,\u003cp\u003e\u003cimg style=\"max-height:175px\" align=\"right\" alt=\"\" src=\"https://www.edx.org/sites/default/files/edx-prize-logo-2018-nominee.png\"/\u003eGain expertise in the growing field of Supply Chain Management through an innovative online program consisting of five courses and a final capstone exam. The MicroMasters Program in Supply Chain from MITx is an advanced, professional, graduate-level foundation in Supply Chain Management. It represents the equivalent of one semester's worth of coursework at MIT.\u003c/P\u003e \r\n\r\n\u003cp\u003eThe MicroMasters program certificate will showcase your understanding of supply chain analytics, design, technology, dynamics and end-to-end supply chain management. Build on the program certificate and take advantage of a great opportunity to be accepted into the #1 ranked supply chain management Masters Degree program for a fraction of the cost.\u003c/P\u003e\r\n\r\n\u003cp\u003e\u003cb\u003e\u003ci\u003ePlease be advised that certain courses in the program may require online proctoring for assessments. Specific details will be provided at the start of the given course.\u003c/p\u003e\u003c/b\u003e\u003c/i\u003e4f:T816,"])</script><script>self.__next_f.push([1,"\u003cp\u003eDevelop the fundamental skills needed for global excellence in manufacturing and competitiveness with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT’s #1-world ranked Mechanical Engineering department. Build your career with the credential or use it as credits towards a Master’s Degree by applying to MIT’s world-renowned \u003ca href=\"http://manufacturing.mit.edu/\" target=\"_blank\"\u003eMaster of Engineering in Advanced Manufacturing and Design Blended Program\u003c/a\u003e.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis program provides students with a fundamental basis for understanding and controlling rate, quality and cost in a manufacturing enterprise.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe Principles of Manufacturing are a set of elements common to all manufacturing industries that revolve around the concepts of flow and variations. These principles have emerged from working closely with manufacturing industries at both the research and operational levels. \u003c/p\u003e\r\n\r\n\u003cp\u003eTargeted towards graduate-level engineers, product designers, and technology developers with an interest in a career in advanced manufacturing, the program will help learners understand and apply these principles to product and process design, factory and supply chain design, and factory operations. \u003c/p\u003e\r\n\r\n\u003cp\u003eThis curriculum focusses on the analysis, characterization and control of flow and variation at different levels of the enterprise through the following subject areas:\u003c/p\u003e \r\n\r\n\u003cul\u003e\r\n\u003cli\u003e\u003cstrong\u003eUnit Process Variation and Control:\u003c/strong\u003e Modeling and controlling temporal and spatial variation in unit processes\u003c/li\u003e \r\n\u003cli\u003e\u003cstrong\u003eFactory Level System Variation and Control:\u003c/strong\u003e Modeling and controlling flows in manufacturing systems with stochastic elements and inputs.\u003c/li\u003e \r\n\u003cli\u003e\u003cstrong\u003eSupply Chain – System Variation and Control: \u003c/strong\u003eHow to operate and design optimal manufacturing-centered supply chains.\u003c/li\u003e \r\n\u003cli\u003e\u003cstrong\u003eBusiness Flows:\u003c/strong\u003e Understanding the uses and flow of business information to start up, scale up and operate a manufacturing facility.\u003c/li\u003e\r\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"50:T638,\u003cp\u003eDemand for data analysis skills are projected to grow in the U.S. 21% over the next 10 years, over four times the rate of the overall labor market. Fields like Data Science, Data Analytics, and Statistics are expected to grow up to 34%. According to the World Economic Forum, emerging global demand for data analytics skills across occupations is contributing to a “race for talent,” with more jobs available than qualified candidates. According to Burning Glass Technologies research, hybrid, more complex roles which combine field-centric skills with data analysis competencies are up to 40% higher paying than their single-focus counterparts, are high-growth, and immune to the threat of automation.\u003c/p\u003e \r\n\r\n\u003cp\u003eThis Professional Certificate program prepares students, working professionals, and decision makers to become data literate in both their professional and personal lives. In today’s data-driven world, data literacy will transform you into a “data citizen,” allowing you to communicate and make decisions based upon facts with confidence. You will emerge as a champion for a data literate culture.\u003c/p\u003e \r\n\r\n\u003cp\u003eYou will gain an understanding of how using data visualization, big data, data collection, and analytical tools to better understand business challenges and inform the decision-making process.\u003c/p\u003e \r\n\r\n\u003cp\u003eThis program is valuable for students and professionals who want to go beyond data analysis software proficiency to develop the ability to read, write, and communicate using data in context, including an understanding of data sources and constructs.\u003c/p\u003e51:T7f1,\u003cp\u003eQuantum supremacy is a term that refers to the projected ability of quantum computers to perform computations that are beyond the capabilities of any classical computer. The era that quantum computing promises to bring about is often likened to the era initiated by the classical computer. In such a \"quantum\" information era, quantum computers will be complemented by the quantum internet, which will allow for the transmission of quant"])</script><script>self.__next_f.push([1,"um information over long distances. This capability would support many revolutionary applications, such as unhackable communication, clock synchronization and secure access to quantum computers in the cloud.\u003c/p\u003e\r\n\r\n\u003cp\u003eBut how do quantum computers and quantum internet work? What scientific principles are behind them? What is the hardware that is being researched? What kind of software and protocols are needed for quantum computing and quantum internet? Which disciplines of science and engineering are required to develop these?\u003c/p\u003e\r\n\r\n\u003cp\u003eThe aim of this program is to help you get up to speed with the present progresses in the transition to a quantum information era. After a quick review of some of the basic concepts that will enable you understanding the operating principles of quantum computation and quantum internet, the program will begin with an extensive discussion on some of the different ways qubits can be built.\u003c/p\u003e\r\n\r\n\u003cp\u003eMoreover, we will discuss how a large-scale quantum processor could be built using these qubits. Some of the topics that we cover are micro-architectures, compilers, and quantum programming languages. You will also explore some of the basics of quantum error-correction, an essential procedure that allows us to combat errors that arise during computations using delicate qubits.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program then concludes with a discussion on the quantum internet: what is it? How can it be built? Why is it useful?\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program is a journey of discovery, so we encourage you to bring your own experiences, insights and thoughts via the forum!\u003c/p\u003e52:T49c,\u003cp\u003eGive your career a boost by mastering how to fuse information from a variety of different sensors, such as, radar, lidar and camera, for accurate object positioning and tracking of moving objects.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe target audience for this program are engineers in the automotive industry who need to tackle problems related to perceiving the traffic situation around an autonomous vehicle. This course is also aimed at students with a bachelor's d"])</script><script>self.__next_f.push([1,"egree who want to pursue master level studies in automotive engineering.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis program is derived from master level courses. It starts by introducing the basics of Bayesian statistics and recursive estimation theory and then gradually introduces more advanced concepts. The program offers a unique opportunity to gain practical knowledge in sensor fusion and multi-object tracking algorithms (filters).\u003c/p\u003e \r\n\r\n\u003cp\u003eBy the end of this program, you will be able to contribute to the development of sensor fusion and tracking applications for self-driving vehicles. Most of the involved methods, however, are more general and can be used for surveillance or to track, e.g., biological cells, sports athletes or space debris.\u003c/p\u003e53:Ta40,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn this program, you will learn about more advanced attacks in the space of side-channel security: transient-execution attacks and fault attacks. In the first course. we will focus on transient execution (and speculative execution) and how it can introduce data (not meta-data!) leakage. We will use side channels to exfiltrate data and transmit it to an attacker-controlled application. We will learn about the most prominent of transient-execution attacks: Meltdown, Spectre, Foreshadow, and ZombieLoad. These attacks are so powerful that they can leak arbitrary secret data, including cryptographic keys, all without physical access. In a set of small exercises, you will implement some of these attacks. You will understand the connection between these attacks and side-channel attacks. You will gain deep understanding of the microarchitecture of modern processors, out-of-order execution pipelines, transient-execution attacks and potential mitigations against them.\u003c/p\u003e\r\n\r\n\u003cP\u003eIn the second course, we will then focus more on fault attacks, in particular Rowhammer and Plundervolt. These attacks go beyond leaking information but instead we will manipulate data. These fault injection mechanisms are triggered purely from software and allows us to manipulate control flow, secret keys, and system security mechanisms, to fully subvert systems and bring them under our control. You will understand how these attacks can be mounted, and how they can be mitigated to allow you to develop hardware and software resilient to transient-execution and fault attacks. As an advanced topic in this block, we will also mount software-based differential power analysis attacks (DPA), following a similar methodology as for the physical side-channel attacks, leaking cryptographic keys. Again we will disucss what the countermeasures against these attacks are.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn both courses, you will practically apply the acquired skills in simple exercises based on measurements you perform on your own computer or measurements we obtained from physical devices, that we provide to you. Both courses require programming skills (C, C++, Python). We will provide you with the knowledge required beyond these, including basics on operating systems, computer architecture, and hardware design.\u003c/p\u003e\r\n\r\n\u003cp\u003eDaniel Gruss is an internationally renowned expert in side-channel research and has written many seminal works in this field and presented them at renowned international conferences, especially on transient-execution attacks that affected the entire industry and defenses that have been implemented in all operating systems.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"54:T66e,\u003cp\u003eIn this program, you will learn about side channels in software and hardware. In software, we will focus on different types of caches, that are one of the main targets in software-based side-channel attacks.\u003c/p\u003e\r\n\r\n\u003cp\u003eOn the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are powerful enough to obtain fine-grained information such as cryptographic keys, user input, or secrets of the operating system. This skill set and knowledge will give you the ability to spot these side channels in hardware and software projects. We will then cover countermeasures and mitigation strategies that allow you to develop side-channel-resilient hardware and software and protect your security-critical applications and sensitive information.\u003c/p\u003e\r\n\r\n\u003cp\u003eIn both courses, you will practically apply the acquired skills in simple exercises based on measurements you perform on your own computer or measurements we obtained from physical devices, that we provide to you. Both courses require rudimentary programming skills (C, C++, Python). We will provide you with the knowledge required beyond these, including basics on operating systems, computer architecture, and hardware design.\u003c/p\u003e\r\n\r\n\u003cp\u003eDaniel Gruss is an internationally renowned expert in side-channel research and has written many seminal works in this field and presented them at renowned international conferences, especially on transient-execution attacks that affected the entire industry and defenses that have been implemented in all operating systems.\u003c/p\u003e55:T78d,\u003cp\u003eSide channels are everywhere. They allow attackers to steal secret information that is protected and never directly exposed to the attacker. They are incredibly powerful and have disrupted the world in the last years, especially with attacks like Meltdown and Spectre that impacted most computers on the planet. You have also likely seen side channels and used them already yoursel"])</script><script>self.__next_f.push([1,"f.\u003c/p\u003e\r\n \r\n\u003cp\u003eIn this program, consisting of two courses, you will learn and practice the side-channel mindset , understand how to spot side channels in the real-world and how to use them in non-technical and semi-technical settings. The first course will provide you with the ability to spot side channels and the security problems they introduce in your job, research, studies, and in everyday life. In both courses, you will solve simple exercises using side channels in the real world and on computer systems to practically apply the acquired skills.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe first course requires no programming skills and has an entirely web-based exercise. In the second course, you will need basic programming skills (reading C code is required). We will provide you with all basics beyond that, including basics on operating systems, computer architecture, cryptography, and most importantly side-channel analysis. You will learn and practice how basic software-based side channels work and how you can mitigate them to protect yourself as well as the hardware and software you develop. We will provide you with Docker containers (and a tutorial on how to use them), to run the exercises on your own computer.\u003c/p\u003e\r\n \r\n\u003cp\u003eDaniel Gruss is a internationally renowned expert in side-channel research and has written many seminal works in this field and presented them at renowned international conferences, especially on transient-execution attacks that affected the entire industry and defenses that have been implemented in all operating systems.\u003c/p\u003e56:T935,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis certificate program consists of two mini-courses: (1) A Gentle Introduction to Probability; and (2) Random Variables – Great Expectations to Bell Curves.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe first course provides an introduction to basic probability concepts. Our emphasis is on applications in science and engineering, with the goal of enhancing modeling and analysis skills for a variety of real-world problems.\u003c/p\u003e \r\n\r\n\u003cp\u003eIn order to make the course completely self-contained (and to bring back long-lost memories), we’ll start off with Bootcamp lessons to review concepts from set theory and calculus. We’ll then discuss the probability axioms that serve as the basis for all of our subsequent work – what makes probability tick?\u003c/p\u003e \r\n\r\n\u003cp\u003eThe next venues on our tour are the concepts of independence and conditional probability, which allow us to see how the probabilities of different events are related to each other, and how new information can be used to update probabilities. The course culminates in a discussion of Bayes Rule and its various interesting consequences related to probability updates.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe second course discusses properties and applications of random variables.\u003c/p\u003e \r\n\r\n\u003cp\u003eWe’ll begin by introducing the concepts of discrete and continuous random variables. For instance, how many customers are likely to arrive in the next hour (discrete)? What’s the probability that a lightbulb will last more than a year (continuous)?\u003c/p\u003e\r\n\r\n\u003cp\u003eWe’ll learn about various properties of random variables such as the expected value, variance, and moment generating function. This will lead us to a discussion of functions of random variables. Such functions have many uses, including some wonderful applications in computer simulations.\u003c/p\u003e\r\n\r\n\u003cp\u003eIf you enjoy random variables, then you’ll really love joint (two-dimensional) random variables. We’ll provide methodology to extract marginal (one-dimensional) and conditional information from these big boys. This work will enable us to study the important concepts of independence and correlation.\u003c/p\u003e\r\n\r\n\u003cp\u003eAlong the way, we’ll start working with the R statistical package to do some of our calculations and analysis.\u003c/p\u003e\r\n\r\n\u003cp\u003eBy the end of the course, you will have the technology to model and evaluate a variety of real-world systems in which randomness is present.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"57:T401,This series of courses begins with an introduction to the US healthcare delivery system, its many systemic challenges and the prior efforts to develop and deploy informatics tools to help overcome those problems. It goes on to discuss health informatics from an historical perspective, its current state and its likely future state now that electronic health record systems are widely deployed, the HL7 FHIR (Fast Healthcare Interoperability Resources) standard is being rapidly accepted as the means to access and share the data stored in those systems and analytics is increasing being used to support clinical research using that aggregated data. It then turns to the impact of FHIR in transforming healthcare with a focus on some of the important and evolving areas of informatics including health information exchange, population health, public health, mHealth and big data and analytics. Use cases and case studies are used in all of these discussions to help students connect the technologies to real world challenges.58:T96f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn this Professional Certificate program, taught by prof. Sander Kersten, a leading global expert in the field of nutrition, you will learn how to analyze and interpret the information overload about nutrition and health to help build a healthier lifestyle for you and/or your patients. \u003c/p\u003e\r\n\r\n\u003cp\u003eYou will learn about the composition of macro- and micronutrients, their role in the body, and their impact on our health. You will get a sound understanding of energy homeostasis and the regulation of bodyweight. Also, you will learn about health problems related to overnutrition and undernutrition. You will learn strategies to improve nutritional status, and combat overnutrition and undernutrition based on scientific knowledge. The program covers everything from fat, protein, carbohydrates, vitamins, minerals, and water. You will acquire the necessary knowledge, skills and tools to become more critical towards the food and health related messages we’re constantly bombarded with. \u003c/p\u003e\r\n\r\n\u003cp\u003eThis program will also help you develop a critical mindset. You will learn how to distinguish misinformation about food as you discover what is complete nonsense, what has a scientific basis and where the truth is somewhere in between. \u003c/p\u003e\r\n\r\n\u003cp\u003eThis program is especially useful for health care professionals who are looking to update their knowledge and skills about nutrition and people working in the food industry with a non-nutrition background (such as food technology, legal, marketing, HR and communication staff). \r\nHealth care professionals will benefit by acquiring a solid academic knowledge base in nutrition that will be helpful in their interactions with patients and clients.\u003cbr\u003e\r\nProfessionals working in the food industry with a non-nutrition background will benefit by gaining a better understanding of foods and nutrients and how they can impact our health, which will useful in the design of new foods and new health claims and will allow for better communication with nutritionists and food scientists within and outside the company. \u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cstrong\u003eContinuing education and accreditation\u003c/strong\u003e\r\n\u003cbr\u003eHealth care professionals and health associate professionals often require formal qualifications and updated schooling to practice their profession. For some associations, this program may be used for CEUs. Please check with your local organization if the program qualifies. \u003c/p\u003e"])</script><script>self.__next_f.push([1,"59:T44f,\u003cp\u003eAre you interested in working in cybersecurity but unsure if it's the right career choice for you?\u003c/p\u003e\r\n\r\n\u003cp\u003eThis professional certificate program will introduce you to the field of cybersecurity, as you learn about its landscape, numerous sectors and various roles, competencies and career pathways.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou will learn about the role of the Chief Information Security Office (CISO) as you study the policies, procedures, practices and technologies put in place to mitigate organizational and systems vulnerabilities to cyberattack.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou will also learn about the type of skills needed from a cybersecurity professional, outside of technical proficiency. And lastly, you will be given the opportunity to complete a self-assessment to determine which career path in cybersecurity is right for you.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe goal of this program is to help you better understand cybersecurity and the opportunities within this field as they apply to you. The program is intended for learners who wish to identify their specific optimal niche and create a plan for entry into this exciting field.\u003c/p\u003e5a:Tb5c,"])</script><script>self.__next_f.push([1,"\u003cP\u003eRemote sensing observations from airborne and spaceborne SAR satellite platforms have become an essential tool in earth observation. They provide an immediate and large-area overview of the evolving earth environment, revealing important information on the state of ecosystems, unfolding natural hazards, as well as geodynamic phenomena across the earth’s surface such as volcanoes, earthquakes, and the cryosphere.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis certificate program will introduce you to the concepts and applications of Synthetic Aperture Radar (SAR), a remote sensing technology that can see the ground even during darkness and through rain, clouds, or smoke. As a participant completing the certificate, you will gain an intuitive understanding of the information contained in SAR observations. You will learn about the concepts of interferometric SAR and experience how SAR data acquired at different polarizations can reveal a wealth of information about the earth environment. Based on these foundations of SAR, interferometric SAR, and polarimetric SAR, participants will learn about how SAR and change detection techniques can be applied to the monitoring of natural hazards and to the analysis of the Earth’s ecosystems.\u003c/p\u003e\r\n\r\n\u003cp\u003eSpecific topics include:\r\n\u003cul\u003e\r\n\u003cli\u003eThe mathematical and physical principles of SAR remote sensing.\u003c/li\u003e\r\n\u003cli\u003eHow to access and visualize SAR data.\u003c/li\u003e\r\n\u003cli\u003eInterpretation of SAR imagery at different wavelengths and polarizations.\u003c/li\u003e\r\n\u003cli\u003eInterferometric SAR (InSAR) concepts.\u003c/li\u003e\r\n\u003cli\u003eThe principles of Polarimetric SAR (PolSAR).\u003c/li\u003e\r\n\u003cli\u003eApplication of SAR and InSAR to hazard monitoring with a focus on natural hazards such as earthquakes, volcanoes, landslides, wildfires, and flooding.\u003c/li\u003e\r\n\u003cli\u003eApplication of SAR and polarimetric SAR data to the analysis of ecosystems and their change including monitoring agriculture extent, forest monitoring for forest fires and deforestation, and forest biomass estimation.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eLearners on the verified track will put their learned knowledge into action in data analysis and data processing exercises, in which class participants will analyze SAR, InSAR and polarimetric SAR data sets, and apply them in hazard and ecosystems monitoring case studies. Learners who select the verified track will also have access to online computational labs using Jupyter notebooks that will allow deeper exploration and practice.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eRecommended Prerequisites\u003c/p\u003e\u003c/b\u003e\r\n\r\n\u003cp\u003eIn order for learners to succeed in the courses in this professional certificate, the following prerequisites and trainings are recommended:\r\n\u003cul\u003e\r\n\u003cli\u003eGeneral proficiency in GIS\u003c/li\u003e\r\n\u003cli\u003eFor verified track: Basic knowledge in Python programming\u003c/li\u003e\r\n\u003cli\u003eARSET Level-0 Training “Fundamentals of Remote Sensing” or equivalent\u003c/li\u003e\r\n\u003cli\u003eARSET Level-1 Training “Introduction to Synthetic Aperture Radar” or equivalent\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"5b:Ta28,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe trend in the financial industry is clear: Technology powered financial services is the way of the future, and it is critical that finance professionals have the technology acumen to ensure your firm is not left behind. It is becoming increasingly important for organizations to understand not only the application of expansive technological advancements like AI and machine learning in the area of finance, but also technologies that are integral to the future of financial services like distributed ledgers and algorithmic trading.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe Financial Technology Professional Certificate program provides an overview of the most recent technological advances that are radically changing the financial services industry, and all other industries that rely on automated financial transactions, as a result.\u003c/p\u003e \r\n\r\n\u003cp\u003eThese technological breakthroughs offer new ways for people and organizations to save, invest, borrow, and transact. Learn how new technologies create value in the financial industry, from reducing unit cost, increasing transparency, increasing competition, creating network effects, leveraging economies of scales, and lowering asymmetric information. The program also explores the competitive landscape and the market opportunities and threats for incumbents and new entrants.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program is divided into 4 courses.\r\n\r\n\u003cul\u003e\r\n\u003cli\u003eCourse 1 provides an overview of the Fintech sector\u003c/li\u003e\r\n\u003cli\u003eCourse 2 focuses on distributed ledgers, blockchains, and cryptocurrencies\u003c/li\u003e\r\n\u003cli\u003eCourse 3 analyzes the application of artificial intelligence and machine learning to the finance industry, from credit scoring models in marketplace lending and crowdfunding, to algorithmic trading and robo-advising\u003c/li\u003e\r\n\u003cli\u003eCourse 4 concentrates on the internet of things, with a focus on insurance and electronic payments, including domestic mobile payments, open banking, and international remittances.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program will cover both the business opportunities and growth areas in the fintech industry, as well as the technology underpinning the industry, from machine learning to blockchain, APIs and IoTs.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou can enroll in the entire 4-course program to gain a comprehensive knowledge of fintech, or select individual courses to hone in on specific topics and skills. Financial professionals are often required or encouraged to continue their education to practice their profession. For some associations, this program may be used for Continuing Education Credits. Please check with your local or national organization if the program qualifies.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"5c:T8f6,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn recent years, telehealth — and its subcategory, telemedicine — has seen its usage spike dramatically as healthcare continues to go through a historically transformative period. The COVID-19 pandemic may help explain this boom to some extent, but the technology’s expansion is nevertheless indicative of a long-term change in the way patients and healthcare workers interact. After all, telehealth offers a safe, efficient solution to many medical needs, without the patient having to leave their home.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe Stanford Center for Health Education (SCHE) Telehealth: Strategy, Implementation, and Optimization XSeries program allows you to explore the strategic considerations and best practices of telehealth and telemedicine. Learners examine the clinical, operational, financial, and legal factors of telehealth, and assess how this technology can become a bridge to equitable healthcare access.\u003c/p\u003e \r\n\r\n\u003cp\u003eIn the program, you’ll learn to overcome telehealth’s risks and barriers, and equip yourself to make the most of its opportunities. Finally, you’ll explore how to effectively empower your organization’s telehealth efforts in enabling successful implementation and ongoing optimization of telehealth delivery.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eAccreditation\u003c/b\u003e\u003c/br\u003e\r\n\u003cp\u003eIn support of improving patient care, Stanford Medicine is jointly accredited by the Accreditation Council for Continuing Medical Education (ACCME), the Accreditation Council for Pharmacy Education (ACPE), and the American Nurses Credentialing Center (ANCC), to provide continuing education for the healthcare team.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eCredit designation\u003c/b\u003e\u003c/br\u003e\r\n\u003cp\u003eAmerican Medical Association (AMA)\u003c/br\u003e\r\n\u003cp\u003eThe Stanford University School of Medicine designates this enduring material for a maximum of 48.00 AMA PRA Category 1 Credits™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.\u003c/p\u003e\r\n\r\n\u003cp\u003eView the full accreditation information \u003ca href=\"https://stanford.cloud-cme.com/course/courseoverview?P=1\u0026EID=42560\"\u003ehere\u003c/a\u003e from Stanford Medicine.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eHow to claim credit \u003c/b\u003e\u003c/br\u003e\r\n\r\n\u003cp\u003eAt the end of the XSeries program with successful completion, a claim credit and evaluation link will be emailed to you with more detailed instructions.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"5d:T6d5,\u003cp\u003eIn the last two centuries, humanity's average wealth has increased tenfold, while at the same time, child mortality has fallen tenfold. Yet, hundreds of millions of people still earn less than $2 a day, animal cruelty is worse than ever, and risks from climate change, pandemics, and artificial intelligence appear to be on the rise. Many of us care about these issues, but can we do anything about them?\u003c/p\u003e\r\n\r\n\u003cp\u003eThis interdisciplinary program will provide you with a collection of practical tools from economics, public health, behavioral science, ethics, exact sciences, technology, the life sciences, and more to help you achieve a positive and significant impact. From the small decisions we make every day, through the initiatives we choose to support, to our most significant life choices, such as what career to pursue, relying on evidence and analytical methodologies can help you drive a change you believe in.\u003c/p\u003e\r\n\r\n\u003cp\u003eOur program is divided into two courses:\r\nThe first, \u003ca href=\"https://edx.org/learn/ethics/tel-aviv-university-making-a-difference-i-evidence-based-impact\"\u003eMaking a Difference Ⅰ: Evidence-based Impact\u003c/a\u003e, focuses on the foundations of cost-effectiveness, measurement, evaluation, and key questions around who to extend our compassion and concern towards. We’ll also explore some of the causes and opportunities with the strongest evidence for impact.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe second course, \u003ca href=\"https://edx.org/learn/ethics/tel-aviv-university-making-a-difference-ii-high-stakes\"\u003eMaking a Difference Ⅱ: High Stakes\u003c/a\u003e, explores tools for prioritization and assessment when there’s limited information and the stakes are extremely high - including risks to the survival and prosperity of human civilization.\u003c/p\u003e5e:Tda0,"])</script><script>self.__next_f.push([1,"\u003cp\u003eFashion Design and Creation has been built for you - in your very own unique way, your size, and how you choose to look! Our bodies are as unique as we are, so don’t we all deserve to dress ourselves in clothes which fit us, suit us, made by us, just for us, in our own unique way. The global fashion industry is producing millions of clothes, which don’t always fit us correctly, and end up in landfills, polluting the environment. Isn’t it about time we all acted to improve our planet, in buying less mass-produced cheap clothing, and purchase clothes which are sustainably made, made to last, and fit our body shapes.\u003c/p\u003e\r\n\r\n\u003cp\u003eThese two courses teach you the art of made to measure for lower body garments, learning how garments should actually fit our individual body shapes, for men and women, providing you will the skills to be able to create the perfect fit, and style, for any person, man, woman or child. Whether your body is pear shape, plus size, apple body shape, or you have a defined waist, this course will teach you how to make clothes to fit your wonderful curves and body shape. Once you gain the understanding of how to create the pattern blocks from measurements you can repeat the process for any person, man, woman or child, you will be able to create the perfect fit for their individual height and body shape.\u003c/p\u003e\r\n\r\n\u003cp\u003eVerified learners will have access to the Fashion Design and Creation books, which show 20 different skirt designs, 20 trousers for women, and 20 trousers for men. These books show the plan, pattern, graded specification and construction information, to inspire you in how to create different fashion styles. The twenty styles have been specifically selected to give you a broad knowledge of construction of specific styles. For skirts, different pleats, gathers, godets, lengths and widths, have been developed to show a wide variety of designs. Trousers covers how to make jeans, casual trousers like cargo pants, dance pants, jogging bottoms, using different patch pockets, seaming details and different fly front constructions. The tailored trousers show how to sew lining into trousers and construct the jet and welt tailored pockets. Each of the twenty designs are different, which can be used as inspiration to adapt and develop to create your own unique style, using your own choice of fabrics.\u003c/p\u003e\r\n\r\n\u003cp\u003eWith an understanding of how clothes should fit you, and the experience you will gain by completing the Professional Certificate, you will have the knowledge and skills to adjust and adapt your whole wardrobe, recycling and up cycling, and making something new! With labour and love for fashion, you can look unique, and wear your new made to measure clothes to express yourself, confident and proud.\u003c/p\u003e\r\n \r\n\u003cp\u003eThese two courses will prepare you for a career within the fashion industry. Working in the field of designing you could enter a position as a junior designer and develop your skills to senior designer level. With the technical knowledge you will gain you could work within the garment technology field, as a pattern cutter, sample machinist or fit technologist, working on the fit of clothing ready for mass production. The knowledge gained by completing these two courses in Fashion Design and Creation will also give you the opportunity to complete an undergraduate degree program in Fashion Design where you will have the opportunity to develop your skills in fashion designing and creating further.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"5f:T67b,\u003cp\u003eNominated for the 2020 edX Prize\u003c/p\u003e\r\n\r\nInformation Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how we can fight back.\u003c/p\u003e\r\n \r\n\u003cp\u003eNeedless to say, the demand for professionals that are knowledgeable in information security is exploding, and careers in the field are amongst the highest paying in the industry. Even so, it's a challenging skill to master - information security is a battle of wits between attackers and defenders, so you really do have to learn from the best.\u003c/p\u003e\r\n \r\n\u003cp\u003eIsrael is well known as a leader in the field, and \"Unlocking Information Security\" endorsed by Check Point Ltd., is the first Israeli academic MOOC covering the topic. From their work in the academia, industry and Israeli intelligence corps, the instructors of the course possess an extensive experience in the field.\u003c/p\u003e\r\n \r\n\u003cp\u003eCompleting this program will teach you the necessary knowledge and skills needed to become a better and more vigilant professional in the high-tech industry. You will learn about the different ways in which computer systems can be vulnerable, as well as many useful mitigation techniques, including the most important cryptographic tools; you will take a hard look “under the hood” of operating systems and the Internet, understand how they can be exploited and how they can be secured; and most importantly, you will understand the principles of secure computer systems and the mindsets of both attackers and defenders.\u003c/p\u003e60:T805,"])</script><script>self.__next_f.push([1,"Las habilidades de análisis de datos avanzados son muy solicitadas por las organizaciones, debido a que se desean utilizar los datos para mejorar los resultados de los negocios (business intelligence). Este programa te ayudará a convertirte en un analista de datos ingenioso e independiente que puede ayudar a las organizaciones a cumplir sus objetivos.\u003c/p?\r\n\r\n\u003cp\u003eEl programa de Certificación Profesional en análisis de datos cubre las tareas principales de los analistas de datos expertos – Importar, limpiar, mapear, interpretar y visualizar datos, con especial énfasis en los tableros en tiempo real. Aprenderás técnicas avanzadas y obtendrás nociones sobre los principios de la ciencia de los datos con Microsoft Excel y plugins externos. \u003c/p\u003e\r\n\r\n\u003cp\u003eEl programa está compuesto por dos cursos, uno básico y uno intermedio. Estos cursos te introducirán en los desafíos del análisis de datos real que simulan la complejidad y los desafíos de los analistas de datos en el ambiente de los negocios. Con la Credencial del Programa de Certificación Profesional, podrás demostrar que dominas las herramientas, las técnicas y el procesamiento de datos y podrás aplicar estadísticas para obtener información valiosa sobre los datos. Más aún, podrás indicar que sabes cómo comunicar claramente tus descubrimientos a varios interesados. \u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Análisis y Visualización de Datos con Excel es ideal para profesionales interesados en aprender nuevas técnicas y herramientas de Excel a fin de volverse más productivos y eficientes. Las personas de múltiples disciplinas que quieren o comienzan a convertirse en analistas de datos disfrutarán de una introducción invaluable y práctica a esta profesión.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cimg alt=\"Instituto Tecnológico de Buenos Aires (ITBA)\" src=\"https://www.edx.org/sites/default/files/itba.png\" style=\" float: left; margin-right: 10px; margin-bottom: 25px\" width=\"150\" /\u003eTUDelft realizó este curso en colaboración con el Instituto Tecnológico de Buenos Aires (ITBA).\u003c/p\u003e\u003cbr /\u003e"])</script><script>self.__next_f.push([1,"61:T4ee,\u003cp\u003eTechnological advances have transformed fields that rely on data by providing a wealth of information ready to be analyzed. From working with single genes to comparing entire genomes, biomedical research groups around the world are producing more data than they can handle and the ability to interpret this information is a key skill for any practitioner. The skills necessary to work with these massive datasets are in high demand, and this series will help you learn those skills.\u003c/p\u003e\r\n\r\n\u003cp\u003eUsing the open-source R programming language, you’ll gain a nuanced understanding of the tools required to work with complex life sciences and genomics data. You’ll learn the mathematical concepts — and the data analytics techniques — that you need to drive data-driven research. From a strong foundation in statistics to specialized R programming skills, this series will lead you through the data analytics landscape step-by-step.\u003c/p\u003e\r\n\r\n\u003cp\u003eTaught by Rafael Irizarry from the Harvard T.H. Chan School of Public Health, these courses will enable new discoveries and will help you improve individual and population health. If you’re working in the life sciences and want to learn how to analyze data, enroll now to take your research to the next level.\u003c/p\u003e62:T629,\u003cp\u003eData breaches. Identity theft. We read about these Internet issues all the time. Any identity data available online can be subject to theft. Simply put, the Internet is broken and it needs to be fixed.\u003c/p\u003e \r\n\r\n\u003cp\u003eTraditional identity management approaches are failing. A new approach to identity management is needed to ensure tamper-proof transactions and infrastructures. Enter the world of blockchain-based identity management. Hyperledger Aries, Indy and Ursa provide a foundation for distributed applications built on authentic data using a distributed ledger, purpose-built for decentralized identity. Together, they provide tools, libraries, and reusable components for creating and using independent digital identities rooted on blockchains or other distribut"])</script><script>self.__next_f.push([1,"ed ledgers so that they are interoperable across administrative domains, applications, and any other “silo.”\u003c/p\u003e \r\n\r\n\u003cp\u003eThis program is geared towards learners with a technical background interested in developing identity-focused blockchain solutions to enhance user privacy. Learners will start by exploring the possibilities offered by Hyperledger Indy, Aries and Ursa for building applications on a solid digital foundation of trust and examine how these open source technologies can make the Internet safer and increase user privacy by only disclosing specific information as and when needed and authorized. They will then do a deep-dive into Hyperledger Aries, learning to create production-ready applications by developing code for issuing and verifying credentials with their own Aries agent.\u003c/p\u003e63:T5a7,We’re living in a digital-first world. With the prevalence of smartphones \r\nand tablets, the growth and development of the Internet of Things, and the \r\nincrease in working and studying remotely, our society is more connected \r\nthan ever.\r\n\r\nThat means more devices, platforms, and technologies need to be secured \r\nagainst threats from cybercriminals — and there are more opportunities for \r\nmalware, ransomware, data breaches, phishing attempts, and other attacks to \r\naffect users and businesses. In the first half of 2020 alone, \r\ncybercriminals compromised or exposed an estimated 36 billion records.*\r\n\r\nThere’s a shortage of qualified cybersecurity experts to address this \r\nthreat. In 2018, 74% of businesses surveyed said their operations were \r\naffected by this shortage, up from 70% the year before.** According to \r\ncybersecurity firm Varonis, an estimated 3.5 million cybersecurity jobs will go unfilled in 2021.\r\n\r\nYou can help fill these vital roles and secure digital business operations. \r\nYour 100% online cybersecurity certificate can help you build the fundamentals to upskill, reskill, or \r\nretool for the next step in your career. Our program is designed to help \r\nyou pursue opportunities to bring IT and"])</script><script>self.__next_f.push([1," cybersecurity expertise into a \r\nbusiness setting. Prepare to thrive in this booming, future-focused field \r\nand become the security expert your organization needs to defend against \r\nand mitigate digital threats.64:T47c,Design and perception determine so much of how we interact with the modern \r\nworld. This is especially true as we increasingly rely on digital devices \r\nfor communication, commerce, entertainment, and information. The quality of \r\nour experience can go a long way in shaping our opinions.\r\n\r\nAbout 94% of website visitors form their first impression of a site based \r\non design, and 75% use it to judge credibility. Not only that, but users \r\nwho have a bad experience with a retailer’s mobile presence are 62% less \r\nlikely to make a future purchase.*\r\n\r\nWith your 100% online certificate in user experience and user interface (UX/UI) from Maryville University, you can pursue a career helping shape the way \r\nwe experience the world. We built our UX/UI certificate program to help you \r\nlearn the fundamentals of user experience in as few as six courses (18 \r\ncredit hours). As you earn your certificate, the experiential, \r\nproject-based courses can help you build your foundation in key concepts \r\nlike iOS application development, website design, and storyboarding.\r\n\r\nYou can learn to design meaningful and relevant experiences. Start here.65:Ta33,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn today's work environment, it is vital for professionals to interpret the large amount of quantitative information to which they have access, more and more we have to interpret large volumes of data (big data), either by analyzing financial reports, case studies or presenting data effectively. This Professional Certification program, offered by EGADE Business School, the number one school in Mexico and Latin America in Finance and Administration, will give you the opportunity to successfully develop these skills that are highly required by companies in today's job market.\u003c/p\u003e\r\n \r\n\u003cp\u003eWith the help of experts, you will use interactive exercises to learn the fundamentals of mathematics, statististical analysiscs, data science and finance, all applied to business.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe topics covered in this Professional Certification program will allow you to obtain theoretical and practical training at the master's or postgraduate level to better understand the functions of business management; additionally, it will prepare you to continue your studies successfully by deciding to pursue a Master's Degree in Finance or an MBA at EGADE.\u003c/p\u003e\r\n\r\n\u003cp\u003eYou will need prior experience using Microsoft Excel.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis program will provide you with the key concepts you need to make successful managerial decision makings in your company, both in the short term and in the long term. For example, to make financial decisions, monetary decisions or investment decisions, it is necessary to know the interest rate, opportunity costs, master financial models, know the capital budget and working capital, the value of money, risk management.analyze risk. In general, this program will give you the quantitative skills and problem solving skills you need professionally to be successful in real world making business decisions.\u003c/p\u003e\r\n\r\n\u003cp\u003eQuantitative skills like financial modeling give you a framework for creating new tools to compare investment options and determine which will yield the best return based on a set of inputs and assumptions.Corporate finance can help the company in the creation of value, to analyze its financial resources / equity, to know the real assets that the company has, or to select the best investment projects based on the current value of money, and to know the analysis used in the processes.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program will also cover data science, which helps in making successful operational decisions and managerial decisions based on data analysis, for example, taking into account the information provided by the data you can determine the efficient use of resources.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"66:T41d,The fundamental guidelines and heuristics of user interface design to inform the creation of strong user interfaces, from major principles like discoverability and affordances to frameworks like distributed cognition and task analysis.,The stages of the design life cycle, including needfinding and requirements gathering; individual and group brainstorming; low- to high-fidelity prototyping; and qualitative, quantitative, and heuristic evaluation of human-computer interfaces.,The power of human-computer interaction in the modern world and the role it can play in promoting equity, accessibility, and progress.,The application of modern development frameworks and theories like the Agile Method, Universal Design, Activity Theory, and Value-Sensitive Design to the creation of computational interfaces.,The state of the art in HCI, including emerging technologies like virtual reality, augmented reality, and wearable devices; new ideas like context-sensitive interfaces and social computing; and application areas like healthcare and cybersecurity.67:Ta88,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLearn the fundamentals of Human Computer Interaction in this four-course certificate.\u003c/p\u003e\r\n\r\n\u003cp\u003eThis course begins with an introduction to the field of Human-Computer Interaction as a whole and where it sits in the context of related and similar fields like Human Factors Engineering and User Experience Design. Here, you’ll learn just enough of the history of HCI to get started having real conversations about the field.\u003c/p\u003e\r\n\r\n\u003cp\u003eThen, you’ll learn the fundamental design principles of human-computer interaction. You’ll start with the fundamental feedback cycle that underlies all interactions between users and interfaces. With that in mind, you’ll then learn the design principles developed by visionaries in the field like Don Norman, Jakob Nielsen, Larry Constantine, and Lucy Lockwood. From there, you’ll move into more advanced theories of HCI, including situated action and distributed cognition, then conclude by looking at how interface design can impact social change.\u003c/p\u003e\r\n\r\n\u003cp\u003eAfter you’ve learned the fundamental principles and theories of HCI, you’ll move onto the design life cycle. The design life cycle covers how you iteratively gather requirements, brainstorm alternatives, prototype interfaces, and gather user feedback quickly to make fast progress in designing and improving user interfaces. You’ll cover the basics of how to develop a good survey, conduct an informative interview, and control for bias throughout your needfinding processes. You’ll then learn about running effective brainstorming sessions, and then prototyping at the just-right level of fidelity for your current confidence in your designs. Finally, you’ll learn how to evaluate those prototypes with real users, gathering their feedback for a new run through the design life cycle.\u003c/p\u003e\r\n\r\n\u003cp\u003eAfter that, we’ll briefly look at the current state of human-computer interaction, focusing on three areas: technologies like virtual and augmented reality, ideas like gesture- or touch-based interaction, and application areas like healthcare and security. In this exploration, we’ll rely heavily on cutting-edge papers and publications from the ever-changing field of HCI.\u003c/p\u003e\r\n\r\n\u003cp\u003eThen finally, we’ll recap the entire course contents, and tell you what to do next to further your HCI education: whether it’s pursuing a Master’s or PhD in the field, taking follow-up MOOCs, or beginning your own HCI research career.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe material in this course is borrowed from Georgia Tech’s CS6750: Human-Computer Interaction, part of its online Master of Science in Computer Science program. You’ll watch the exact same lectures as students in the for-credit program.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"68:T46d,\u003cp\u003eHaving good English communication skills is increasingly important to stay competitive in a rapidly changing world. In today’s global economy, companies are looking for employees who can communicate clearly and concisely in the English language when solving problems, making decisions, or pitching new ideas. Multinational companies across Southeast Asia, for example, often employ businesspeople with strong English-speaking skills. This Professional Certificate in Business English will help non-native speakers of English to develop skills in spoken and written English and communicate ideas effectively in business contexts. By taking this online course, you will develop highly demanded skills for communicating efficiently in English within business contexts in Hong Kong, China, Japan, Singapore, and other Asian economies.\u003c/p\u003e \r\n\r\n\u003cp\u003eThis Professional Certificate Program is tailored for learners who wish to: \r\n\u003cul\u003e\r\n\u003cli\u003eimprove their English communication skills, particularly within a business context, and\u003c/li\u003e\r\n\u003cli\u003eenhance your cross-cultural understanding for international business communication.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e69:T87e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAt Wageningen University \u0026 Research we uniquely approach water management from not only the technical, but also the social and governmental perspective. Because, water technology can only be successful when it serves the stakeholders involved.\u003c/p\u003e \r\n\r\n\u003cp\u003eThis programme consists of online courses, informative knowledge clips, case studies, interviews, and practical assignments through which you will:\r\n\u003cul\u003e\r\n\u003cli\u003eAnalyse the interrelations between institutional and infrastructural designs for sustainable water management in agriculture.\u003c/li\u003e\r\n\u003cli\u003eExplain physical and agro-hydrological principles underlying drainage of agricultural land.\u003c/li\u003e\r\n\u003cli\u003eLearn how taking the socio-technical approach on agricultural water management can contribute to climate resiliency and food security.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eAgricultural Water Management: Water,-Society and Technology Interactions\u003c/p\u003e\u003c/b\u003e\r\n\r\n\u003cp\u003eWe start by taking a deep dive into practical and technical aspects, from crop characteristics and irrigation water requirements to actual field practices. Subsequently, we explore the institutional perspective, from models of rural development to water management demands.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe case study videos and interviews from Morocco create the opportunity for you to directly apply your newly acquired knowledge in a real-life situation.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003eDrainage in Agriculture: controlling water and salt levels in the soil\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eIt is clear that the food production mainly has to come from improvements in agricultural water management on existing agricultural lands. In light of the changes in water demand, supply and use, the role of (subsurface) drainage has changed from a single-purpose measure for controlling waterlogging and/or salinity to an essential element of integrated water management.\u003c/p\u003e\r\n\r\n\u003cp\u003eJoin this course to advance your knowledge of the global importance of drainage, drainage systems and solutions, and to help securing a sustainable food supply.\u003c/p\u003e\r\n\r\n\u003cp\u003eSo, whether you are a student or professional in agricultural water management, soil chemical, physical and biological processes, hydrology, hydraulics and irrigation, join us!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"6a:Tb1f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEl sector de la construcción representa una de las mayores industrias en términos económicos a nivel global y se posiciona como uno de los motores de crecimiento en múltiples países de la región latinoamericana. Sin embargo, es también uno de los sectores de menor crecimiento de productividad anual debido a su limitada digitalización en comparación con otras industrias. Esto abre un espacio de oportunidades y retos para la transformación digital y su acceso a la cuarta revolución industrial a través de nuevas formas de abordar los proyectos.\u003c/p\u003e\r\n \r\n\u003cp\u003eLa transformación de la industria de la construcción ha explorado el uso de plataformas digitales y software especializado como parte de su camino hacia la transformación digital. Sin embargo, tendrá que trascender rápidamente hacia la digitalización, virtualización y automatización de procesos, el uso e implementación de tecnologías de la industria 4.0 (gemelos digitales, realidad virtual, realidad aumentada, internet de las cosas iot, robótica, inteligencia artificial, cloud computing, impresión 3D ó fabricación aditiva, análisis de datos y big data, ciberseguridad, entre otros) y la aplicación de metodologías disruptivas (Building Information Modeling BIM, Kanban, Design Thinking, SCRUM, LEAN Construction, entre otras) que agilicen el aprovechamiento de los datos en tiempo real, influyan eficazmente en la toma de decisiones en el ciclo de vida de los proyectos y las ciudades inteligentes, generen nuevos modelos de negocio, ayuden a tecnificar la mano de obra y solucionen efectivamente los problemas de interoperabilidad e intercambio de información. Como industria nos enfrentamos a un nuevo paradigma: la construcción 4.0.\u003c/p\u003e\r\n \r\n\u003cp\u003eEn este programa, aprende los conceptos básicos del impacto y la transformación digital que la cuarta revolución industrial trae para la Industria AECO (Arquitectura, Ingeniería, Construcción y Operación) a lo largo de todo el ciclo de los procesos de producción de un proyecto amable con el medio ambiente, desde su planificación hasta el control del mismo, involucrando la perspectiva de los distintos actores interconectados y con un punto de vista crítico y prospectivo.\u003c/p\u003e\r\n \r\n\u003cp\u003eEl programa de Certificación Profesional Fundamentos de la construcción 4.0 busca introducir y reconocer los conceptos básicos, metodologías y nuevas tecnologías digitales asociadas y utilizadas en el desarrollo tecnológico de la industria de la construcción en la actualidad y las tendencias emergentes que transformarán en el corto, mediano y largo plazo toda la cadena de valor. Exploraremos los conceptos de tecnologías de la información y la industria 4.0 aplicadas al sector construcción, sistemas ciberfísicos, ecosistemas digitales, metodologías disruptivas y ágiles, entre otros.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"6b:T957,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIl est difficile d'exagérer l'importance de l'UX dans notre relation avec l'environnement numérique. Forrester a établi que les organisations qui investissent dans l'expérience utilisateur ont mieux réussi que la plupart, dans des marchés haussiers et durant des récessions (Forrester, 2015). C'est maintenant plus vrai que jamais, alors que la pandémie a élargi l'adoption du travail à distance, de la vie sociale en ligne et du divertissement.\u003c/p\u003e\r\n\r\n\u003cp\u003eApprenez les bases de l'expérience utilisateur grâce aux professeurs du plus important laboratoire UX d'Amérique du Nord. Dans ce programme de MicroMasters en UX, vous apprendrez à atteindre les objectifs organisationnels et à satisfaire les utilisateurs en appliquant un processus centré sur l'utilisateur au développement de produits et de services numériques qui résout des problèmes réels et pertinents pour l'industrie.\u003c/p\u003e\r\n\r\n\u003cp\u003ePour chaque phase de développement centrée sur l'utilisateur (Recherche UX, Design, Prototypage et Évaluation), vous acquerrez des connaissances théoriques pertinentes et apprendrez les meilleures pratiques appliquées pour planifier, exécuter, analyser et communiquer des informations utiles pour la phase de développement suivante.\u003c/p\u003e\r\n \r\n\u003cp\u003eDes services financiers personnels et des logiciels axés sur les employés, aux applications médicales perturbatrices, ce programme de MicroMasters vous aidera à développer les compétences de réflexion conceptuelle, d'évaluation UX et de gestion de projet UX nécessaires pour générer de nouvelles solutions à des problèmes urgents.\u003c/p\u003e\r\n\r\n\u003cp\u003eDans chaque cours, vous serez confronté à une série de défis d'une semaine, basés sur des recherches de pointe actuellement en cours au Laboratoire Tech3lab de HEC Montréal. À travers ces défis, vous affinerez votre compréhension des concepts de base et prouverez vos capacités dans le domaine très convoité de l'UX.\u003c/p\u003e\r\n\r\n\u003cp\u003eCette série d'études supérieures rigoureuses représente 20% des cours menant à une Maîtrise en gestion (M. Sc.) en expérience utilisateur dans un contexte d’affaires de HEC Montréal. Vous aurez un accès unique au Tech3lab, un laboratoire en sciences de la gestion appliquée, spécialisé dans l'analyse des interactions entre les interfaces technologiques des organisations et de leurs employés ou de leurs clients.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"6c:T8c4,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa ciencia de datos se ha convertido en una pieza central en la toma de decisiones en organizaciones de diversa índole. El internet permite la generación de datos a escalas sin precedentes. El análisis efectivo de esta información puede llevar a una organización al éxito. Por ello el requerimiento de analistas de datos está en auge y uno de los mayores requisitos es el conocimiento del lenguaje Python.\u003c/p\u003e \r\n\r\n\u003cp\u003eSegún el World Economic Forum (2019), las 5 empresas que más se han beneficiado y crecido con las aplicaciones de la ciencia de los datos y el Machine learning tienen que ver con tecnologías de la información, entretenimiento, servicios financieros, servicios profesionales y biotecnología.\u003c/p\u003e\r\n\r\n\u003cp\u003eAdemás, las perspectivas de trabajo que se han identificado al utilizar la ciencia de los datos son muy diversas y han ayudado a orientar los esfuerzos de las empresas para fortalecer sus operaciones. Según Algorithmia (2019), se tienen identificadas dos aplicaciones de la ciencia de los datos y aprendizaje máquina en las empresas. La primera tiene que ver con el mejoramiento de la experiencia del cliente y la atención a sus necesidades. Las empresas que se orientan más a estos casos son aquellas relacionadas con las ventas, educación, manufactura, salud y servicios. Mientras que la segunda aplicación se orienta a satisfacer los retos operativos a los que se enfrentan las empresas que gestionan datos. Algunos negocios que se identifican en este segundo caso son aquellas relacionadas con el área de finanzas, agencias de gobierno o aseguradoras.\u003c/p\u003e\r\n\r\n\u003cp\u003e\r\nEn esta certificación se verán conceptos introductorios a Python así como sus aplicaciones en la ciencia de datos para desarrollar habilidades laborales relacionadas con la visualización, el modelado de datos utilizando herramientas de aprendizaje máquina y la construcción de redes neuronales. Todos los ejercicios se realizan sin perder de vista su aplicabilidad en el mundo real. Te ayudaremos a orientar tus perspectivas de trabajo para que puedas visualizar, modelar y analizar correctamente los datos. Forma una carrera como científico, analista o ingeniero de datos a través de este MOOC que hemos preparado para ti.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"6d:Tf0b,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAprende las estrategias y herramientas de vanguardia utilizadas para la seguridad de la información de las organizaciones contra los diversos tipos de ciberataques.\u003c/p\u003e \r\n\r\n\u003cp\u003eLa nueva era digital ha permitido el desarrollo de las tecnologías de la información para que las comunicaciones entre las personas sean mucho más ágiles y abiertas. El internet, los dispositivos móviles, el wifi y los nuevos sistemas informáticos han logrado que las relaciones de trabajo encuentren nuevos canales para compartir información, gestionar procesos y realizar transacciones en el mercado. El uso de correos electrónicos y redes sociales ha hecho que la gente se encuentre cada vez más cerca a pesar de la distancia.\u003c/p\u003e \r\n\r\n\u003cp\u003eEl uso de las nuevas tecnologías ha requerido de nuevas leyes que protejan el uso de datos, tal es el caso del reglamento general de protección de datos o GDPR diseñado por la comisión europea que brinda pautas y buenas prácticas para asegurar la confidencialidad de los usuarios del internet.\u003c/p\u003e\r\n\r\n\u003cp\u003eSin embargo, y a pesar de los esfuerzos por definir leyes que protejan los datos, trasladar servicios y procesos de negocios al internet puede generar vulnerabilidades que permitan accesos no deseados a los sistemas y pongan en riesgo la información confidencial de los usuarios. Las organizaciones, administraciones públicas y grandes empresas alrededor del mundo sufren constantes ataques a sus sistemas informáticos por parte del cibercrimen con el fin de secuestrar información amenazando con eliminar la información o interrumpir sus servicios en sus plataformas de comunicación. Lo anterior generan brechas de seguridad en datos muy costosas para las organizaciones y que atentan contra la seguridad nacional de algunos países.\u003c/p\u003e\r\n\r\n\u003cp\u003eNo solo las empresas están en riesgo de sufrir amenazas a sus sistemas informáticos; las personas también viven con el riesgo de que sus datos de carácter personal sean robados y utilizados de forma indebida por causa de la ciberdelincuencia. Los sistemas de información personales se encuentran cada vez más vulnerables al software malicioso que utilizan los cibercriminales. El uso de antivirus y la generación de copias de seguridad de la información no es suficiente para enfrentar las amenazas cibernéticas, es por ello que resulta importante definir contramedidas que prevengan el robo de información y la suplantación de identidad.\u003c/p\u003e\r\n\r\n\u003cp\u003eSegún IBM, el costo promedio total por vulneración de datos se registra en los $3.86 millones de dólares anuales, siendo el sector de salud el más afectado con un gasto de $7.13 millones de dólares anuales.\u003c/p\u003e \r\n\r\n\u003cp\u003eEntre los ataques más utilizados por los ciberdelincuentes se encuentra el phishing, el cual utiliza métodos de ingeniería social para secuestrar la información de los usuarios y cobrar por ella con la amenaza de eliminarla. Este es un tipo de ataques que ha causado 8.5 billones de registros de pérdida de información en el 2019.\u003c/p\u003e\r\n\r\n\u003cp\u003ePor tal motivo, los métodos de ciberseguridad se colocan como una solución muy fuerte para comprender la mentalidad de los cibercriminales y aplicar estrategias de hackeo benéfico en tiempo real que logren dar frente a los ataques que vulneren la seguridad informática de las organizaciones y definan medidas de seguridad efectivas que protejan sistemas operativos y bases de datos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn este programa, aprenderás los fundamentos de la ciberseguridad. Identificarás las buenas prácticas que llevan a la detección de vulnerabilidades y ciberamenazas. Reconocerás los diferentes tipos de ransomware, malware y demás ataques utilizados por los cibercriminales. Además, aprenderás las diferentes estrategias en materia de seguridad cibernética y herramientas utilizadas para prevenir y dar caza a las amenazas.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"6e:T5b9,\u003cp\u003eEste es un programa de Certificación Profesional destinado a profesores de todos los niveles (educación superior, media y primaria). En él aprenderás a sacar partido de las TIC (tecnologías de la información y la comunicación), las nuevas tecnologías y herramientas digitales en tu labor docente para crear una experiencia de aprendizaje nueva y enriquecedora. Si eres profesor y quieres conocer la nueva enseñanza que viene y cómo puedes usar la tecnología educativa para mejorar la experiencia educativa, no puedes perdértelo.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn los cursos incluidos en el programa, además de conocer multitud de plataformas y nuevas herramientas disponibles en Internet que permiten crear nuevas experiencias de enseñanza-aprendizaje, te enseñaremos a desarrollar dos habilidades básicas como son buscar en Internet y realizar presentaciones eficaces. El aprendizaje con el uso de las TIC es multi-plataforma y multi-dispositivo, y se extiende más allá del salón de clases, incluso de una forma global y en este programa te presentamos las herramientas para desarrollarlo e incluirlo en el proceso de enseñanza.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Certificación Profesional tiene una particularidad, al tratarse de cursos que pueden realizarse de forma independiente, se repite algún contenido en los cursos, principalmente el módulo dedicado a la búsqueda de contenido libre en Internet, que está repetido en los 3 cursos, dada su importancia.\u003c/p\u003e6f:T9fd,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHoy en día, en las diversas instituciones educativas y sistemas formativos del mundo, las herramientas digitales y los recursos educativos, propios de las Tecnologías de la Información y la Comunicación (TIC), han pasado de ser una estrategia altamente recomendada, por parte de los expertos, a ser un elemento clave del proceso de enseñanza-aprendizaje y de la innovación educativa.\u003c/p\u003e\r\n\r\n\u003cp\u003eLos modelos educativos actuales requieren, para una adecuada práctica educativa, de docentes con capacidades profesionales de alto nivel que se sientan cómodos con el uso de las tecnologías digitales propias de la sociedad de la información.\u003c/p\u003e\r\n\r\n\u003cp\u003ePor ello, las instituciones de educación superior y de otros niveles educativos, están dando el siguiente paso, más allá de la alfabetización digital y capacitación docente en herramientas tecnológicas, hacia una formación del profesorado centrada en competencias digitales profesionales necesarias para la docencia en ambientes educativos digitales y entornos virtuales de aprendizaje.\u003c/p\u003e\r\n\r\n\u003cp\u003ePara la docencia digital, resulta imprescindible contar con habilidades propias de la educación mediada por tecnología; entre las cuales podemos destacar:\r\n\u003cul\u003e\r\n\u003cli\u003eEl diseño de planeaciones didácticas con enfoques de enseñanza, tutorías y experiencias de aprendizaje innovadoras.\u003c/li\u003e\r\n\u003cli\u003eLa aplicación de metodologías activas en el proceso de aprendizaje.\u003c/li\u003e\r\n\u003cli\u003eEl diseño de materias y cursos soportados en plataformas educativas (Moodle, Brightspace,Classroom, entre otras) y entornos de aprendizaje para ser impartidos a través de medios digitales.\u003c/li\u003e\r\n\u003cli\u003eEl diseño y aplicación de recursos digitales y recursos multimedia en los procesos de enseñanza.\u003c/li\u003e\r\n\u003cli\u003eLa adquisición e incremento de competencias digitales docentes; además de otras capacidades altamente valoradas en las instituciones educativas como: la participación activa, la creatividad, la innovación, el pensamiento crítico, la apertura al uso de tecnología educativa, la adaptación al cambio y la toma de decisiones.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eNo se debe perder de vista que la eficacia, la actitud y la visión con las que el profesor enfrente los desafíos de la era digital definirá, en muchos sentidos, la calidad de su práctica docente y de los procesos educativos en estos tiempos de crisis y en etapas futuras. Incidirá también en el nivel de empleabilidad en un contexto laboral situado cada vez más en entornos digitales que, de manera lógica, demandan un mayor uso de las TIC.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"70:Tc68,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEl liderazgo es, probablemente, uno de los fenómenos más estudiados por autores y pensadores a lo largo de la historia y tiene sus raíces desde siglos atrás.\u003c/p\u003e\r\n \r\n\u003cp\u003eIdentifica las principales teorías clásicas del liderazgo, sitúalas en su contexto histórico y estudia sus repercusiones para entender cómo ha surgido y qué características tiene el E-leadership (e-Liderazgo), aplicando sus distintas corrientes a las nuevas formas de trabajo online.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa contempla cursos que le permitirán al estudiante hacer un recorrido descriptivo por las principales corrientes del liderazgo (incluyendo el liderazgo electrónico), sus definiciones y características, para comprender sus alcances y aplicaciones.\u003c/p\u003e \r\n\r\n\u003cp\u003eEn los módulos del primer curso, el estudiante aprenderá la definición de liderazgo desde sus orígenes hasta sus primeras teorías y conceptualizaciones, que tuvieron su máxima expresión en la teoría del “Great Man” de Thomas Carlyle.\u003c/p\u003e\r\n\r\n\u003cp\u003eDe igual manera, el estudiante estudiará la evolución propia de los inicios del siglo XX con las teorías más relevantes, que hacían hincapié en la relación líder- seguidor, es decir, las teorías de liderazgo transaccional, liderazgo transformacional y liderazgo distribuido.\u003c/p\u003e\r\n\r\n\u003cp\u003eRevisará las teorías más recientes, denominadas liderazgo normativo o moral, como son el liderazgo en el servicio de Greenleaf, el liderazgo auténtico y el liderazgo humanista.\u003c/p\u003e\r\n \r\n\u003cP\u003eA raíz de la pandemia mundial originada por el virus SARS-CoV-2, vivimos en una realidad digitalizada. Al no poder salir a las calles como normalmente hacíamos, las actividades se han trasladado a posiciones remotas, incluso en ciudades y países diferentes. De aquí la importancia de seguir revisando el liderazgo y su evolución, ahora aplicándolo a una realidad diferente para los equipos de trabajo en una era digital. Es importante contar con líderes digitales (Digital leaders) que puedan usar las nuevas tecnologías de la información para la gestión de personas, el logro de metas organizacionales, la motivación de equipos, etc.\u003c/p\u003e\r\n \r\n\u003cp\u003eEn los módulos del segundo curso, centrado en el E-Leadership, el estudiante podrá comprender los orígenes del concepto y algunos de los principales exponentes, así como confrontar los retos de su propia formación en este tipo de liderazgo generado por la transformación digital.\u003c/p\u003e\r\n \r\n\u003cp\u003eConocerá cuáles son los medios que intervienen en el ejercicio del E-Leadership y podrá identificar aquellos que son más relevantes en el desempeño y gestión de los equipos de trabajo a distancia.\u003c/p\u003e\r\n\r\n\u003cp\u003eFormará y aplicará habilidades de comunicación y motivación para liderar equipos de alto desempeño en un mundo hiperconectado y será capaz de identificar y validar retos y oportunidades que se abren en un mundo digital.\u003c/p\u003e\r\n \r\n\u003cp\u003eLa Universidad Anáhuac, formando Líderes de Acción Positiva para el Siglo XXI desde hace más de 50 años, comparte y pone al alcance de líderes de todo el mundo este programa, que permitirá al alumno estar un paso adelante y generar un impacto positivo en la sociedad.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"71:T764,\u003cp\u003eEl programa MicroMasters en “e-Learning: crea actividades y contenidos para la enseñanza virtual” se basa en las últimas investigaciones realizadas en el ámbito de las Tecnologías de la Información - comunicación (TIC) y su aplicación a las teorías del aprendizaje.\u003c/p\u003e\r\n \r\n\u003cp\u003eNuestros cursos están basados en que puedas crear prácticamente cualquier tipo de contenido e-Learning de manera profesional, utilizando lo último en tecnología educativa y añadiendo elementos interactivos para transformar proyectos de formación tradicional, en cursos de enseñanza virtual innovadores y efectivos.\u003c/p\u003e \r\n\r\n\u003cp\u003eGracias a nuestra modalidad educativa podrás recibir tus clases en cualquier momento y compartir tus dudas y conocimientos con nuestra comunidad, adicional a esto obtendrás créditos académicos para respaldar tus conocimientos, competencias y habilidades en tecnologías educativas que te brindarán la oportunidad de optar a la Maestría en Dirección y Producción de e-Learning que se ofrece en modalidad virtual en la Universidad Galileo, (Pionera a nivel latinoamericano en educación virtual) \u003cp\u003eInscríbete ahora y en sólo 21 semanas conocerás todo respecto a las nuevas tecnologías educativas y las técnicas para diseñar y desarrollar materiales de aprendizaje virtual (e-Learning) efectivos que te permitirán optar a ofertas laborales. No esperes más y empieza a crear cursos virtuales interactivos que capten toda la atención de tus estudiantes.\u003c/p\u003e \r\n\r\n\u003cp\u003eLos alumnos que obtengan la credencial del programa MicroMasters pueden solicitar su admisión a la Maestría virtual en Dirección y Producción de e-Learning y la convalidación de los cursos del programa MicroMasters por 6 cursos del primer año de la Maestría virtual que totalizan 18 créditos académicos, y corresponden al 50 % del total de créditos del primer año.\u003c/p\u003e72:T11ed,"])</script><script>self.__next_f.push([1,"\u003cp\u003eVivimos en un mundo direccionado por los datos, donde las organizaciones públicas y privadas de todo tipo de origen, tamaño y naturaleza, cuentan con grandes cantidades de datos o big data que, procesados con herramientas y servicios, tienen el potencial de ayudar al crecimiento económico y social y crear nuevas oportunidades de mercado. El análisis de estos datos es conocido como inteligencia de negocios o business intelligence y es fundamental para la toma de decisiones.\u003c/p\u003e \r\n\r\n\u003cp\u003eEste Programa de Certificación Profesional, compuesto por dos cursos en línea, te ayudará a comprender este contexto actual y qué criterios deben tener en cuenta quienes formulan políticas públicas al momento de redactar o desarrollar leyes, regulaciones o políticas en materia de protección de datos y privacidad, así como aspectos prácticos de los programas de gobernanza de datos.\u003c/p\u003e \r\n\r\n\u003cp\u003eLos cursos online que hacen parte de este programa son: gobernanza de datos personales en la era digital y protección de datos personales en la era digital. Comienza a aprender sobre el manejo de los datos.\u003c/p\u003e\r\n\r\n\u003cp\u003eLa protección de los datos personales ha tomado gran importancia en los últimos años. Ello se debe a que las organizaciones de todo tipo se valen de herramientas tecnológicas y digitales que permiten organizar la información, incluyendo los datos personales, para darle tratamiento de manera más rápida, eficiente y efectiva. El avance tecnológico permite a las organizaciones, gobiernos, y agentes sociales, potenciar sus capacidades de operar y lograr sus metas y objetivos.\u003c/p\u003e\r\n\r\n\u003cp\u003eMientras que hace treinta años una visita al supermercado apenas involucraba intercambiar información sobre el valor de los productos para realizar el pago de los mismos, hoy por hoy existen supermercados que usan tecnología digital de la información y la comunicación para rápidamente identificar al comprador, identificar los productos que pone en su canasta, y sin necesidad de sacar dinero o tarjetas de crédito del bolsillo, hacer el pago automático simplemente saliendo de la tienda con los productos recién sacados del estante. Todo ello se logra gracias al procesamiento de información, entre ella datos personales (identificación, cuentas bancarias, hábitos de compra, etc.). Lo mismo ocurre cuando hay intercambios sociales, comerciales o de simple información en internet, a través de aplicaciones, a través de sitios web.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn este escenario rico en información y especialmente en datos personales, se requieren reglas para el adecuado manejo de este tipo de información. Esas reglas son especialmente importantes cuando la información compartida digitalmente se refiere a datos de salud, preferencia sexual, origen racial, creencias religiosas, información genética, número telefónico, origen étnico, opiniones políticas, información bancaria, entre otros datos personales. En este ámbito, asuntos como la implementación de protocolos de manejo de información, así como de medidas de seguridad para el manejo de los datos personales, son de suma importancia.\u003c/p\u003e\r\n\r\n\u003cp\u003eTodos aquellos agentes de la comunidad que realicen tratamiento de datos personales, especialmente en estos tiempos altamente digitales, deben poner la protección de los datos personales como una prioridad de sus organizaciones, de sus colaboradores, de sus directivos, de sus proveedores. Los titulares de los datos personales tienen derechos que han de ser protegidos y las organizaciones deben establecer mecanismos, procesos y protocolos para ello.\u003c/p\u003e\r\n\r\n\u003cp\u003eSi bien no todos los países tienen las mismas reglas, existen principios orientadores, aproximaciones similares, y otras diametralmente diferentes. Es importante que se conozcan los diferentes enfoques frente a la privacidad y los datos personales, ya que el mundo digital involucra muchas veces la interacción con agentes de otros países y sujetos a otras jurisdicciones.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste Programa de Certificación Profesional, compuesto por dos cursos en línea, te ayudará a comprender este contexto actual y qué criterios deben tener en cuenta quienes formulan políticas públicas al momento de redactar o desarrollar leyes, regulaciones o políticas en materia de protección de datos y privacidad, así como aspectos prácticos de los programas de gobernanza de datos.\r\nLos cursos online que hacen parte de este programa son: gobernanza de datos personales en la era digital y protección de datos personales en la era digital. Comienza a aprender sobre el manejo de los datos.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"73:T7b3,\u003cp\u003eLa necesidad de contar con la trazabilidad de los productos a lo largo de la cadena de suministro (ahora red de valor) es clave para cualquier tipo de negocio, por lo tanto, contar con un sistema estandarizado de identificación de productos como es el código de barras es el primer paso para lograr la eficiencia en sus procesos logísticos.\u003c/p\u003e\r\n\r\n\u003cp\u003eSin embargo, este sistema requiere de datos con calidad, donde se capturen la información correcta de cada atributo logístico no solo para poder gestionar los procesos logísticos, sino también por las exigencias y necesidades del consumidor final.\u003c/p\u003e\r\n\r\n\u003cp\u003eEs por esta razón, qué se diseñó este programa con el fin de responder a industriales, mayoristas, distribuidores, tenderos y demás eslabones de la cadena de suministro para que puedan adoptar el estándar Global Data Model, que nace en el 2018 a partir de la necesidad de mitigar los problemas en el intercambio de datos entre socios comerciales debido a la complejidad que existe al manejar diferentes modelos de datos a nivel nacional, mientras que el comercio se ha vuelve más multinacional.\u003c/p\u003e\r\n\r\n\u003cp\u003eA partir de este momento se establece que la industria debe cambiar a un conjunto alineado de atributos de datos obligatorios necesarios para enumerar y vender un producto, acordado a nivel mundial o regional, el cual facilite el intercambio de datos maestros y la eficiencia del comercio mundial.\r\nTeniendo presente esta problemática, en The Consumer Goods Forum se apoyó en sus proyectos, el acompañamiento en la resolución de esta necesidad empresarial.\u003c/p\u003e\r\n\r\n\u003cp\u003eDe esta manera usted podrá desarrollar la habilidad de identificar correctamente sus producto desde el empaque usando adecuadamente el código de barras, capturando la información con calidad lo que compete a la medición del producto, peso y características importantes adoptando el modelo global de datos correctamente y así comercializar de nivel mundial.\u003c/p\u003e74:Tb35,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEn el entorno laboral actual, es vital para los profesionales interpretar la gran cantidad de información cuantitativa a la que se tiene acceso, cada vez más tenemos que interpretar grandes volúmenes de datos (big data), ya sea analizando informes financieros o presentando datos de manera efectiva. Este programa de Certificación Profesional de vanguardia, ofrecido por EGADE Business School, escuela número uno de México y América Latina en Finanzas y Administración, te brindará la oportunidad de desarrollar estas habilidades de forma exitosa que son altamente requeridas por las empresas en el mercado laboral actual.\u003c/p\u003e\r\n\r\n\u003cp\u003eCon la ayuda de expertos, utilizarás ejercicios interactivos para aprender los fundamentos de matemáticas, estadística, ciencia de datos y finanzas, todos aplicados a los negocios.\u003c/p\u003e\r\n\r\n\u003cp\u003eLos temas cubiertos en este programa de Certificación Profesional te permitirán obtener una capacitación teórica y práctica a nivel de maestría o de posgrado para comprender mejor las funciones de la gerencia de negocios o business management; adicionalmente te preparará para continuar de forma exitosa tus estudios al decidir cursar la Maestría en Finanza o el MBA en EGADE.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa te entregará los conceptos clave que necesitas para la toma de decisiones directivas exitosas en tu empresa, tanto en el corto plazo como en el largo plazo. Por ejemplo para tomar decisiones financieras, decisiones monetarias o decisiones de inversión es necesario conocer la tasa de interés, los costos de oportunidad, dominar los modelos financieros, conocer el presupuesto de capital y el capital de trabajo, el valor del dinero, analizar el riesgo total, conocer sobre la banca de inversión, este programa te entregará las habilidades cuantitativas que necesitas profesionalmente para ser exitoso en la toma de decisiones empresariales.\u003c/p\u003e \r\n\r\n\u003cp\u003eLas habilidades cuantitativas te ayudarán a tomar mejores decisiones empresariales, por ejemplo te proporcionarán información para obtener la mayor rentabilidad posible basándose en las opciones de inversión y considerando las decisiones de financiación. Las finanzas corporativas pueden ayudar a la empresa en la creación de valor, a analizar sus recursos financieros/fondos propios, a conocer los activos reales con los que cuenta la empresa, o seleccionar los mejores proyectos de inversión basándose en el valor actual del dinero, a entregar ingresos basados en la política de dividendos y a conocer los análisis utilizados en los procesos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl programa también cubrirá la ciencia de datos, la cual ayuda en la toma exitosa de decisiones operativas y decisiones directivas basadas en el análisis de los datos, por ejemplo, tomando en cuenta la información que entregan los datos se puede determinar el uso eficiente de los recursos.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"75:Tb04,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCada vez es más común escuchar sobre el big data y el Data Science o ciencia de datos y cómo estos son necesarios para llevar al éxito a las organizaciones.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl análisis de datos y el big data están tomando cada vez más relevancia en las organizaciones hoy en día. De acuerdo al reporte de IBM: THE QUANT CRUNCH: HOW THE DEMAND FOR DATA SCIENCE SKILLS IS DISRUPTING THE JOB MARKET, se requiere de expertos en los datos en todas las áreas de las organizaciones para mejorar los procesos estratégicos, incrementar la eficiencia operativa, reducir costos e incrementar la productividad de las empresas. Los datos, además, ayudan a identificar de forma correcta los Indicadores clave del Negocio (KPIs Key Performance Indicators) y a la par, comprender su comportamiento para detectar situaciones de riesgo.\u003c/p\u003e\r\n\r\n\u003cp\u003eLa inteligencia de negocios es realmente importante en la actualidad, las organizaciones manejan una gran cantidad de datos, por lo cual es necesario poder procesar e interpretar esta información, para que así la organización pueda tomar decisiones informadas.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Certificación Profesional te permitirá conocer cómo la ciencia de datos aplicados permitirá la toma de mejores decisiones para una organización. Conviértete en un científico de datos con este programa en línea, compuesto por tres cursos y desarróllalo para que avances en tu carrera profesional.\u003c/p\u003e\r\n\r\n\u003cp\u003eSi es la primera vez que manejas datos o solo estás familiarizado con el uso de Excel, este programa te ayudará a conocer más sobre el análisis de datos para que así la toma de decisiones basada en grandes volúmenes de información sea la mejor. No necesitas ser un data scientist (científico de datos), para dominar la ciencia de datos y el procesamiento de datos, debido a la inteligencia artificial, el machine learning (aprendizaje automático), el deep learning (aprendizaje profundo) y la transformación digital, cada vez más es necesario resolver problemas complejos basados en la extracción de datos, para tomar las mejores decisiones, por ejemplo el departamento de recursos humanos, de marketing o un programador que usualmente manejan grandes cantidades de datos, se pueden beneficiar del procesamiento de datos para la toma de decisiones exitosas y el mejoramiento de procesos.\u003c/p\u003e\r\n\r\n\u003cp\u003eLos científicos de datos, se pueden beneficiar del análisis estadístico, y de los lenguajes de programación para obtener la información necesaria para realizar recomendaciones para la toma de decisiones que ayudarán a la organización, los conjuntos de datos pueden guiar en crear una mejor experiencia para el usuario, a entender las decisiones de compra, a evaluar precios, etc, este programa te mostrará cómo los datos pueden ser tu aliado profesional.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"76:T10b0,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEste programa de Certificación Profesional incluye diferentes temáticas de la realidad energética moderna, principalmente en América Latina, con el fin de beneficiar a cualquier persona interesada en temas de sustentabilidad energética con especial interés en la conversión de ingenieros al sector energético y el desarrollo de especialistas de perfil técnico en temas de sustentabilidad energética, para que desarrollen su propio punto de vista en relación al consumo energético, energías renovables, el futuro del sector energético con el Smart Grid y más\u003c/p\u003e\r\n\r\n\u003cp\u003eLos diferentes temas de sustentabilidad energética, que pudieran llegar a ser especializados se diseñaron para ofrecer información valiosa y de actualidad para un público amplio interesado en el sector eléctrico. El cambio climático, nos ha obligado a pensar en el ahorro energético, ya que los combustibles fósiles son limitados (por ejemplo el gas natural), influyendo en la cantidad de energía que consumimos, al igual que es necesario pensar en la reducción de las emisiones debido a su impacto en el medio ambiente. En este programa conocerás sobre cómo el consumo de electricidad moderado y las medidas de eficiencia energética pueden llevar al uso eficiente de la energía, llevando a un ahorro energético que no impacte el desarrollo económico, pero que tenga un impacto positivo en las fuentes de energía y en el medio ambiente.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl programa también se enfocará en el Smart grid y cómo la gestión energética se puede llevar a cabo a través de los sistemas de gestión de las redes inteligentes. A medida que el mundo continúa desarrollándose la demanda de energía aumenta y allí radica la importancia de proyectos de eficiencia energética, incluyendo la gestión de energía y los servicios energéticos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Certificación Profesional incluye los siguientes cursos:\u003c/p\u003e\r\n\r\n\u003cbr/\u003e\u003cbr/\u003e\u003cstrong\u003eEnergía eléctrica: conceptos y principios básicos\u003c/strong\u003e\u003c/br\u003e\r\nA través de este curso se revisarán y explicarán los conceptos de voltaje, corriente y potencia en un circuito eléctrico, a través de diversos recursos didácticos para determinar la eficiencia en el consumo de la energía eléctrica/ahorro de energía. Para llegar a un desarrollo sostenible, a la reducción del consumo y a implementar el potencial de ahorro de electricidad es necesario conocer cómo funciona la energía eléctrica, cómo llega la \"luz\" a los diferentes lugares, y muchos otros principios básicos. \r\n\r\n\u003cbr/\u003e\u003cbr/\u003e\u003cstrong\u003eTransmisión de energía eléctrica\u003c/strong\u003e\u003c/br\u003e\r\nSe revisarán conceptos básicos de los sistemas eléctricos de potencia, los cuales se relacionan con la generación de energía eléctrica hasta la forma en que esta llega al consumidor final. Te adentrarás en las subestaciones eléctricas y en las líneas de transmisión, por lo que podrás conocer sus elementos, fallas y protecciones que requieren. Por último, darás un breve vistazo al caso de la reforma energética de México.\r\n\r\n\u003cbr/\u003e\u003cbr/\u003e\u003cstrong\u003eSmart grid: las redes eléctricas del futuro \u003c/strong\u003e\u003c/br\u003e\r\nEn este curso aprenderás cómo las redes inteligentes son una alternativa tecnológica efectiva y eficiente cuando se administran redes de energía eléctrica que requieren de una calidad de energía alta en su consumo y generación, además de poder contar con una administración eficiente de la energía para poder detectar fallas en la red eléctrica. De la misma manera la necesidad de los países para unificar la forma de administración energética a través de redes inteligentes es presentada y estudiada.\r\n\r\n\u003cbr/\u003e\u003cbr/\u003e\u003cstrong\u003eSmart grid: fundamentos técnicos\u003c/strong\u003e\u003c/br\u003e\r\nEn este curso aprenderás los fundamentos técnicos de una smart grid; la configuración de las capas inferiores y la forma en que se interconectan los dispositivos, casas y edificios inteligentes (internet of things) a la red inteligente de manera general.\r\n\r\n\u003cp\u003e\u003cbr/\u003eLos cursos en línea de este programa son parte del proyecto 266632 “Laboratorio Binacional para la Gestión Inteligente de la Sustentabilidad Energética y la Formación Tecnológica” financiado a través de Fondo CONACYT SENER de Sustentabilidad Energética (S0019201401).\u003c/p\u003e"])</script><script>self.__next_f.push([1,"77:T79a,\u003cp\u003eObtén una base sólida en habilidades cuantitativas esenciales en pensamiento económico, algorítmica básica y modelos de regresión lineal y pronósticos, para tener éxito como un mejor tomador de decisiones en tu trayectoria profesional.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn el entorno laboral actual, es vital para los profesionales generar e interpretar una gran cantidad de información cuantitativa a la que se tiene acceso, ya sea por medio de distintas bases de datos de indicadores económicos, o bien, presentando de forma efectiva modelos estadísticos por ellos mismos. Este programa de vanguardia, ofrecido por EGADE Business School, la escuela de negocios del Tecnológico de Monterrey y escuela #1 en México y América Latina en Finanzas y Administración, te brindará la oportunidad de desarrollar estas habilidades que son altamente requeridas por las empresas por medio del plan de estudios de este programa.\u003c/p\u003e\r\n\r\n\u003cp\u003eCon la ayuda de expertos, utilizarás ejercicios interactivos para aprender los fundamentos del pensamiento económico,análisis estadístico, algorítmica básica y modelos de regresión lineal y de pronósticos.\u003c/p\u003e\r\n\r\n\u003cp\u003eLos temas cubiertos en este programa de Certificación Profesional te permitirán obtener una capacitación teórica y práctica a nivel de maestría o de posgrado para comprender mejor las funciones de la gerencia de negocios o business management; adicionalmente te prepararán para continuar tus estudios al decidir cursar la Maestría en Finanza, el MBA, la Especialidad en Estrategia Digital o la Maestría en Business Analytics en EGADE.\u003c/p\u003e \r\n\r\n\u003cp\u003eEste programa por medio de métodos estadísticos, análisis económico, información estadística y métodos cuantitativos, permitirá que el estudiante analice un conjunto de datos estadísticos para así en el corto y largo plazo se puedan tomar decisiones basadas en el análisis de datos que sean beneficiosas para la organización.\u003c/p\u003e78:T789,\u003cp\u003eLa transformación digital en las empresas está cambiando la manera en la que el s"])</script><script>self.__next_f.push([1,"er humano vive y trabaja. Este programa de vanguardia, ofrecido por EGADE Business School, escuela #1 en América Latina en Negocios (QS Global MBA Ranking Latin America 2018-2020), te permitirá entender cuáles son los elementos en la industria que están acelerando su cambio. El marco general de los negocios y las grandes tendencias de innovación están entrelazadas con el entorno sociopolítico, el económico, el medioambiente y de la salud pública.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa está dirigido a los profesionales de las áreas de ingeniería, sistemas de información y negocios, así como a todos aquellos profesionistas interesados en enfrentar retos y encontrar oportunidades de transformación digital dentro de su organización.\u003c/p\u003e \r\n\r\n\u003cp\u003eEl constante cambio en el mundo de los negocios ante este entorno nos permite identificar estrategias ganadoras que empresas de los sectores de manufactura y servicios (financieros, consultoras, educativas, entretenimiento) están realizado con el apoyo de tecnologías innovadoras las cuales ubican al ser humano como centro y eje rector en la transformación digital.\u003c/p\u003e\r\n\r\n\u003cp\u003eA través de diálogos profundos sobre el análisis del entorno y las oportunidades, tendrás acceso a casos empresariales, testimonios profesionales, conocimiento teórico y práctico basada en experiencia de profesionales en la materia; de igual forma, mediante conversaciones bidireccionales de expertos en temas de estrategia e innovación tecnológica se enriquecerá tu conocimiento y perspectiva sobre la actualidad.\u003c/p\u003e\r\n\r\n\u003cp\u003eLos temas cubiertos en el programa serán de utilidad para crear tu propia autoevaluación del estado de transformación digital en el que tu empresa o proyecto empresarial se encuentra para delinear esa hoja de ruta que te ayude a definir tu propia transformación digital.\u003c/p\u003e79:T646,\u003cp\u003eContinuamente buscamos materializar las soluciones que puedan ser aplicadas en un proyecto social. Esto nos lleva a pasar a la acción, a diseñar e implementar y a pensar con las manos en funci"])</script><script>self.__next_f.push([1,"ón del contexto social.\u003c/p\u003e\r\n\r\n\u003cp\u003eBasados en la concepción de que los proyectos sociales generan valor e influyen positivamente en las personas y sus comunidades, se presenta este x-series que te permitirá crear soluciones tecnológicas a través de Protothinking®️ y te facilitará la implementación de prototipos funcionales.\u003c/p\u003e\r\n \r\n\u003cp\u003eEn el primer curso aprenderás los conceptos y frentes de acción del Protothinking®️, la ruta de prototipado guiada por unas premisas y facilitada por una caja de herramientas digitales. Podrás partir desde cero ensamblando un proyecto social para prototipar y validar sus estrategias o avanzar a nuevas versiones de aquellas ya validadas.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn el segundo curso aprenderás a implementar prototipos funcionales que requieran un intercambio de información e intervención en el mundo físico con el apoyo de dispositivos electrónicos e internet.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn esta serie de cursos, encontrarás respuestas a las siguientes preguntas:\r\n\u003cul\u003e\r\n\u003cli\u003e¿Cómo definir un reto social en mi comunidad?\u003c/li\u003e\r\n\u003cli\u003e¿Cómo planificar el trabajo en equipo?\u003c/li\u003e\r\n\u003cli\u003e¿Cómo pasar a la acción a partir de técnicas de prototipado centradas en el usuario?\u003c/li\u003e\r\n\u003cli\u003e¿Cómo aterrizar las estrategias recurriendo a técnicas digitales de prototipado rápido?\u003c/li\u003e\r\n\u003cli\u003e¿Cómo gestionar las estrategias sociales en un contexto de Revolución 4.0?\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003c/p\u003e7a:T7fc,\u003cp\u003eLa comunicación estratégica y de relaciones públicas para los negocios digitales es fundamental al momento de proponer nuevos esquemas de trabajo basados en soluciones digitales derivadas de estrategias de comunicación y marketing digital, tanto para redes sociales, como para la construcción de medios de comunicación digital que consideren escritura web, planificación de contenido para social media, y la sistematización de procesos a partir de la inteligencia con base de datos y la responsabilidad corporativa de la comunicación interna.\u003c/p\u003e\r\n\r\n\u003cp\u003eA partir de la democratización tecnológica y la disminución de "])</script><script>self.__next_f.push([1,"la brecha digital a nivel mundial, la comunicación estratégica y de relaciones públicas impulsó nuevos retos organizacionales en el plan de acción estratégico de los medios digitales, así como en la transformación de esfuerzos sociales, culturales y comerciales en entornos digitales.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn la era digital, sin un plan de comunicación que contemple posicionar la oferta de emprendimientos digitales que conecta multidimensionalmente con los usuarios a partir de canales de comunicación hipermediáticos, obligaría a destinar las acciones de comunicación y la estrategia de contenido al territorio de la sobre oferta, poca o nula interactividad y otros escenarios de riesgo que afectarían a corto, mediano o largo plazo.\u003c/p\u003e\r\n \r\n\u003cp\u003ePor tal motivo, la siguiente certificación tiene por finalidad dotar al estratega de las herramientas digitales que congregan las nuevas tecnologías a partir de una visión que contemple la comunicación efectiva deriva del cambio de hábitos en las audiencias, quienes a partir de su navegación selectiva interactúan en el mundo digital estableciendo una competencia basada en la economía de la atención cuya ecuación implica conocer rasgos culturales así como elementos derivados de la arquitectura de la información y los buscadores de distintas plataformas digitales y dispositivos móviles que son los elementos clave al momento de interactuar.\u003c/p\u003e7b:T982,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa dinámica actual de las ciencias de la salud exige una gran solidez en la formación técnica y científica, trabajo con la mejor evidencia disponible, experiencia profesional y respeto por las expectativas y necesidades de las personas. Para lograr esto, cada día es más importante investigar, producir nuevo conocimiento y generar evidencia sólida que permita tomar decisiones, garantice el mejor ejercicio profesional, aporte a cada disciplina, a los pacientes y a la sociedad en general\u003c/p\u003e\r\n\r\n\u003cp\u003eEl micromaster ofrece una formación en investigación orientada a las ciencias de la salud, siendo este un campo de conocimiento necesario para los profesionales que deseen obtener las competencias requeridas para realizar procesos de investigación científica, teniendo en cuenta que esta se caracteriza por su enfoque inter y transdisciplinar, en el que participan personas y comunidades. El Micromaster en Fundamentos de Investigación en Ciencias de la Salud brinda herramientas para proponer, evaluar y desarrollar proyectos de investigación en el área de la salud.\u003c/p\u003e\r\n\r\n\u003cp\u003eA través del estudio de cada curso, podrá adquirir nuevos conocimientos para la toma de decisiones a partir del planteamiento de un proyecto de investigación, la implementación de una metodología, el análisis de datos y de los resultados de la investigación, buscando la apropiación de fundamentos teóricos y metodológicos para que el estudiante identifique problemáticas, susceptibles de ser intervenidas.\u003c/p\u003e\r\n\r\n\u003cp\u003eAsí mismo se busca profundizar desde la mirada de la bioética, en los problemas que se originan en la interacción de la vida con la tecnología para favorecer la toma de decisiones que protejan los derechos humanos y valores como la vida, la salud, la libertad, la intimidad, la diversidad, entre otros. También se proveen herramientas estadísticas para analizar la información resultante de los procesos de investigación, así como metodologías propias de la investigación en el contexto de las ciencias de la salud a través casos prácticos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl micromaster puede ser cursado por profesionales en formación y graduados interesados en la investigación científica en las áreas de la salud, la biomédica, bioetádística, la innovación biotecnológica, y demás personas interesadas en explorar problemáticas sociales relacionadas con las condiciones de salud de las poblaciones.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"7c:T60d,\u003cp\u003eHoy en día, el análisis de información es vital para la toma de decisiones en las empresas y para medir el desempeño de las mismas, por lo que es importante crear bases de datos que permitan realizar análisis estadísticos simples, bivariados y multivariados.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl programa de Certificación Profesional \u003cb\u003e“Análisis de datos para la toma de decisiones empresariales”\u003c/b\u003e, está integrado por 2 cursos impartidos por el Dr. Samuel Reyes, Vicedecano de la Facultad de Ciencia, Tecnología e Industria de Universidad Galileo y especialista en manejo de datos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn el primer curso \u003cb\u003e“Análisis estadístico con Excel”\u003c/b\u003e aprenderás los conceptos estadísticos básicos para realizar un análisis aplicado de datos utilizando Excel. \u003c/p\u003e\r\n\r\n\u003cp\u003eEn el segundo curso \u003cb\u003e“Análisis multivariable en SPSS”\u003c/b\u003e conocerás y aplicarás varios métodos de análisis de datos multivariables, para el diseño de productos considerando sus características multi atributos o para segmentar mercados.\u003c/p\u003e\r\n\r\n\u003cp\u003eAl finalizar el \u003cb\u003eprograma de Certificación Profesional de “Análisis de datos para la toma de decisiones empresariales” en la ruta verificada\u003c/b\u003e obtendrás 3 certificados que validarán el conocimiento adquirido en cada uno de los cursos. \u003c/p\u003e\r\n\r\n\u003cp\u003eCertificados verificados a obtener:\r\n\u003cul\u003e\u003cli\u003eAnálisis estadístico con Excel\u003c/li\u003e\r\n\u003cli\u003eAnálisis Multivariable en SPSS\u003c/li\u003e\r\n\u003cli\u003ePrograma de Certificación Profesional de “Análisis de datos para la toma de decisiones empresariales”\u003c/li\u003e\u003c/ul\u003e\r\n\u003c/p\u003e7d:T6b4,\u003cp\u003eEl mercado global día a día nos exige mayores resultados para ser competitivos y mantener las empresas actualizadas con respecto a nuevas tecnologías y tendencias innovadoras del mercado.\r\n\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Certificación Profesional te enseñará a mejorar los procesos logísticos para para compañías de cualquier sector económico que por sus características propias son denominadas micro y pequeñas empresas-MYPES, de tal manera que desarrolles herramientas "])</script><script>self.__next_f.push([1,"estratégicas para aumentar la sostenibilidad de tu negocio y logres mantenerte conectado con las necesidades del cliente final y las exigencias a lo largo de la cadena de valor.\u003c/p\u003e\r\n\r\n\u003cp\u003eQueremos dar respuesta a: \u003cbr\u003e\r\n¿Cómo diseñar mi cadena de abastecimiento?\u003cbr\u003e\r\n¿Cómo realizar órdenes de compra y adquisiciones eficientes?\u003cbr\u003e\r\n¿Cómo llevar de mejor manera procesos de gestión de inventario?\u003cbr\u003e\r\n¿Cómo optimizar los tiempos de entrega de tus productos?\u003cbr\u003e\r\n¿Por qué pensar en trabajo colaborativo en la red de valor?\u003cbr\u003e\r\n\u003c/p\u003e\r\n\r\n\u003cp\u003eAprenderás de la mano de expertos sobre temas de planeación, gestión de la demanda, operaciones, colaboración, innovación y un conjunto de actividades guiados hacia buenas prácticas logísticas para garantizar la sostenibilidad de tu empresa y satisfacción de consumidores finales.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl programa de Logística para micro y pequeñas empresas - MYPES esta compuesto por cuatro cursos en línea, los cuales cubrirán los principales temas logísticos para que emprendedores, comercializadoras, micro empresas y pequeñas empresas desarrollen las habilidades necesarias para hacer más eficientes los procesos estratégicos, tácticos y operativos de la empresa.\u003c/p\u003e7e:T717,\u003cp\u003eEn este programa de Certificación Profesional tendremos la oportunidad de aprender las bases del lenguaje de programación C. Se trata de un programa introductorio, orientado a todo el público, tanto si tiene experiencia previa en programación como si no.\u003c/p\u003e\r\n\u003cp\u003eLa experiencia de aprendizaje está adaptada para que se haga de forma escalonada, empezando por los conceptos más básicos hasta conocer aspectos más complejos de este lenguaje de programación.\r\nEl programa se acompaña de numerosos ejemplos y ejercicios para que el aprendizaje resulte práctico y divertido.\u003c/p\u003e\r\n\u003cp\u003eEste programa de Certificación Proseional está dividido en tres cursos en línea, que te guiarán paso a paso por el proceso de aprendizaje de la programación en C.\u003c/p\u003e\r\n\u003cp\u003eEl lenguaje de programación C se sigue"])</script><script>self.__next_f.push([1," utilizando en muchas universidades y centros de enseñanza para adentrarse en el mundo de la programación. Conocer sus fundamentos te ayudará a mejorar tus habilidades de programación y te facilitará aprender el manejo de otros lenguajes.\u003c/p\u003e\r\n\u003cp\u003eEl programa está impartido por los profesores responsables de las asignaturas de introducción a la programación del Grado en Ingeniería informática y del Grado en Ingeniería de Tecnologías y Servicios de Telecomunicación de la Universidad Autónoma de Madrid. Ambos cuentan con años de experiencia en la enseñanza de la programación y en el uso de metodologías novedosas para acercar el aprendizaje de la programación a todos los estudiantes.\u003c/p\u003e\r\n\u003cp\u003eTanto si nunca has programado antes, como si ya tienes experiencia con otros lenguajes, este programa de Certificación Profesional te ayudará a conocer los fundamentos de este lenguaje; y sentarás las bases para que puedas seguir profundizando y mejorando tus habilidades en el futuro.\u003c/p\u003e7f:T76a,\u003cp\u003eLa mejor forma de entender exactamente qué es la logística 4.0, es conocer bien qué ocurría en épocas anteriores. Si hoy hablamos de una Industria o Logística de cuarta generación, es porque antes hubo una Logística 1.0, 2.0 y 3.0. Bueno, en realidad, lo primero que debemos saber es que el término se ha modernizado un poco debido a una clara influencia de la “jerga informática” utilizada para designar nuevas versiones de software o sus diferentes actualizaciones, con sucesivas cadenas numéricas: 1.0, 1.1, 2.4, 3.0, etc. Pero en realidad, cuando hablamos de Industria 4.0 hablamos de algo que nos suena mucho más familiar si le otorgamos su nombre original: la cuarta Revolución Industrial. La logística necesaria para el tipo de industria que surge a partir de esta cuarta revolución acoge esta misma terminología y de ahí el término de Logística 4.0.\u003c/p\u003e\r\n\r\n\u003cp\u003eLa logística 4.0 de esta manera se apropia del avance en la tecnología para la resolución de problemas complejos de manera eficiente, p"])</script><script>self.__next_f.push([1,"or lo cual en este contesto la analítica de datos toma un papel importante. La analítica de datos permite a las organizaciones hoy día analizar grandes volúmenes de información para generar conocimiento que apoye la toma de decisiones en toda la cadena de abastecimiento.\u003c/p\u003e\r\n\r\n\u003cp\u003ePython es un lenguaje de programación lanzado en 1991, creado por Guido Van Rossum. Hoy día es uno de los lenguajes de programación de código abierto más utilizados por la comunidad científica para el desarrollo de soluciones analíticas, con paquetes de probabilidad, estadística, generación de gráficos, Big Bata, Machine Learning, optimización, entre otros.\u003c/p\u003e\r\n\r\n\u003cp\u003ePython permite emplear métodos analíticos actualizados de manera gratuita, lo que ayuda a las personas que lo conozcan generar valor en las organizaciones para convertir datos en conocimiento.\u003c/p\u003e80:Tb57,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe program teaches the principles and practice of MBSE - Model-Based Systems Engineering, using Object-Process Methodology - OPM. Conceptual modeling of a system's requirements, concept, and architecture is a first, critical stage in a successful process of developing any system. Recognized as ISO 19450, OPM is founded on a simple, universal ontology of objects and processes that transform them. It is a compact graphical and textual modeling language for conceptual modeling of complex systems of all kinds.\u003c/p\u003e\r\n\r\n\u003cp\u003eSince in OPM objects and processes can be modeled as physical or informatical, it is ideal for modeling cyber-physical systems (CPSs), such as the Internet of Things (IoT) and Industry 4.0, where the digital twin is prevalent, and fusing hardware and software is imperative.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program’s underlying philosophy and guideline are that systems and software engineering are complementary, and a systems engineer must know the principles of both to thrive in the modern Industry 4.0 environment. OPM is key to achieving this engineering education objective because it is geared to easily and naturally specify software-intensive socio-technical systems, which also involve humans in the loop. Unlike SysML, which has nine kinds of diagrams, OPM has just one. Moreover, OPM represents the model in both graphics and natural language text, catering to the human dual channel processing and facilitating model comprehension.\u003c/p\u003e\r\n\r\n\u003cp\u003eThe program blends and balances systems science and engineering theory with practical modeling using OPCloud - OPM Cloud-based modeling environment, which is embedded in edX. The methodology part of OPM entails how to approach the problem of modeling, architecting, and designing new systems, as well as analyzing existing ones. You will learn how to define and model the problem at hand, the function of the system aimed to solve the problem, the stakeholders, the beneficiary group, and the benefit they are expected to gain. Turning to a detailed specification of the solution system, product, or service, things get more complex. During the program, you will learn the process of system design and development using MBSE with OPM. The course content was produced to be informative and entertaining. You will model various real-life systems in OPM – mainly technological, but also social and natural. Learning is made interactive through diverse, engaging exercises and interaction with OPCloud with real-time detailed feedback. \u003c/p\u003e\r\n\r\n\u003cp\u003eThe course \"MBSE 102 - Model-based Systems Engineering: Advanced Approaches with OPM\" is a continuation for MBSE 101.\r\nTherefore, learners must take MBSE 101 before taking MBSE 102, since it is a prerequisite.\r\nThe new run for MBSE 101 will start on October 27th, 2019. \u003c/p\u003e\r\n\r\n\u003cimg alt=\"technion\" height=\"102\" src=\"https://www.edx.org/sites/default/files/technionlogo.png\" width=\"230\" /\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"81:T73b,\u003cp\u003eDespite all the remarkable technological breakthroughs that we have made over the past few decades, the threat from infectious diseases has significantly accelerated. In this online course, we will learn why this is the case by looking at the fundamental scientific principles underlying epidemics/pandemics and the global/public health actions behind their prevention and control in the 21st century.\r\nExplore the science, prevention and control of epidemics in this program. In addition to lectures by leading scientists in this field from HKU, this program will feature panel discussions on Ebola and Zika Outbreak, Anti-vaccination and more, with world leading experts in epidemics.\u003c/p\u003e \r\n\r\n\u003cp\u003e“If history is our guide, we can assume that the battle between the intellect and will of the human species and the extraordinary adaptability of microbes will be never-ending.” (1)\u003c/p\u003e\r\n\r\n\u003cp\u003eThis program covers the following topics:\r\n\u003cul\u003e\r\n\u003cli\u003eOrigins of novel pathogens.\u003c/li\u003e\r\n\u003cli\u003eAnalysis of the spread of infectious diseases.\u003c/li\u003e\r\n\u003cli\u003eMedical and public health countermeasures to prevent and control epidemics.\u003c/li\u003e\r\n\u003cli\u003ePanel discussions involving leading public health experts with deep frontline experiences to share their views on risk communication, crisis management, ethics and public trust in the context of infectious disease control, including Ebola and Zika Outbreak, Anti-vaccination and more.\u003c/li\u003e\r\n\u003cli\u003eSupplementary modules on next generation informatics for combating epidemics.\u003c/li\u003e\r\n\u003cli\u003eSupplementary modules on SARS-COV-2 and COVID-19.\u003c/li\u003e\r\n\u003c/ul\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003e--------------------------------------------------------\u003c/p\u003e\r\n\u003cp\u003e(1) Fauci AS, Touchette NA, Folkers GK. Emerging Infectious Diseases: a 10-Year Perspective from the National Institute of Allergy and Infectious Diseases. Emerg Infect Dis 2005 Apr; 11(4):519-25.\u003c/p\u003e82:Tc30,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLas competencias transversales (soft skills) son esenciales en prácticamente todos los puestos de trabajo actuales y complementan a las competencias técnicas (hard skills) para construir un perfil exitoso de las personas que abanderan/representan el talento de una organización.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa proporciona habilidades para trabajar en equipo en un entorno remoto, algo que ya es habitual en todas las instituciones y empresas y que cada vez lo será más, y para lo que no existe prácticamente formación específica (ni en los estudios universitarios ni en los programas de formación ejecutiva ofertados tradicionalmente).\u003c/p\u003e\r\n\r\n\u003cp\u003ePara este programa hemos seleccionado un conjunto de tres competencias transversales cruciales (Trabajar en equipo, Influir positivamente en el comportamiento de las personas del equipo y comunicarse de manera efectiva con ellas). Estas competencias siempre han estado incluidas en el Top10 de las competencias necesarias para trabajar en entornos presenciales y están entre las más frecuentes en las demandas de empleo.\u003c/p\u003e\r\n\r\n\u003cp\u003eTodas las organizaciones se enfrentan a un entorno de trabajo disruptivo donde están emergiendo nuevos paradigmas que afectan a la gestión de las personas y aun no somos capaces de saber cuál de ellos permanecerá. Sin embargo, hay unanimidad en asumir que el futuro inmediato será más digital que el presente que estamos viviendo.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn entornos remotos el trabajar en equipo, liderar y comunicar son, si cabe, más esenciales y, además, más complejas de desempeñar. Por ello, queremos ayudar a preparar a las personas que ocupan puestos de mando o que participan en equipos de trabajo a adaptar estas tres competencias a contextos de trabajo más digitales.\u003c/p\u003e\r\n\r\n\u003cp\u003ePor un lado, no existe una experiencia asentada en la selección y activación de los comportamientos adaptados al entorno remoto, y por otro, tampoco es habitual encontrar cursos específicos donde se refuercen estos nuevos comportamientos. Debemos tener presente que no siempre se manifiestan igual que en entornos presenciales y hay que activar unos recursos personales diferentes. Por ejemplo, en entornos virtuales la comunicación escrita o visual juega un papel más importante en relación a la verbal; las instrucciones se interpretan de forma totalmente diferente si no se dan con precisión; y la tendencia a sentirse aislado e independiente debe combatirse con herramientas y habilidades que permitan recordar que seguimos siendo un equipo.\u003c/p\u003e\r\n\r\n\u003cp\u003ePor otro lado, la riqueza de los canales remotos, a pesar de los avances, no está al nivel de la presencialidad y, además, requiere de ciertas habilidades de interacción con la tecnología para mostrar la cercanía que estas tres competencias requieren, a pesar de la distancia física entre los participantes.\r\nConstruiremos el aprendizaje mediante recursos digitales, ejemplos de experiencias, auto-diagnósticos de las personas inscritas y feedback de pares para completar una información 360º que permita trazar un plan de acción de gestión de cada una de las competencias.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"83:T9b6,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEl internet de las cosas (IoT) conlleva a que todas las industrias tengan una constante transformación tecnológica denominada hoy como la revolución 4.0. Grandes investigaciones revelan que la interconexión de dispositivos inteligentes crece a pasos agigantados, gracias a los avances tecnológicos en las redes de comunicación de alta capacidad y esto ha permitido una revolución en sectores como la industria, la salud y la agricultura.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl paradigma de IoT hace parte de las recientes tecnologías que propenden ayudar a mejorar los procesos industriales. Este programa de Certificación Profesional te ayudará a desarrollar el pensamiento analítico y a forjar nuevas habilidades para generar innovadoras soluciones a problemas críticos en el campo industrial. Al generar un nuevo enfoque en el proceso de aprendizaje práctico activo, en conjunto con el uso de herramientas actuales para el desarrollo de aplicaciones en el ecosistema de IoT, este programa ayuda a desarrollar habilidades para ser más competitivos en el campo laboral.\u003c/p\u003e\r\n\r\n\u003cp\u003eAprende los fundamentos de IoT de la mano del grupo de profesores de la Universidad del Rosario, del programa de Ingeniería Biomédica. En este programa de Certificación Profesional de IoT aprenderás los conceptos de la tecnología. Aprenderás a manejar herramientas avanzadas para la gestión de proyectos en el campo de programación web, sistemas de almacenamiento, gestión de bases de datos, tecnologías en comunicación y sistemas de toma de decisiones.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn cada uno de los cursos en línea te enfrentarás a una serie de desafíos basados en investigaciones y aplicaciones actuales que se llevan a cabo en diferentes sectores industriales. A través de estos desafíos, podrás mejorar tus conocimientos sobre conceptos claves y demostrar tus habilidades en el lucrativo ámbito de la transformación digital 4.0.\u003c/p\u003e\r\n\r\n\u003cp\u003eCon más de 5 años de trayectoria, el grupo de investigadores de la Universidad del Rosario ha estado a la vanguardia en el campo de la tecnología y su rápida evolución. Nuestra distinguida facultad está encantada de compartir contigo más de 3 años de investigación y desarrollo interdisciplinar, así como innovación educativa en el ámbito de IoT.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa de Certificación Profesional está compuesto por:\r\n\u003cul\u003e\u003cli\u003eIntroducción al Internet de las cosas (IoT) y sus aplicaciones\u003c/li\u003e\r\n\u003cli\u003eInternet de las cosas (IoT) y Big Data\u003c/li\u003e\u003c/ul\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"84:T94b,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEl mercado laboral actual demanda \u003cstrong\u003ehabilidades de inteligencia de negocios\u003c/strong\u003e. Para ello, te guiaremos a través de dos cursos en los que aprenderás \u003cstrong\u003ecómo cumplir objetivos empresariales \u003c/strong\u003ecomo: reducir costos, analizar datos, optimizar operaciones, anticipar demanda, tomar decisiones acertadas y obtener información valiosa de tus clientes. Todo, a partir de data que habrás sabido extraer, recolectar, integrar, depurar y analizar. Podrás integrar datos a repositorios y convertirlos en información de valor. Sabrás cómo usar herramientas y software de business intelligence. \u003c/p\u003e\r\n\r\n\u003cp\u003eEste \u003cstrong\u003e Programa de Certificación Profesional en Business Intelligence \u003c/strong\u003e está compuesto de dos cursos desarrollados por \u003cstrong\u003e Jorge Samayoa, Ph.D. por la Universidad de Purdue \u003c/strong\u003e. Tendrás el respaldo de su experiencia como consultor en big data, Director de la Maestría de Investigación de Operaciones en Universidad Galileo y docente universitario.\u003c/p\u003e\r\n\r\n\u003cp\u003eEl primer curso online de \u003cstrong\u003eestadística aplicada a negocios \u003c/strong\u003ete dará acceso a videos, ejemplos profesionales y ejercicios prácticos. Te permitirá conocer \u003cstrong\u003e criterios para tomar decisiones \u003c/strong\u003ea partir del análisis de datos e información relevante. Iniciarás utilizando herramientas como \u003cstrong\u003eExcel \u003c/strong\u003epara el análisis de datos y serás capaz de utilizar probabilidad, de trabajar con estimadores, de utilizar econometría y de realizar análisis regresional.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn el segundo \u003cstrong\u003ecurso \u003c/strong\u003e aprenderás sobre decision making: \u003cstrong\u003ecómo tomar decisiones empresariales a partir de datos. \u003c/strong\u003eSerás capaz de utilizar sistemas para recolectar datos (OLAP), modelos para tomar de decisiones, sistemas de soporte para la toma de decisiones (DSS), buenas prácticas de inteligencia de negocios, herramientas y software. Podrás utilizar \u003cstrong\u003ePower BI como herramienta de inteligencia de negocios \u003c/strong\u003e. Tendrás acceso a tutoriales guiados y casos prácticos aplicados a negocios para reforzar tu conocimiento.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste es tu momento de \u003cstrong\u003eavanzar profesional. \u003c/strong\u003e Anímate a inscribirte en los dos cursos del \u003cstrong\u003e Programa de Certificación Profesional en Inteligencia de Negocios \u003c/strong\u003e. Notarás un \"antes\" y un \"después\" en tu carrera profesional.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"85:Ta3d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa importancia del software para la sociedad es tan evidente que habla por sí sola. La tecnología software ha pasado a formar parte del día a día de millones de personas hasta el punto de que sin ella el cambio sería sumamente radical en sus vidas. La vida es hoy más fácil para las personas gracias a que el software nos permite hacer infinidad de cosas.\u003c/p\u003e\r\n\r\n\u003cp\u003eDesde el punto de vista empresarial, el software marca la diferencia entre las empresas, determinando, en gran parte, su productividad y beneficios. Así optimiza tareas, incrementa ganancias, aumenta ingresos, logra objetivos específicos y optimiza tiempos.\u003c/p\u003e \r\n\r\n\u003cp\u003eEn este programa de Certificación Profesional, Desarrollo y gestión de proyectos informáticos dentro de la disciplina de Ingeniería del software, aprenderás cómo desarrollar, mantener, gestionar y controlar servicios y sistemas software que satisfagan todos los requisitos del usuario y se comporten de forma fiable y eficiente.\u003c/p\u003e \r\n\r\n\u003cp\u003eSe mostrarán principios, métodos, procedimientos, herramientas y técnicas de la Ingeniería del Software con el propósito de que el estudiante sea capaz de participar eficientemente en todas las fases y actividades de un proyecto software. En este sentido, se definirán los pasos y tareas que ayuden a garantizar la producción sistemática, el mantenimiento, la evaluación, el control y la gestión de los procesos durante todo el ciclo de vida y de los productos software desarrollados en el plazo fijado y dentro del coste estimado.\u003c/p\u003e\r\n\r\n\u003cp\u003eDurante el programa se aprenderá a identificar y analizar problemas y diseñar, desarrollar, implementar, verificar y documentar soluciones software sobre la base de un conocimiento adecuado de las teorías, modelos y técnicas actuales, así como a dirigir y reconducir un proyecto software con el propósito de finalizarlo con éxito. También se presentan distintas metodologías y ciclos de vida con el propósito de ayudar a la consecución de un proyecto software.\u003c/p\u003e\r\n\r\n\u003cp\u003eFinalmente, dada la importancia de la comunicación en la vida personal y profesional en general y en el éxito de un proyecto en particular, se enseñarán técnicas y recursos para mejorar la comunicación oral y escrita con el fin de mejorar el flujo de los procesos software, aumentar la productividad del equipo de trabajo y la calidad de los resultados finales.\u003c/p\u003e\r\n\r\n\u003cp\u003eAdemás, teniendo en cuenta que los proyectos software se llevan a cabo en equipo, se mostrarán también dinámicas de motivación de grupos, así como diferentes conocimientos para mejorar el trabajo en equipo.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"86:T900,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAprende a identificar los elementos de la inteligencia artificial que han impactado en los negocios. Conocerás las nuevas herramientas en Aprendizaje Máquina y cómo aplicarlas para la toma de decisiones exitosas para la empresa, considerando las buenas prácticas y los códigos de ética que vienen implícitos en el uso de las nuevas herramientas digitales.\u003c/p\u003e\r\n\r\n\u003cp\u003eLa tecnología digital se ha convertido en un componente sumamente importante en el estilo de vida de las personas del siglo XXI. Las redes sociales, el internet de las cosas y las nuevas tecnologías de procesamiento de datos han permitido nuevos avances y aplicaciones que dan pie a un mejor aprovechamiento de las computadoras en beneficio de la humanidad.\u003c/p\u003e\r\n\r\n\u003cp\u003eUno de los sectores que se ha visto beneficiado de estos nuevos avances tecnológicos son los negocios. Muchas de las empresas líderes de la era digital han basado sus prácticas en el análisis de datos y toma de decisiones con base en sistemas de inteligencia artificial, tal es el caso de Uber, Amazon o Facebook. Muchas otras, como Wal-Mart, han buscado dar un giro a sus acciones de venta mediante técnicas de aprendizaje máquina y aprendizaje profundo.\u003c/p\u003e \r\n\r\n\u003cp\u003eLa inteligencia artificial aplicada a los negocios permite mejorar los procesos operativos e incluso, mejorar la calidad de productos y la satisfacción de clientes. Es vital aprender a utilizar las nuevas tecnologías de la inteligencia artificial para aprovechar al máximo las herramientas computacionales y ser parte de los nuevos modelos de negocios que basan sus decisiones en datos.\u003c/p\u003e\r\n\r\n\u003cp\u003eEn esta certificación profesional se busca preparar a las personas para que identifiquen los elementos de la inteligencia artificial que han impactado en los negocios; saber utilizar estos nuevos elementos y tomar en cuenta las buenas prácticas y los códigos de ética que vienen implícitos en el uso de las nuevas herramientas digitales.\u003c/p\u003e\r\n\r\n\u003cp\u003eA su vez, se busca brindar de herramientas en informática para mejorar los procesos operativos haciendo un repaso por las principales aplicaciones y plataformas para mejorar la experiencia de trabajo.\u003c/p\u003e\r\n\r\n\u003cp\u003eSe parte de la revolución 4.0 y aprende como mejorar tu negocio con las herramientas de la inteligencia artificial.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"87:T723,\u003cp\u003eEl mundo de la Inteligencia Artificial (IA) ya no es ciencia ficción. La IA está penetrando rápidamente todas las industrias e impactando cada aspecto de nuestra vida diaria. Ya sea que seas un profesional de la industria, un ejecutivo, un emprendedor o un estudiante, desarrollar una comprensión fundamental de la IA y su impacto en tu organización y nuestra sociedad es de suma importancia y transformará tu carrera profesional.\u003c/p\u003e\r\n\r\n\u003cp\u003eEste programa está destinado a aquellos con poca o ninguna experiencia en Inteligencia Artificial, informática o ciencia de datos y no requiere ninguna habilidad de programación. Cada curso está diseñado para proporcionar una comprensión relevante y aplicable de los conceptos básicos de la IA y sus múltiples aplicaciones y casos de uso en diversas industrias. También se profundizará en temáticas como el aprendizaje automático (machine learning), el aprendizaje profundo (deep learning), las redes neuronales (neural networks) y el procesamiento del lenguaje natural (natural language processing).\u003c/p\u003e\r\n\r\n\u003cp\u003eA medida que avanzas en el programa, también se presentarán los servicios de inteligencia artificial de IBM Watson que permiten a cualquier empresa implementar fácilmente inteligencia artificial preconstruida en toda su empresa. Cuando estés listo, puedes desarrollar temas más complejos en nuestro programa de Certificación Profesional completo de 6 cursos de IA Aplicada donde podrás desarrollar e implementar aplicaciones basadas en IA.\u003c/p\u003e\r\n\r\n\u003cp\u003eA través de interacciones prácticas con varios entornos y aplicaciones de IA, también aprenderás sobre la creación de asistentes virtuales inteligentes y cómo se pueden aprovechar en diferentes escenarios en tu trabajo actual o como una forma de impulsar tu próxima carrera profesional.\u003c/p\u003e88:T671,\u003cp\u003eWith 25 million more project professionals being needed globally by 2030 (Project Management Institute), the demand for talented individuals with good underpinning IT knowledge is exploding. This Inform"])</script><script>self.__next_f.push([1,"ation Technology (IT) Fundamentals course is designed specifically for non-technical professionals who want to collaborate effectively with IT teams and make informed decisions. \u003c/p\u003e\n\u003cp\u003eIn this course, you'll learn the essentials of hardware, operating systems, and the foundational concepts of software, programming, and databases. You’ll explore how different types of hardware function, from printers to display devices, and how operating systems manage files and folders. Plus, you’ll discover the basics of software applications, web browsers, programming languages, and how databases store and manipulate data. \u003c/p\u003e\n\u003cp\u003eYou'll also gain an understanding of networking, including network topologies, cables, and how to manage network settings. You’ll learn about storage solutions, from local devices to hosted systems. Plus, you’ll be introduced to cybersecurity fundamentals, covering key concepts like data integrity, threat management, and safe browsing practices. \u003c/p\u003e\n\u003cp\u003eAs you learn, you’ll work on hands-on labs that enable you to apply your new skills in a practical setting. And you’ll test your knowledge with a comprehensive assessment and gain insights into troubleshooting and ticketing systems for IT support. \u003c/p\u003e\n\u003cp\u003eIf you’re a project-oriented professional looking to build a strong, non-technical understanding of IT for your job, ENROLL TODAY and build the job-ready IT skills you need in just 6 weeks.\u003c/p\u003e89:T414,\u003cp\u003eThis course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. \u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and "])</script><script>self.__next_f.push([1,"monitor results in a much more effective way. \u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam. \u003c/p\u003e\n\u003cp\u003eIn this course, you will learn the basic concepts of information systems and their application. \u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish\u003c/p\u003e8a:T4b9,\u003cp\u003eThis course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology.\u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way.\u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam.\u003c/p\u003e\n\u003cp\u003eIn this Computer Science course we will deal with cybersecurity and various other social aspects of ICT, such as its effect on globalization, business strategy and other economic processes, ergonomics, cloud computing and professionalcareers in the field of ICT.\u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish).\u003c/p\u003e8b:T433,\u003cp\u003eThis course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. \u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technol"])</script><script>self.__next_f.push([1,"ogy to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way. \u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam. \u003c/p\u003e\n\u003cp\u003eIn this course you will learn the basic hardware concepts on which information systems and communications networks are based \u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish).\u003c/p\u003e8c:T4de,\u003cp\u003eThis course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. \u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way. \u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam. \u003c/p\u003e\n\u003cp\u003eIn this course, you learn the basics of software project management, reviewing basic project management concepts and roles, system development lifecycle, tools and methods used in software development, standards. used in the development and the design of the user interface of a computer system. \u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish).\u003c/p\u003e8d:T522,\u003cp\u003eThis course is one of the 5 courses of an introductory business information systems"])</script><script>self.__next_f.push([1," series, designed to introduce you to the amazing world of Information Technology. \u003c/p\u003e\n\u003cp\u003eThe series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way. \u003c/p\u003e\n\u003cp\u003eThe syllabus of the series is based on the CLEP Information Systems and Computer Applications exam. \u003c/p\u003e\n\u003cp\u003eIn this course you will learn the basics of software programming. We will address the basic logic behind any computer program, what types and structures of data and files are used, how object-oriented programming works, database management and SQL language and various concepts and guidelines in web development such as HTML, XML, CSS or javascript, among others. \u003c/p\u003e\n\u003cp\u003eBy completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish).\u003c/p\u003e8e:T879,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe experience of war has changed fundamentally - not only for those fighting and reporting, but also for those on the home front. High-tech nations wage wars from a distance using satellite-guided weaponry while non-state military actors, terrorist organizations, and citizen journalists have increasingly added new voices and visual perspectives to the conversation about conflict.\u003c/p\u003e\n\u003cp\u003eThe ubiquity of smartphones, internet access, and social media transports the experience and complexity of war directly into our lives. Cyberspace offers greater freedoms and access to information at the same time as we discover a dramatic global rise of cyber espionage, internet censorship, and surveillance.\u003c/p\u003e\n\u003cp\u003eIn this course, we map this emerging new terrain where violent conflict, information technology, and global media intersect and where the old distinctions between battlefront and home front, between soldier and civilian, between war and entertainment, and between public and private are being redrawn.\u003c/p\u003e\n\u003cp\u003eConsidering these changes, this course engages with questions surrounding:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe relationship between media, information technology, and war\u003c/li\u003e\n\u003cli\u003eHow violent conflict is presented in the media and the responsibilities of journalists during wartime\u003c/li\u003e\n\u003cli\u003eThe effect of instantaneous, worldwide reporting on battle and the politics of conflict\u003c/li\u003e\n\u003cli\u003eHow we can understand and critically engage with media and information technology\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eIn order to engage with these questions, this course is taught through a number of conventional and unconventional forms of learning methods and activities. These include lecture videos, questionnaires, and discussion fora. But it also includes practical, experiential elements taught through crowdsourcing, individual research, critical viewing, media and image analysis, and surveys. Combined, these activities allow you to gain fresh and timely insights into what happens beneath the surface of the screen in front of you. They enable you to gain a deeper understanding of how the politics of today's wars play out on and behind the digital screens in our hypermediatized age.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"8f:T580,\u003cp\u003eBig data is transforming the health care industry relative to improving quality of care and reducing costs--key objectives for most organizations. Employers are desperately searching for professionals who have the ability to extract, analyze, and interpret data from patient health records, insurance claims, financial records, and more to tell a compelling and actionable story using health care data analytics. \u003c/p\u003e\n\u003cp\u003eThe course begins with a study of key components of the U.S. health care system as they relate to data and analytics. While we will be looking through a U.S. lens, the topics will be familiar to global learners, who will be invited to compare/contrast with their country's system. \u003c/p\u003e\n\u003cp\u003eWith that essential industry context, we'll explore the role of health informatics and health information technology in evidence-based medicine, population health, clinical process improvement, and consumer health. \u003c/p\u003e\n\u003cp\u003eUsing that as a foundation, we'll outline the components of a successful data analytics program in health care, establishing a \"virtuous cycle\" of data quality and standardization required for clinical improvement and innovation. \u003c/p\u003e\n\u003cp\u003eThe course culminates in a study of how visualizations harness data to tell a powerful, actionable story. We'll build an awareness of visualization tools and their features, as well as gain familiarity with various analytic tools.\u003c/p\u003e90:T610,\u003cp\u003eWhether on their own, connected to a local network, or plugged into the internet, computers are central to many usual tasks and routines. It's important for young people to develop their knowledge of how these devices work so that they can appreciate the impact of computers and networks on the world around them.\u003c/p\u003e\n\u003cp\u003eIn this 3-week course, you'll explore how to build young learners' knowledge in an age-appropriate manner. You'll start by thinking about how you can help your learners recognise information technology and how computers process an input to give an output.\u003c/p\u003e\n\u003cp\u003eIn the second week of the course, you"])</script><script>self.__next_f.push([1,"'ll learn about the key pieces of technology that allow us to connect computers to networks and the advantages that networks can bring. You'll also consider how you can make the concept of a computer network relevant to young learners.\u003c/p\u003e\n\u003cp\u003eBy the end of week 2, you'll be able to explain to your learners why the internet and the World Wide Web are not the same thing, as well as help them identify a range of services that run over the internet. \u003c/p\u003e\n\u003cp\u003eIn the third week, you'll investigate other computer systems that consist of many devices working together.\u003c/p\u003e\n\u003cp\u003eYoung people also need to understand how to act on the internet \u0026mdash; both for their own safety and to contribute to a pleasant online environment. You'll think about the skills and attitudes that young people need and how you can help them develop these not only while teaching about computer networks but also more generally across the curriculum.\u003c/p\u003e91:T9d5,"])</script><script>self.__next_f.push([1,"This course will focus on the multiple challenges to freedom of expression brought about by the technology revolution of the last two decades. On one hand, it has given the world the means to realize its commitment to freedom of information without frontiers. Technology has shaped, reshaped, and radically transformed the production and distribution of information, profoundly impacting whole societies and greatly influencing, if not defining, information and communication. On the other hand, it has also precipitated or heightened a range of normative, regulatory and political issues related to the protection of free speech, on and offline. This course will examine the complex, and often awkward, interplay of global information flows with national jurisdiction and state sovereignty, its effects on democracy and fundamental rights, and what it means for the realization of a borderless vision for the right to freedom of expression.\u003cbr /\u003e \u003cbr /\u003e The course is comprised of recorded lectures. Dr. Agnes Callamard, the Director of \u003ca href=\"https://globalfreedomofexpression.columbia.edu/\"\u003eColumbia Global Freedom of Expression\u003c/a\u003e and the UN Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions, who led the \u003ca href=\"https://www.ohchr.org/EN/Issues/Executions/Pages/Inquiry.aspx\"\u003ehuman rights investigation into the murder of Jamal Khashoggi\u003c/a\u003e, will deliver the lectures. Supplementary lectures by international experts will provide additional information on topics addressed by the main lectures or additional issues which could not be included in the core course. Students will be actively invited to consult the supplementary videos to strengthen their knowledge. Weekly readings will be assigned from classic philosophical works on the concept of freedom of expression, key texts of international human rights law, significant decisions of international and national courts, as well as relevant news stories and video clips. The course will provide access to case analyses from Columbia University's Global Case Law Database to illustrate the issues as well as for course assignments. Most readings will be freely available on the Internet.\u003cbr /\u003e \u003cbr /\u003e This Advanced Course was preceded by a Foundational Course, which introduces the international system of protection for freedom of expression. Enrolling in the Foundational Course is recommended before undertaking this Advanced Course to those who are not familiar with international human rights law and freedom of expression issues."])</script><script>self.__next_f.push([1,"92:T84a,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAccessibility is essential for individuals and organizations that want to create high-quality websites and apps – and not exclude people from using their products and services. This course gives you the foundation in accessibility you need to excel in digital professions. It is designed for:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003edevelopers\u003c/li\u003e\n\u003cli\u003edesigners\u003c/li\u003e\n\u003cli\u003econtent authors\u003c/li\u003e\n\u003cli\u003eproject managers\u003c/li\u003e\n\u003cli\u003epeople with disabilities\u003c/li\u003e\n\u003cli\u003eand others\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eOptional material help you learn more about the topics you are most interested in.\u003c/p\u003e\n\u003cp\u003eIn this course, you will learn about the international standards for web accessibility from the W3C – including Web Content Accessibility Guidelines (WCAG) and WAI-ARIA for Accessible Rich Internet Applications – and first steps in applying them.\u003c/p\u003e\n\u003cp\u003eYou will also learn the broad scope of web accessibility, how people with disabilities use different assistive technologies and adaptive strategies, the business benefits of web accessibility, and where to find W3C resources on implementing accessibility. \u003c/p\u003e\n\u003cp\u003eThe course is structured so that you can focus on the topics that you are most interested in. Optional activities and additional materials provide more learning on specific topics. Learn \u003ca href=\"https://www.w3.org/WAI/courses/foundations-course/#what-you-get-from-the-course\" rel=\"noopener\" target=\"_blank\"\u003emore\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eDon’t miss this unique course from the \u003ca href=\"https://www.w3.org/WAI/\" title=\"W3C Web Accessibility Initiative (WAI)\"\u003eW3C Web Accessibility Initiative (WAI)\u003c/a\u003e in cooperation with the \u003ca href=\"https://iite.unesco.org/\" title=\"UNESCO IITE\"\u003eUnited Nations Educational, Scientific and Cultural Organization (UNESCO) Institute for Information Technology in Education (IITE)\u003c/a\u003e. It brings together international expert trainers from Deque, Infoaxia, Intopia, Knowbility, The Paciello Group, and Web Key IT, and implements the open curriculum developed by the \u003ca href=\"https://www.w3.org/WAI/about/groups/eowg/\" title=\"W3C WAI Education and Outreach Working Group\"\u003eW3C WAI Education and Outreach Working Group (EOWG)\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"93:T5eb,\u003cp\u003eAccording to Indeed.com in August 2022, the average annual salary for Technical Support is $51,758, though it can go considerably higher. The need for technology is constantly growing, as is the job market for tech support professionals.\u003c/p\u003e\n\u003cp\u003eIn this course you’ll get an insider’s view into IT Support work. Learn about IT Support roles and levels, the support escalation matrix, ticketing systems, common support tools, and remote support software. \u003c/p\u003e\n\u003cp\u003eTo help you with moving into the field, the course covers tech support career opportunities and career pathways from experienced, expert Information Technology professionals. \u003c/p\u003e\n\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\n\u003cp\u003e- Describe and develop a customer service and support mindset.\u003c/p\u003e\n\u003cp\u003e- Explore the features and benefits of ticketing systems.\u003c/p\u003e\n\u003cp\u003e- Identify support tools and systems used in technical support.\u003c/p\u003e\n\u003cp\u003e- Define the levels of IT support and the escalation matrix. \u003c/p\u003e\n\u003cp\u003e- Explore various tech support roles and responsibilities, including service-level agreement responsibilities.\u003c/p\u003e\n\u003cp\u003e- Recognize the career paths and progression in Technical Support.\u003c/p\u003e\n\u003cp\u003eThis course provides several real-world inspired activities to demonstrate your skills in the areas of support tools, resolving IT issues, escalations and ticketing.\u003c/p\u003e\n\u003cp\u003eThese skills will help you engage prospective employers and ask insightful questions that demonstrate your knowledge of the day-to-day role-related responsibilities.\u003c/p\u003e94:T66a,\u003cp\u003eIf you’re ready to enter the world of Information Technology (IT), you need job-ready skills. Understanding the fundamentals of computer hardware and operating systems is critical to any technology related job role like Technical Support or Software Development.\u003c/p\u003e\n\u003cp\u003eThis course introduces you to the brain of a computer—its operating system software, where you’ll become familiar with the fundamentals of the Microsoft Windows operating system. You’ll gain skills to describe internal key hardware comp"])</script><script>self.__next_f.push([1,"uter components, including motherboard components, central processing unit (CPU) memory, hard drives, expansion slots, and more.\u003c/p\u003e\n\u003cp\u003eThis course will equip you with the knowledge to identify the various hardware connections, including categories of ports, add-on peripherals such as mice, and other hardware components. And you’ll learn the basics, including standard workstation setup, commonly used operating system settings, screen capture commands, and best-in-class troubleshooting practices.\u003c/p\u003e\n\u003cp\u003eThis course provides hands-on experience with a real-world inspired project to add to your portfolio, demonstrating your hardware and operating systems knowledge with troubleshooting malfunctioning computer systems.\u003c/p\u003e\n\u003cp\u003eThis course is for anyone new to IT and computer hardware or who wants to start an IT support-related profession as a Help Desk Support Specialist, IT Support Specialist, Virtual Customer Service Agent, or Technical Support Representative. And those interested in showcasing their analytical and evaluation skills through hands-on practice labs to become job-ready with real-world skills.\u003c/p\u003e95:T87e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eGIS is a framework for gathering, managing, and analyzing data. Using the principles of geographic science, it integrates many types of geospatial data, analyzes their relationships, and organizes them in layers of information for visualization and improved understanding. This free online course focuses on ESRI’s ArcGIS software, the industry standard within GIS software. Jack Dangermond, CEO of ESRI, describes GIS as “uncovering meaning and insights from within data.”\u003c/p\u003e\n\u003cp\u003eParticipants in this course will learn GIS concepts and fundamentals, tools, and processing applicable to problems in a variety of fields, including cartography, remote sensing, data science, public health, health care, information technology, social science, urban planning, government, and business. Your enrollment in this course will prepare you to work with spatial data and conduct spatial data analysis with datasets and geographic data.\u003c/p\u003e\n\u003cp\u003eThis self-paced course is designed for self-study. Coursework covers GIS applications of real-world problems, and prepares learners for more advanced applications such as 3D GIS and GIS Image Analysis, the two other GIS courses in the GIS Essentials Professional Certificate program. This course can be taken individually as an elective or as part of this larger specialization.\u003c/p\u003e\n\u003cp\u003eGIS, once an esoteric technology limited to geographers and data scientists, is now available to everyone. Thousands of organizations in virtually every field are using GIS to analyze data, make maps that reveal patterns and relationships, share insights, and solve complex problems of local to global significance in the areas of sustainability, land use, watershed mapping, and more. The ability to conduct this kind of geospatial analysis and conduct web mapping is a skill growing in relevance to employers.\u003c/p\u003e\n\u003cp\u003eVerified track learners will receive one-year ArcGIS Pro Desktop (Windows) license with support only for tools used in the course in addition to unlimited course access and a verified certificate.\u003c/p\u003e\n\u003cp\u003eSign up for this online course or full GIS certificate today to expand your skillset in geographic information systems.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"96:T4a5,\u003cp\u003eInthis course, part of the C Programming with Linux Professional Certificate program,you will learn to use logical statements and arrays in C. Logical statements are used for decision-making with follow-up instructions, based on conditions you define. Arrays are used to store, keep track of, and organize larger amounts of data. You will furthermore implement some fundamental algorithms to search and sort data.\u003c/p\u003e\r\n\u003cp\u003eWithin moments of this course, you will be coding hands-on in a new browser tool developed specifically for this course, receiving instant feedback on your code. No need to install anything!\u003c/p\u003e\r\n\u003cp\u003eWhy learn C? Not only is it one of the most stable and popular programming languages in the world, it's also used to power almost all electronic devices. The C programming language represents one of the building blocks of modern computer information technology.\u003c/p\u003e\r\n\u003cp\u003eBy the end of this course, you will have gained experience with programming concepts that are foundational to any programming language and be one step closer to a career in computer engineering.\u003c/p\u003e\r\n\u003cp\u003eThis course has received financial support from the Patrick \u0026amp; Lina Drahi Foundation.\u003c/p\u003e97:T492,\u003cp\u003eMaintaining and updating software is an important activity for a Technical Support role. There are many types of software, and understanding software can be overpowering. This course introduces the fundamentals of software and how to manage software from an information technology (IT) perspective. You'll be introduced to various types of software, ranging from the operating system running on your mobile phone to the applications that run databases on your computer at work. You'll also learn about cloud computing, web browsers, software development, programming languages, and database fundamentals.\u003c/p\u003e\n\u003cp\u003eAfter completing this course, you will better understand software processes and gain confidence in using and securing software applications. You will also review installing and managing web browsers, extensions, and plug-ins and"])</script><script>self.__next_f.push([1," keeping web browsers secure and updated.\u003c/p\u003e\n\u003cp\u003eAdditionally, you'll discover how cloud-based technologies help businesses create and deploy applications faster. This course provides several real-world inspired hands-on labs and activities to demonstrate your skills in programming with Python and working with a database.\u003c/p\u003e98:T4f8,\u003cp\u003eIn this Capstone, you will demonstrate your ability to perform in an Information Technology (IT) Support role by applying your new knowledge to real-world situations. You will practice analyzing user help requests and troubleshooting various issues that a Tech Support role would encounter.\u003c/p\u003e\n\u003cp\u003eYou’ll demonstrate your knowledge of hardware, software, networking, security, and cloud computing – all areas with which a tech support role interacts regularly. You'll also showcase your knowledge and understanding of escalation, levels of support, ticketing systems, and other support tools and systems, as well as communication and customer service skills for delivering technical support.\u003c/p\u003e\n\u003cp\u003eThis course also includes a final exam that contains questions on the topics and style found in the CompTIA IT Fundamentals (IFT+) Certification Exam. It serves as this program’s final exam, helps you practice for the Certification, and measures your preparedness. By the end of the Capstone course, you’ll be equipped with the technical support skills that are found in everyday professional settings.\u003c/p\u003e\n\u003cp\u003eBefore taking this course, it is highly recommended that you first complete all the previous courses in the IBM IT Support Professional Certificate.\u003c/p\u003e99:Tf16,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAs the PMBOK® Guide aptly states, “projects are performed by people and for people,” (page 9, 7th Edition). \u003c/p\u003e\n\u003cp\u003ePeople drive projects. Period. \u003c/p\u003e\n\u003cp\u003eAs experienced project managers, we are continuously working with stakeholders to maintain good relationships to ensure that their expectations are in alignment with the goals of the project. Having effective people management skills is a crucial component of project management experience to achieving project success. \u003c/p\u003e\n\u003cp\u003eLinked to the Leadership skill area of the PMI Talent Triangle® as well as linked to the people domain of the PMP Certification exam, this course will place focus on managing the expectations and relationships of the people involved in projects. To achieve the project goals, it is important to have the knowledge, skills and behaviors needed to guide, motivate and/or direct others. People skills are crucial in achieving success. One way to effectively motivate others is to show them what they can achieve through collaboration and cooperation. Project leaders are constantly helping project stakeholders see the potential for success by demonstrating knowledge, skills and behaviors related to people. \u003c/p\u003e\n\u003cp\u003eThere are a variety of skills that will be covered in the course, such as negotiation, active listening, emotional intelligence, and servant leadership. These powerful skills can be incredibly helpful throughout the lifecycle of your projects, so it’s important that project professionals learn them well.\u003c/p\u003e\n\u003cp\u003eIn this course learners will cover the core interpersonal skills and key techniques to effectively manage the expectations and the relationships with project stakeholders: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eIdentifying project stakeholders\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003ePlanning resource needs\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eSharing the vision of the project with your stakeholders\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eEducating your stakeholders on the methodology and framework used in the project environment and business environment\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eKeeping your stakeholders informed in the predictive vs. the agile environment\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eMotivational theories\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eAddressing interpersonal conflicts\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eEmotional intelligence\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDecision making techniques\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCommunications management.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLearners will uncover the importance of managing expectations and relationships effectively and how to create a positive work environment and build good relationships with team members. This is an essential skill for any project manager, and this course will focus on how to manage the expectations of others, both internally and externally. By doing so, you can help your team and organization stay productive and successfully meet the goals of the project..\u003c/p\u003e\n\u003cp\u003eBy the end of the course, learners will be able to confidently identify the stakeholders of a project and determine the appropriate strategies to manage expectations and maintain a productive working relationship with team members and all stakeholders. This is an important competency in any industry, whether it be healthcare, information technology, government, private-sector, or non-profit. Additionally, upon successful completion of this course, learners can earn 8 contact hours of project management education or professional development units which are recognized by the Project Management Institute (PMI). A total of 35 contact hours (PDUs) in project management education are a requirement (see PMI.org) to those looking to achieve the Project Management Professional (PMP®) credential. Learners will finish this PMP certification course with increased knowledge of the better practice tips to engage stakeholders and be more than ready to continue their project management and PMP® journey, which we hope completes your certificate with us.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"9a:Tff7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course promotes a “grand strategy” approach to how climate change and demographic trends – along with the ascendancy of a global majority middle class – transform our global economy from its historic East-West paradigm to one dominated by North-South dynamics. This is a crucial perspectives for anyone involved in international trade and the globalization of markets.\u003c/p\u003e\n\u003cp\u003eThe world economy is undergoing three structural changes, each of which are enough – on their own – to define a new era of globalization . The first is climate change, which decimates lower latitudes (developing countries), denying them the benefits of globalization, while paradoxically empowering higher latitude global markets. The second is demographic aging unfolding at great rapidity across America, Europe, and Asia (Japan in particular). The third is the ascendancy of a majority global middle class whose huge resource requirements, per economists of all stripes, will drive future global economic growth – if this South-centric mass of humanity can successfully navigate climate change’s devastating impact.\u003c/p\u003e\n\u003cp\u003ePut them together and the world trade is facing an unprecedented tilting of its geopolitical axis from one historically oriented East-West to one dominated by North-South dynamics (e.g., mass northward migrations by climate refugees [see the US-Mexico border today]). The world’s 21st-century superpowers (United States, European Union, Russia, China, India) will thus compete in helping smaller powers survive and navigate these world-restructuring dynamics, in effect entering into a superpower “brand war” to win (first) economic and (then) political allegiance from among these more vulnerable nation-states.\u003c/p\u003e\n\u003cp\u003eIn this new form of competition – one that will unfold as much in the cyber realm as the real world, superpowers will seek to address the majority global middle class’s quest for stability, prosperity, and security. Having achieved consumer status for the first time, these billions, largely centered in the Global South (per World Bank statistics), will naturally be attracted to those superpowers most adept at creating a sense of geopolitical “belonging” in larger unions anchored by their large financial markets that facilitate their export-driven growth. We are already witnessing this strategic offering in processes like the EU’s state-accession model and China’s Belt and Road Initiative — despite the recent increase in trade barriers (tariffs) and their effects on international markets.\u003c/p\u003e\n\u003cp\u003eEmploying a “grand strategic” perspective, this MOOC is the first to explore that cluster of tectonic changes as they transform our world, offering competitive advantages to some international businesses while generating lessons and understanding for anyone involved in information technology, economic policy, foreign markets, and foreign direct investment.\u003c/p\u003e\n\u003cp\u003eScientists estimates that species the world over are forced by climate change to increase their evolutionary speed by roughly 10,000 times. The same will be true of humans and all their enterprises: reconfiguring national borders, disrupting labor markets, reshaping capital markets, triggering financial crises, altering how and why multinational corporations engage in outsourcing, and altering global capitalism and its free trade rule-set to its very core.\u003c/p\u003e\n\u003cp\u003eIn combination, climate change, demographic transitions and the emergence of a global majority middle class alter the very nature of economic activity this century (liberalization of investments, role of trade agreements, strategic partnerships among great powers), sending different countries down wildly different paths that beg the question: Exactly what is globalization going forward?\u003c/p\u003e\n\u003cp\u003eIn sum, if broad-framing macroeconomic change is a skill-set you want to master, this course lays the groundwork for your understanding of how globalization affects us all by altering our planet, transforming our societies, and recasting this world order of American creation.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"9b:T632,\u003cul\u003e\n\u003cli\u003eHow climate change will trigger the biggest geographic transfer of resource wealth in human history – super-empowering the New North while beggaring the Global South\u003c/li\u003e\n\u003cli\u003eHow climate change will drive South-to-North human migrations far beyond anything the world currently witnesses, triggering state failure across lower latitudes and supercharging angry nationalism and populism across higher-latitude states.\u003c/li\u003e\n\u003cli\u003eHow demographic aging across the Global North will permanently transform those nations and their markets.\u003c/li\u003e\n\u003cli\u003eHow globalization’s unfolding is largely driven by nations embracing a demographic transition from high-birth/death rates to low-birth/death rates, allowing for a “demographic dividend” that enables economic integration into global value chains.\u003c/li\u003e\n\u003cli\u003eHow the ascendancy of a majority global middle class re-runs the geopolitical experiment that was the Eurasian continent’s successive “world wars” of the early 20th century, as both Left (communism) and Right (fascism) sought to control that process.\u003c/li\u003e\n\u003cli\u003eHow superpowers will compete in “brand wars” to earn the economic, network, political, and security allegiance of smaller states threatened by these structural shifts.\u003c/li\u003e\n\u003cli\u003eHow the Western Hemisphere (North/Central/South America \u0026amp; Caribbean) are unusually advantaged relative to the Eastern Hemisphere (Europe, Africa, Asia) for the North-South integration to come.\u003c/li\u003e\n\u003cli\u003eHow to process all these tectonic changes and world-restructuring dynamics from a grand strategic perspective.\u003c/li\u003e\n\u003c/ul\u003e9c:T764,\u003cp\u003eIl mondo moderno è sempre più dipendente dall’Informatica e conoscerne i fondamenti e le relative applicazioni risulta essenziale per comprendere il funzionamento degli attuali Sistemi di Elaborazione delle Informazioni, oramai diffusi nei contesti più disparati ed imprescindibili per molte delle attività della nostra vita quotidiana. Il corso di Fondamenti di Informatica si propone di fornire ai discenti le nozioni preliminari alla "])</script><script>self.__next_f.push([1,"base dell’informatica, ed in particolare quelle relative al trattamento delle informazioni mediante procedure “automatizzabili”. In tale ottica, il corso avrà per oggetto lo studio della rappresentazione delle informazioni, dell'architettura del calcolatore e degli algoritmi e programmi. Saranno nel contempo fornite tutte le competenze teoriche, metodologiche e pratiche fondamentali per la realizzazione di programmi di limitata complessità attraverso linguaggi di programmazione ad alto livello, con particolare riferimento alla programmazione strutturata ed al linguaggio C/C++ . \u003c/p\u003e\n\u003cp\u003eThe modern world is ever more dependent on computer science and information technology advances, and it has become essential to know the related basics and relevant applications so we can understand how the information systems, which we encounter in multiple and unexpected apsects of our everyday life, work. The Fundamentals of Informatics course aims to provide learners with the basic notions underlying computer science, especially the way information is processed using “automatable” procedures. The focus of the course, therefore, is on information representation, computer architecture, algorithms and programming. Learners will also acquire the necessary theory, methodologies and practice to design their own fairly simple programmes using high-level programming language, especially structured programming and C/C++ languages.\u003c/p\u003e9d:T5e6,\u003cp\u003ePrinciples of Economics mainly talks about the microscopic part of economics principles, that is, microeconomics. Microeconomics is a theoretical model and way of thinking about human actions and cooperation between individuals and society. This course will systematically introduce the basic principles of microeconomics and their applications in real life. The content of this course is advanced and novel. It not only contains professional knowledge from international classic textbooks, but also combines the practice of my country's economic construction.\u003c/p\u003e\n\u003cp\u003eThe course content will"])</script><script>self.__next_f.push([1," pay special attention to the following issues: how economics analyzes people's purposeful actions; how rational people make choices; how the market coordinates individual choices to achieve win-win cooperation in society; how to measure the effective allocation of resources; social division of labor and market competition How to promote technological progress and innovation; how entrepreneurs discover markets and promote economic growth; how international trade and globalization can improve the happiness and harmony of all mankind; what is the boundary between the market and the government; how government intervention affects individual behavior and the market effective operation.\u003c/p\u003e\n\u003cp\u003eThis course makes full use of information technology in the teaching process to improve the teaching effect. The teaching videos are rich in charts, animations, and cases, and the content is lively and interesting.\u003c/p\u003e9e:T47d,\u003cp\u003eBy studying this course, you can help you understand the world you live in, use principles to guide your own economic practices, and inspire you to analyze and judge economic phenomena, so that you can participate in economic life more intelligently. From the perspective of knowledge advancement, this course is still the initial path into the economics empire, laying a solid foundation for you to study other courses in theoretical economics.\u003c/p\u003e\n\u003cp\u003eThis course takes student learning as the center and builds a complete teaching link system. In order to keep abreast of the learning situation and strengthen interactive communication, a fixed time will be set up every week in the \"discussion area\" for online communication and interactive Q\u0026amp;A, and the instructor will answer questions and interact with the students in person. At the same time, this course has a \"Learning WeChat Group\", where students are invited to join the group to exchange learning status, and publish announcements and share learning updates in the WeChat group to fully adapt to the study time and study habits of students from different "])</script><script>self.__next_f.push([1,"learning backgrounds.\u003c/p\u003e9f:T83e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eWe are all getting familiar with the image of a drone in the sky. Although flying a drone is fun, drones are not toys. More and more UAVs or drones are used by governments and companies to gain answers and insights on nature, agricultural and metropolitan challenges among other fields. For example, small Drones/UAVs (Unmanned Aerial Systems) are employed in agriculture for crop observation, crop monitoring, field analysis and map generation through aerial surveys. And with the available software and 'mission planning tools' market growing, so is the demand for knowledge and understanding about its usage and limitations.\u003c/p\u003e\n\u003cp\u003eOur top professors of the 'Information Technology Group' and the 'Laboratory of Geo-Information Science and Remote Sensing group' of Wageningen University \u0026amp; Research will teach you whether it makes sense to use drones for your application, challenge or question. You will learn how to plan an end-to-end mission (from image acquisition to data visualization) for your specific drone application and how to execute a drone mission safely. Afther finishing the MOOC Drones for Agriculture: Prepare and Design Your Drone (UAV) Mission, you will have gained full understanding of the aerial mapping workflow and how to implement it in a programmable small drone. You will know which steps you need to take to gain the valuable insights you are looking for.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDo I need a drone to complete this course?\u003c/strong\u003e\u003cbr /\u003e\nNo! You do not need a drone to complete this course. For all the assignments and exercises we will provide the necessary material (in case it is needed). But, we expect to pick your curiosity with this course and hopefully nudge you into buying one and joining the community ;).\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFor whom\u003c/strong\u003e\u003cbr /\u003e\nAlthough the course is initially made for agriculture technicians, researchers or graduate students from multidisciplinary technical fields, everyone that aims to learn how to use an off-the-shelf small drone for generating a high-resolution image from a field, or has a general high interest in drones, is very welcome.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"a0:T6f4,\u003cp\u003eA brief history of the healthcare informatics field emphasizing long recognized key capabilities and the reasons for their slow adoption. An introduction to the Fast Healthcare Interoperability (FHIR) standard and its transformative potential. This is illustrated by an interview with the clinical team developing a FHIR based tool for use in an ICU environment. A survey of the problems and challenges facing healthcare systems around the world and in the US in particular. An introduction of chronic disease and its key role in rising healthcare costs. Alternate care models that show promise of improving healthcare outcomes while lowering cost and their dependency on the use of information technology. The concept of a Learning Healthcare System that continuously improves using informatics to glean new knowledge from actual patient care and feed it back to providers as they take care of future patients. An interview with a team of Emory researchers that are using a FHIR-based tool to help lower the cost of hospital care while improving outcomes. A discussion of electronic medical records, the federal programs to stimulate their adoption and the challenges physicians have in using them. An interview with the lead of the FHIR effort at the major health IT vendor Cerner. A detailed discussion of the rich array of patient-facing informatics tools and approaches used in the past and being increasingly deployed at present. An activity using Microsoft’s Personal Health Record system for patients. A detailed discussion of the complex technical and policy issues surrounding the sharing and exchange of confidential health information. An interview with a Blockchain expert and with an expert on data models for sharing of healthcare information for research,\u003c/p\u003ea1:T7aa,\u003cp\u003eLearn about the tools and methods that can be employed to understand and identify customer needs as well as the processes that companies can set in place to foster and launch successful technological innovations. A special emphasis will be placed on"])</script><script>self.__next_f.push([1," analyzing how companies can benefit from entrepreneurial thinking to innovate more successfully and on understanding how they can build entire ecosystems around their products and services. The theoretical knowledge will be transferred and applied to a recent, highly successful technological innovation from Germany: The StreetScooter, an electric delivery vehicle of Deutsche Post DHL. \u003c/p\u003e\n\u003cp\u003eThis self-paced course consists of eight consecutive parts: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDefining and Understanding Innovation\u003c/li\u003e\n\u003cli\u003eThe Customer: Understanding the Opportunity\u003c/li\u003e\n\u003cli\u003eThe Proposition: Creating Superior Customer Value\u003c/li\u003e\n\u003cli\u003eThe Process: Managing a Promising Idea\u003c/li\u003e\n\u003cli\u003eThe Mindset: Thinking and Acting Like an Entrepreneur\u003c/li\u003e\n\u003cli\u003eThe Development: Getting the Idea Off the Ground\u003c/li\u003e\n\u003cli\u003eThe Network: Managing the Ecosystem\u003c/li\u003e\n\u003cli\u003eReturn on Engineering\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe course will provide you with an in-depth understanding of the process of technology and innovation management. Specifically, the course will familiarize you with state-of-the-art tools, methods, and theories and help you understand how these may be used to solve and organize complex innovation challenges, placing a special emphasis on interdisciplinary thinking at the intersection of management and technology. \u003c/p\u003e\n\u003cp\u003eAfter completing this course, you will improve your career qualifications as \u003cstrong\u003eBusiness Development Manager\u003c/strong\u003e , \u003cstrong\u003eChange Manager\u003c/strong\u003e or \u003cstrong\u003eInnovation Manager\u003c/strong\u003e. Professionals from the industries of the \u003cstrong\u003eAutomotive,Information Technology,Finance,Health Care,Telecommunication\u003c/strong\u003e and the \u003cstrong\u003eEnergy\u003c/strong\u003e sector have already completed the course.\u003c/p\u003ea2:T46c,\u003cp\u003eInformation Technology (IT) changes the manner and scope in which businesses operate and compete. Innovations in IT have led some businesses to flourish, while others have faltered due to massive changes brought by this industry. IT is notoriously hard to manage. The challenge of managing IT is ensuring that the intended chan"])</script><script>self.__next_f.push([1,"ges and innovations are realized, and the unintended ones are kept under control. This course will cover basic concepts of information technology management.\u003c/p\u003e\n\u003cp\u003eAs part of this course you will:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eSee some brief videos\u003c/li\u003e\n\u003cli\u003eTake pop quizzes\u003c/li\u003e\n\u003cli\u003eAnalyse cases\u003c/li\u003e\n\u003cli\u003eRead relevant material\u003c/li\u003e\n\u003cli\u003eTake assessments.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course is for you if you are:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUsing IT in your organisation\u003c/li\u003e\n\u003cli\u003eBuilding or are planning to build IT-enabled products or services\u003c/li\u003e\n\u003cli\u003eExploring business innovations and want to know how IT can help\u003c/li\u003e\n\u003cli\u003eInterested in understanding how organisations manage IT for innovating.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course is not overly technical. Detailed prior knowledge of computing technology is not required to take this course.\u003c/p\u003ea3:T605,\u003cp\u003eThis MIS course will cover supporting tech infrastructures (Cloud, Databases, Big Data), the MIS development/ procurement process, and the main integrated systems, ERPs, such as SAP®, Oracle® or Microsoft Dynamics Navision®, as well as their relationship with Business Process Redesign.\u003c/p\u003e\n\u003cp\u003eManagement Information Systems (MIS) are an integral part of today’s professional landscape. From customer relationship management (CRM) systems handling the day to day interactions with clients and prospects, to financial systems issuing invoices and paying bills, day to day working life is increasingly controlled by these systems that dictate what to do and how.\u003c/p\u003e\n\u003cp\u003eThis course will focus on what MIS are, how they influence your current or prospective jobs, why they impose specific - and sometimes seemingly absurd - operational procedures, and how to use this knowledge to your advantage in your professional life.\u003c/p\u003e\n\u003cp\u003eGrasping the key concepts in MIS does not need to be daunting. We will use real world examples to illustrate key concepts, and strive to strike a proper balance between clarity / amenity and conceptual soundness. Join us on this stimulating journey that will allow you to better understand and perform i"])</script><script>self.__next_f.push([1,"n your current or desired job. \u003c/p\u003e\n\u003cp\u003eThis course is also available in Spanish: \"\u003ca href=\"https://www.edx.org/es/course/introduccion-a-los-sistemas-de-informacion-gerencial-mis-una-guia-de-supervivencia\"\u003eIntroducción a los Sistemas de Información Gerencial (MIS): Una guía de supervivencia\u003c/a\u003e\".\u003c/p\u003ea4:T512,\u003cp\u003eEste curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. \u003c/p\u003e\n\u003cp\u003eLa serie de cursos está pensada para que un profesional de un campo ajeno a las tecnologías de la información (financiero, administrativo o gerencial) adquiera los conocimientos básicos en Tecnologías de la Información necesarios para poder relacionarse de forma más provechosa con los especialistas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados de forma mucho más efectiva. \u003c/p\u003e\n\u003cp\u003eEn este curso aprenderás los conceptos básicos de la gestión de proyectos de desarrollo software, repasando los conceptos y roles básicos de gestión de proyectos y la gestión del ciclo de vida de desarrollo de sistemas, las herramientas y métodos utilizados en el desarrollo software, los estándares utilizados en el desarrollo y el diseño de la interfaz de usuario de un sistema informático.\u003c/p\u003e\n\u003cp\u003eAl completar la serie de 5 cursos, estarás preparado para relacionarte de forma eficaz con los especialistas del sector de las Tecnologías de la Información.\u003c/p\u003ea5:T435,\u003cp\u003eEste curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC.\u003c/p\u003e\n\u003cp\u003eLa serie de cursos está pensada para que un profesional de un campo ajeno a las tecnologías de la información (financiero, administrativo o gerencial) adquiera los conocimientos básicos en Tecnologías de la Información necesarios para poder re"])</script><script>self.__next_f.push([1,"lacionarse de forma más provechosa con los especialistas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados de forma mucho más efectiva.\u003c/p\u003e\n\u003cp\u003eEn este curso de ciencias de la computación trataremos diversos aspectos sociales de las TIC, como las amenazas informáticas y como protegernos de ellas, el efecto que las TIC tienen en la globalización, la estrategia de negocios y otros procesos económicos, o la ergonomía, el cloud computing y las carreras profesionales en el campo de las TIC.\u003c/p\u003ea6:T558,\u003cp\u003eEste curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. \u003c/p\u003e\n\u003cp\u003eLa serie de cursos está pensada para que un profesional de un campo ajeno a las tecnologías de la información (financiero, administrativo o gerencial) adquiera los conocimientos básicos en Tecnologías de la Información necesarios para poder relacionarse de forma más provechosa con los especialistas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados de forma mucho más efectiva. \u003c/p\u003e\n\u003cp\u003eEn este curso de sistemas de información y ordenadores aprenderás los conceptos básicos de la programación de software. Trataremos la lógica básica que hay detrás de cualquier programa de ordenador, qué tipos y estructuras de datos y ficheros se utilizan, cómo funciona la programación orientada a objetos, la gestión de bases de datos y el lenguaje SQL y diversos conceptos y directrices en el desarrollo web, como el HTML, XML, CSS o javascript, entre otros. \u003c/p\u003e\n\u003cp\u003eAl completar la serie de 5 cursos, estarás preparado para relacionarte de forma eficaz con los especialistas del sector de las Tecnologías de la Información.\u003c/p\u003ea7:T627,\u003cp\u003eEste curso form"])</script><script>self.__next_f.push([1,"a parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. \u003c/p\u003e\n\u003cp\u003eLa serie de cursos está pensada para que un profesional de un campo ajeno a las tecnologías de la información (financiero, administrativo o gerencial) adquiera los conocimientos básicos en Tecnologías de la Información necesarios para poder relacionarse de forma más provechosa con los especialistas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados de forma mucho más efectiva. \u003c/p\u003e\n\u003cp\u003eEn este curso, aprenderás los conceptos básicos sobre las herramientas TIC más usadas en la empresa, los paquetes ofimáticos, el correo electrónico, los sistemas de conferencia y los sistemas de gestión integrada como el ERP (siglas en inglés de Planificador de Recursos de la Empresa), CRM (Gestor de Relaciones con Clientes), SCM (Gestión de la Cadena de Suministro) o BI (Inteligencia de negocios), entre otros. También te explicaremos los fundamentos de los sistemas operativos que gestionan los ordenadores, la base tecnológica de Internet y cómo funcionan los navegadores y servidores web, con conceptos como hosting, cookies, javascript, servidores dinámicos. \u003c/p\u003e\n\u003cp\u003eAl completar la serie de 5 cursos, estarás preparado para relacionarte de forma eficaz con los especialistas del sector de las Tecnologías de la Información.\u003c/p\u003ea8:T575,\u003cp\u003eEste curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. \u003c/p\u003e\n\u003cp\u003eLa serie de cursos está pensada para que un profesional de un campo ajeno a las tecnologías de la información (financiero, administrativo o gerencial) adquiera los conocimientos básicos en Tecnologías de la Información necesarios para poder relacionarse de forma más provechosa con los especia"])</script><script>self.__next_f.push([1,"listas en informática y telecomunicaciones de su empresa u otras corporaciones con las que tenga relación, siendo capaz de especificar requerimientos, evaluar cargas de trabajo y supervisar resultados de forma mucho más efectiva. \u003c/p\u003e\n\u003cp\u003eEn este curso aprenderás los conceptos básicos hardware en los que se basan los sistemas de información y las redes de comunicaciones. Veremos los distintos componentes de un ordenador personal (CPU, memoria, placa base, discos duros) y sus periféricos, las bases del sistema binario y cómo está codificada la información en los sistemas informáticos, las bases de las redes de comunicación electrónica y los distintos equipos y estándares utilizados en las redes cableadas e inalámbricas.\u003c/p\u003e\n\u003cp\u003eAl completar la serie de 5 cursos, estarás preparado para relacionarte de forma eficaz con los especialistas del sector de las Tecnologías de la Información.\u003c/p\u003ea9:T60c,\u003cp\u003eIn this introductory course, learn how to measure an organization’s ICT accessibility and assess the importance of maintaining an inclusive workplace for both employees and customers with disabilities. This six-week course consists of modules detailing some of the primary ICT accessibility obstacles facing organizations today. Each module is taught by a subject matter expert – through content-rich videos, activities, and discussion forums.\u003c/p\u003e\n\u003cp\u003eWhether you work in the corporate, government or non-profit sector, this course will enable you to identify ICT accessibility issues, analyze specific needs, and evaluate possible solutions. As the world becomes more technology driven, organizations of all sizes and sectors touch ICT accessibility, whether through website design, document creation, or multimedia utilization. Start outlining a plan to establish and maintain an accessible enterprise operation today.\u003c/p\u003e\n\u003cp\u003eJoin our instructors as we explore why, what, and how to integrate accessibility design elements into your ICT organizational roadmap to support equal access for all.\u003c/p\u003e\n\u003cp\u003eThis ICT accessibi"])</script><script>self.__next_f.push([1,"lity course will consist of six modules over a six week term. Each module will consist of multiple video lessons. The lesson videos will include instructional content, resources, demonstrations, guest subject matter experts and personal interviews. There will be at least one weekly activity assignment, two discussion forum question postings and one graded ten question multiple-choice quiz at the end of each module.\u003c/p\u003eaa:T946,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe business landscape is changing so rapidly that traditional management, business and computing courses do not meet the needs for the next generation of workers in the business world. Most traditional methods are of a repetitive, rule-based nature and will be gradually replaced by Artificial Intelligence. In the knowledge era, the most value added job will be to manage knowledge, which includes how knowledge is created, mined, processed, shared and reused in different trades and industry. At the same time, the amount of data and information (prerequisites of knowledge) is exploding exponentially. By 2020, IDC projects that the size of the digital universe will reach 40 zetabytes from all sources including, websites, weblog, sensors, and social media. Digitalisation, Cloud Computing, Big data will transform how we live, work and even think in a Networked Economy. These trends and more will have a profound effect on how we see the world and create policies. In this course, the following topics and more are covered: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eWhat is knowledge management?\u003c/li\u003e\n\u003cli\u003eHow is knowledge captured, elicited, organized and created in business?\u003c/li\u003e\n\u003cli\u003eManaging knowledge at the enterprise, SMBs and personal levels\u003c/li\u003e\n\u003cli\u003eDigitalisation and its impact on the workplace, collaborations and new value creation\u003c/li\u003e\n\u003cli\u003eWhat is big data and how can we use data analytics from a laymen perspective?\u003c/li\u003e\n\u003cli\u003eWhat is Open Linked Data and how can it support machine reasoning?\u003c/li\u003e\n\u003cli\u003eHow can new knowledge be mined from big data?\u003c/li\u003e\n\u003cli\u003eWhat are the technical and social problems with big data?\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe Cloud as a canvas for service design and business model re-invention\u003cbr /\u003e\nWhat are examples of applications and case studies? \u003c/p\u003e\n\u003cp\u003eThe course is offered by the Knowledge Management and Innovation Research Center (KMIRC) of the Hong Kong Polytechnic University. Most of our research is company and industry based. Capabilities and competencies of the KMIRC are further strengthened by the international alliances it has formed with leading practitioners, many of which are regarded as members of the \"Hall of Fame\" in knowledge management, and renowned worldwide. The course is suitable for participants with a background in humanities, management, social science, physical science or engineering. No prior technical background is needed.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ab:T7b3,\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-GB\"\u003eHow to \u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003efacilitate a risk assessment to identify the potential threats\u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003e and the vulnerabilities they may exploit and the business impacts of a cyber-attack.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eR\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eecognise\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e that \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003ethe \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003erisk\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003es\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e are\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e constantly changing and the need for continuous process improvement\u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003e. Including how to monitor and report on the effectiveness of the cyber/information security practices.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eU\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003enderstand how to manage an incident and the processes required to effectively respond and recover.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eU\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003enderstand that effective security protection is a combination of \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003ep\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eeople, \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003ep\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003erocess\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e and \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003et\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eechnology\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e and how \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eto creat\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003ee\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e a culture of cyber and information security.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eU\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003enderstand the physical and logical access controls which should be implemented to adequately and appropriately protect the \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eorganisation’s\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e information and technology resources.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-GB\"\u003eU\u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003enderstand the potential risk responses and mitigation actions to \u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003eappropriately and adequately protect the business\u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003e from the identified cyber risks.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003eac:T146d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eMedicine is in the midst of a shift never before seen. Information and technology are advancing at rates faster than our ability to adapt. These changes, along with social forces such as the health 2.0 movement, are redefining the role of the doctor and patient. This course offers participants an engaging, never-before-seen view of medicine and healthcare. \u003c/p\u003e\n\u003cp\u003e\"Medicine in the Digital Age\" features in-depth interviews with thought leaders in digital health, including:\u003c/p\u003e\n\u003cp\u003eDr. Eric Topol, author of The Creative Destruction of Medicine (2012) and The Patient Will See You Now (2015) \u003cbr /\u003e\nDr. Roni Zeiger, former Chief Health Strategist for Google and CEO and Co-founder of Smart Patients \u003cbr /\u003e\nDr. Peter Killoran, Biomedical informatics and EHR usability expert\u003cbr /\u003e\nFred Trotter, Data Journalist and Author of Meaningful Use and Beyond (2011) \u003cbr /\u003e\nDr. David Wetter, Director of Innovation for Behavioral Health on Mobile Data to Knowledge (MD2K) center, for NIH Big Data to Knowledge (BD2K) Initiative \u003c/p\u003e\n\u003cp\u003eThe course is intended for a general audience and is relevant to anyone working or interested in the emerging healthcare environment. At the end of the course, participants will have the knowledge to successfully engage with the future of digital medicine. \u003c/p\u003e\n\u003cp\u003eMedicine in the Digital Age maps out the challenges and opportunities facing healthcare in the networked age. We will explore the role of social media in healthcare communication, the uses of wearable technologies, the potential for big data to reshape health behaviors, the ethics of personalized medicine, and the impact of these new developments on the doctor-patient relationship. Participants will gain an understanding of the connected health revolution and tools to critically analyze this evolving ecosystem. Medicine in the Digital Age will launch a fresh conversation about what the future of medicine should be, and how we should get there. Join us!\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat background is required to participate in this course?\u003c/strong\u003e\u003cbr /\u003e\nNo specific background is required for this course, but it is aimed at professionals who have (or would like to have) some amount of decision-making capability in their organization. This course is for leaders and aspiring leaders in healthcare and allied sectors including telecommunications, health insurance, biotechnology, pharmaceuticals, device manufacturing, policy and government, investment, consulting and innovation.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eIs this course part of a series?\u003c/strong\u003e\u003cbr /\u003e\nNot yet, but watch for future announcements!\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCan I still enroll if the course has started?\u003c/strong\u003e\u003cbr /\u003e\nYes, but look for additional announcements from course staff about assessments that will need to be completed to qualify for the RiceX Certificate.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat types of certificates does RiceX offer?\u003c/strong\u003e\u003cbr /\u003e\nUpon successful completion of RiceX courses, learners will be awarded a RiceX Certificate from Rice University.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eHow are certificates determined?\u003c/strong\u003e\u003cbr /\u003e\nEarning a certificate is determined by the individual course. Generally, learners must complete all course requirements at a level pre-determined by the course instructor to earn a certificate.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat happens if I do not pass or cannot complete a course?\u003c/strong\u003e\u003cbr /\u003e\nThere is no limit on the number of times you can enroll in RiceX courses. Many of RiceX courses are offered on a routine basis and you will be able to enroll in the next offering.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eHow can I earn a certificate for the series?\u003c/strong\u003e\u003cbr /\u003e\nSome RiceX courses are part of a series. Usually you can enroll in just one course or the entire series. Often you do not have to decide to complete the full series when you begin. Participants can earn a series certificate if they satisfactorily fulfill the requirements for completing the series.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat happens after I sign up?\u003c/strong\u003e\u003cbr /\u003e\nOnce you have registered and paid for a course, you will receive a confirmation email from RiceX.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat time is the class?'\u003c/strong\u003e\u003cbr /\u003e\nCourses materials are available 24 hours a day once the course has officially opened. Some courses include live webcasts with instructors scheduled at a specific time. The webcasts are recorded and available to participants who are not able to join. \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat if I have a question or concern for the instructor?\u003c/strong\u003e\u003cbr /\u003e\nYou will be part of a dynamic global learning community of fellow professional participants available 24-7 to help within the framework of the honor code. Course engagement managers monitor the discussion forum and can address your questions or forward to the instructor.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eHow can I meet/find other course participants?\u003c/strong\u003e\u003cbr /\u003e\nEvery RiceX course includes a Participant Discussion Forum where you can interact with other participating professionals. The Forum is guided by an honor code. You can also connect through Google+ Hangouts and interactive activities like live webcasts that may be included in a course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eIs there an exam at the end?\u003c/strong\u003e\u003cbr /\u003e\nNo, there is no exam. Instead, there is a final project at the end of the course.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ad:T979,"])</script><script>self.__next_f.push([1,"\u003cp\u003eGlobal Business in Practice helps you understand the impact globalization has on global trade and how companies need to react. Business schools are very good at compiling theories; we add value by combining those theories with the practical realities faced by top executives and exploring the management of global business from their perspectives. Leading industry experts will be featured throughout the course, including:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003e\u003cstrong\u003eJoseph P. Baratta\u003c/strong\u003e, Global Head of Private Equity at Blackstone;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eMaximo J. Blandon\u003c/strong\u003e, Managing Director at Stephens Inc.;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eMark G. Del Rosso\u003c/strong\u003e, Executive Vice President \u0026 COO of Audi of America;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eThomas J. DeRosa\u003c/strong\u003e, CEO and Director of Welltower;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eFabrizio Freda\u003c/strong\u003e, President \u0026 CEO of The Estée Lauder Companies;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eFranck J. Moison\u003c/strong\u003e, Vice Chairman at Colgate-Palmolive;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eRoxana Pierce\u003c/strong\u003e, Of Counsel at Robbins Geller Rudman \u0026 Dowd LLP;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eMonica Vidal\u003c/strong\u003e, Partner at MVS Global Consulting Services;\u003c/li\u003e\r\n\u003cli\u003e\u003cstrong\u003eStephanie von Friedeburg\u003c/strong\u003e, CIO and VP for Information and Technology Solutions at the World Bank Group.\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eYou will understand the horizontal nature of practical problem solving rather than the vertical work and learning that traditionally happens in functional silos.\u003c/p\u003e\r\n\u003cp\u003eOur goal is that, through this course, you will come to explicitly understand that globalization affects every country regardless of its economic, political or social situation. In this context, as countries endeavor to adapt their policies to new demands, companies deploy strategies to attain an increasingly globally integrated production system. The globalized world forces us to seek and develop appropriate ways to undergo this process. Today, discussions about the advantages and disadvantages of globalization are insignificant and unimportant in the face of the great need to determine the essential conditions for countries, companies and individuals to really benefit from it.\u003c/p\u003e\r\n\u003cp\u003eA fundamental knowledge of core business disciplines is clearly a “must” for aspiring global leaders, but the complexity of the global world requires us to push the envelope and extend the limits of what is possible. Join us as we explore the future of global business leadership.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ae:T56d,\u003cp\u003eYou will come away from this course with the foundational knowledge of what it takes to be a “Global Ready Leader” and will be able to use key findings about the workings of globalization to make more informed decisions in a business context:\u003c/p\u003e\r\n\r\n\u003cul\u003e\u003cli\u003eYou will be able to understand the practical complexities of what globalization is and how it affects the business environment regardless of its economic, political or social situation.\u003c/li\u003e\r\n\t\u003cli\u003eYou will be able to articulate how global challenges are becoming increasingly complex by gaining insights from executives at different multinational corporations.\u003c/li\u003e\r\n\t\u003cli\u003eYou will be able to conceptualize the differences in global business orientations and apply them in specific situations (i.e., multinational, global, glocal) using academic frameworks.\u003c/li\u003e\r\n\t\u003cli\u003eYou will be able to explain how regulations and geopolitical forces shape global business environments and create both tensions and opportunities in the context of global business.\u003c/li\u003e\r\n\t\u003cli\u003eYou will be able to articulate how the global environment is changing and forcing companies to develop sustainability practices based on creating economic value by creating societal value.\u003c/li\u003e\r\n\t\u003cli\u003eYou will appreciate how global supply chains are the response to the increasing integration of international markets as firms try to remain competitive.\u003c/li\u003e\r\n\u003c/ul\u003eaf:T6a7,\u003cp\u003eIn this course, you will learn ways in which technology has changed how financial markets and institutions function. Every part of the financial value chain is being “disrupted” by nimble technology-based innovators. Where personal relationships used to determine success and failure, the ability to process and act on massive amounts of data is taking over. \u003c/p\u003e\n\u003cp\u003eSecurities trading and securities issuance, typically the turf of large institutions, is being taken over by technology. High frequency and algorithmic trading take advantage of fast access to information and technology to trade in milliseconds. Financial market operat"])</script><script>self.__next_f.push([1,"ors have morphed into pure technology firms and data providers. \u003c/p\u003e\n\u003cp\u003eTechnology and financial innovations can be used for good or not so good purposes. For instance, it can be used to exploit the information of less sophisticated investors, or to provide them with liquidity. The course will study both the good and bad, regulatory aspects, and ethical considerations. \u003c/p\u003e\n\u003cp\u003eAll these aspects are changing the skills required to be successful in digital capital markets. We will also cover how finance has changed and is changing, the skills required to be successful and what the future may bring. Where possible we will link new phenomena to classical finance theory and highlight where predictions and reality have diverged.\u003c/p\u003e\n\u003cp\u003eAn introduction to technology in capital markets, the course is taught by a world-class instructor, actively involved in academic and policy research and training the next generation of traders. This course will prepare students from many backgrounds for careers in financial markets and financial market technology.\u003c/p\u003eb0:T423,\u003cp\u003eImproving access to healthcare is only as useful as the quality of care provided. Many agree that quality is important – but what is it? How do we define it? How do we measure it? And most importantly, how might we make it better? \u003c/p\u003e\n\u003cp\u003eThe course is designed for those who care about health and healthcare and wish to learn more about how to measure and improve that care – for themselves, for their institutions, or for their countries. Each session will be interactive and provide concrete tools that students can use. We will empower you to raise questions, propose concrete solutions, and promote change. \u003c/p\u003e\n\u003cp\u003eWe have assembled leading thinkers from around the globe – not only people who are experts – but people with real, hands-on experience running organizations, hospitals, and ministries of health. So join us – whether you are a physician, nurse, or other healthcare provider, if you are a student of medicine, public health, or health policy, or a p"])</script><script>self.__next_f.push([1,"atient who simply cares about getting good care – this course is for you.\u003c/p\u003eb1:T7f9,\u003cp\u003eIn the past few decades, China's cities have experienced a period of rapid development. Great changes have taken place in both urban space and urban life. With the booming of information and communications technology (ICT), ‘Big data’ such as mobile phone signaling, public transportation smart card records and ‘open data’ from commercial websites and government websites jointly promote the formation of the ‘new data environment’, thus providing a novel perspective for a better understanding of what changes have happened or are happening in China’s cities. \u003c/p\u003e\n\u003cp\u003eThis course combines both the new data generated for urban analysis and its research applications. The content ranges from big data acquisition, analysis, visualization and applications in the context of China’s urbanization and its city planning, to urban modeling methods and typical models, as well as the emerging trend and potential revolution of big data in urban planning. \u003c/p\u003e\n\u003cp\u003eWe have categorized the overall content of this online course into five sections, namely, overview, data, data processing, application, and perspective. The section of overview introduces cities in transition and describe the changing of urban space and urban life in China. The second section lists some commonly used open data and big data in the ‘new data environment’. Then, methods for data acquisition, cleaning and analysis are illustrated in data processing section. To better explain the data analysis method, the fourth part introduces several Chinese research cases to illustrate the application of these methods in urban research. Last but not least, the last section is the most future-oriented one, which is composed of some methodologies and proposals such as Data Augmented Design (DAD) and Big Model. \u003c/p\u003e\n\u003cp\u003eThis course, which shares experiences on big data analysis and its research application, will suit those concerning contemporary urbanizing China and its "])</script><script>self.__next_f.push([1,"urban planning in the context of information and communication technologies.\u003c/p\u003eb2:T616,\u003cp\u003eCognitive Neuroscience Robotics is an interdisciplinary area for development of new information and robot technology systems based on understanding higher functions of the human brain, with the integration of cognitive science, neuroscience, and robotics.\u003c/p\u003e\n\u003cp\u003eThis course introduces Cognitive Neuroscience Robotics with two approaches: the synthetic and the analytic approach. The synthetic approach means an engineering approach to understand human cognitive functions synthetically, trying to understand human cognitive functions by replicating them as artificial systems and putting them into social environments. Specifically, it develops artificial systems such as robots based on findings in neuroscience and physiology, and investigates how they could acquire intelligent behaviors through interaction with others and the environment.\u003c/p\u003e\n\u003cp\u003eOn the other hand, human cognitive activities are investigated analytically. They are supported by higher functions of the brain and have been examined by psychological experiments or brain imaging. With the analytic approach, psychologists, cognitive scientists, and medical doctors are pursuing an understanding of the mechanism of the mind and its biological basis, with the help of engineering and philosophy.\u003c/p\u003e\n\u003cp\u003eThis program will help students make a basis for interdisciplinary research by providing opportunities to understand what is undertaken in other disciplines and how to collaborate and exchange ideas with people from other disciplines. We expect many motivated students to apply.\u003c/p\u003eb3:T5aa,\u003cp\u003eThe availability of low cost and ubiquitous sensors in city infrastructure provides high granular data at unprecedented spatiotemporal scales. “Smart Cities” envision to utilize this data to provide a healthy, happy and sustainable urban ecosystem by integrating the information and communication technology (ICT), Internet of things (IoT) and citizen participation to effectively manage"])</script><script>self.__next_f.push([1," and utilize city infrastructure and services. “Data Science” is an interdisciplinary field of scientific methods, processes, algorithms and systems to extract knowledge from data in various forms and provides fast and efficient understanding of the current dynamics of cities and ways to improve different services. This course will introduce scientific techniques that will allow the analysis, inference and prediction of large-scale data (e.g. GPS vehicular data, social media data, mobile phone data, individual social network data, etc.) that are present in city networks. Basics of the data science methods to analyze these datasets will be presented. The course will focus both on the methods and their application to smart-city problems. Python will be used to demonstrate the application of each method on datasets available to the instructor. Examples of problems that will be discussed include ridesharing platforms, smart and energy-efficient buildings, evacuation modeling, decision making during extreme events \u0026amp; urban resilience.\u003c/p\u003eb4:T96d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEngaging employees in learning and development courses is more difficult than ever: distractions, hybrid and remote work environments, multitasking, lack of time... you name it! But what if your organization could have the world’s top leaders’ best management content DESIGNED TO TEACH, ENGAGE AND INSPIRE at their fingertips, anytime and anywhere?\u003c/p\u003e\n\u003cp\u003eNow they can. With \u003cstrong\u003eIDEAS TO LEAD\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eIn this course you will hear from:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003ePeter Diamandis\u003c/strong\u003e - Founder and Executive Chairman of the XPRIZE Foundation\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eErik Brynjolfsson -\u003c/strong\u003e Director, Stanford Digital Economy Lab\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eTom Davenport\u003c/strong\u003e - Professor at Babson College, Fellow of the MIT Initiative on the Digital Economy, and Senior Advisor to Deloitte’s AI Practice\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eHila Lifshitz-Assaf\u003c/strong\u003e - Professor of Management and Head of the Artificial Intelligence Innovation Network Research Center at Warwick Business School\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCarly Fiorina\u003c/strong\u003e - Former Chairman and CEO, Hewlett-Packard Company\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePeter Weill\u003c/strong\u003e - Senior Research Scientist at the MIT Sloan School of Management\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAndrew McAfee\u003c/strong\u003e - Principal research scientist at MIT and co-founder of MIT’s Initiative on the Digital Economy\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAtif Rafiq\u003c/strong\u003e - The First Chief Digital Officer in the History of the Fortune 500; Bestselling Author of \u003cem\u003eDecision Sprint\u003c/em\u003e and Management at Harvard Business School\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eSteve Wozniak\u003c/strong\u003e - Co-founder of Apple and Silicon Valley icon\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eGinni Rometty\u003c/strong\u003e - Former Chairman, President, and CEO of IBM\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eBarney Tan\u003c/strong\u003e - Professor and Head of the School of Information Systems and Technology Management at UNSW Sydney\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eRenée Richardson Gosline\u003c/strong\u003e - Authority on brand strategy, technology and behavioral economics, and Professor at the MIT Sloan School of Management\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eReid Blackman\u003c/strong\u003e - Founder and CEO of Virtue, Author of \u003cem\u003eEthical Machines\u003c/em\u003e\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAmy Edmondson\u003c/strong\u003e - Authority on Psychological Safety; Professor of Leadership and Management at Harvard Business School\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eJim Lecinski\u003c/strong\u003e - Clinical Associate Professor of Marketing at Northwestern University's Kellogg School of Management\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"b5:T975,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHow much would you like your smart home to know about you? Has your data been harvested and used for political advertising on social media? Would you be happy to be profiled by a predictive policing AI?\u003c/p\u003e\n\u003cp\u003eAs we create more data-driven technologies, those issues become increasingly urgent. We must begin to ask not only ‘what can we do?’, but also ‘what should we do?’ How should we design new technologies to make sure they are used for good, not bad purposes?\u003c/p\u003e\n\u003cp\u003eThe ‘good’, the ‘bad’, and the ‘should’ are a domain of ethics, and a basis for other important concepts such as justice, fairness, rights, respect. They further inform the law and what is legal. Finally, they are at the roots of an extremely important currency in the modern economy: trust.\u003c/p\u003e\n\u003cp\u003eThis story-driven course is taught by the leading experts in data science, AI, information law, science and technology studies, and responsible research and innovation, and informed by case studies supplied by digital business frontrunners and tech companies. We will look at real-world controversies and ethical challenges to introduce and critically discuss the social, political, legal and ethical issues surrounding data-driven innovation, including those posed by big data, AI systems, and machine learning systems. We will drill down into case studies, structured around core concerns being raised by society, governments and industry, such as bias, fairness, rights, data re-use, data protection and data privacy, discrimination, transparency and accountability. Throughout the course, we will emphasise the importance of being mindful of the realities and complexities of making ethical decisions in a landscape of competing interests.\u003c/p\u003e\n\u003cp\u003eWe will engage with data-based contexts such as facial recognition, predictive policing, medical screening, smart homes and cities, banking, and AI, to explore their social implications and the tools required to minimise harm, promote fairness, and safeguard and increase human autonomy and well-being. We address cutting edge issues being grappled with by practitioners and new approaches emerging in industry and offer the opportunity for participants to develop and feedback solutions.\u003c/p\u003e\n\u003cp\u003eCompleting this course will help you understand the challenges we are facing and inspire you to design, criticise, and develop better intelligent systems to shape our future.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"b6:T7b7,\u003cp\u003eThis course is different – it’s a sample of the most important key concepts and techniques needed to develop digital strategies and bring them to market. \u003c/p\u003e\n\u003cp\u003eThe Smith School of Business and Clark School of Engineering have teamed up to organize courses in a series that samples our best across digital strategy, marketing, planning, and delivery to bring you a series of essential lessons.\u003c/p\u003e\n\u003cp\u003eThis first course starts by clearly describing the nature of disruption, transformation, and strategies that companies can use to exploit and respond to technological change. It goes on to provide a sufficient business leader’s understanding of how technology works, the information systems architecture, and how adoption and innovation occur in existing businesses.\u003c/p\u003e\n\u003cp\u003eArmed with the insights into computing stacks, business systems, adoption life cycles, and innovation strategies this course then takes you on a tour of the key technologies driving change in how we build, operate, and capture value in our businesses. \u003c/p\u003e\n\u003cp\u003eThese key emerging technologies now form the basis for you to create your own strategies and approaches to innovating your business.\u003c/p\u003e\n\u003cp\u003eThe course wraps with how to deliver these new offerings and reach new audiences through digital marketing. Digital marketing processes, frameworks, and techniques are examined. You’ll learn about the importance of a Customer Journey, and how the hard switch to Inbound marketing requires new skills in having open, customer-centric conversations. And you’ll learn how those offerings that require Outbound are changing in the world of digital, and how to manage customers through Social.\u003c/p\u003e\n\u003cp\u003eThis course is a lean, forged pathway to develop your own new strategy to innovate your program, your unit, or your business by identifying the opportunities to play offense and defense against disruptive digital technologies using the best techniques from the Smith School of Business.\u003c/p\u003eb7:T6da,\u003cp\u003eThis course provides the essential foundations require"])</script><script>self.__next_f.push([1,"d to understand the operation of semiconductor devices such as transistors, diodes, solar cells, light-emitting devices, and more. The material will primarily appeal to electrical engineering students whose interests are in applications of semiconductor devices in circuits and systems. The treatment is physical and intuitive, and not heavily mathematical.\u003c/p\u003e\n\u003cp\u003eTechnology users will gain an understanding of the semiconductor physics that is the basis for devices. Semiconductor technology developers may find it a useful starting point for diving deeper into condensed matter physics, statistical mechanics, thermodynamics, and materials science. The course presents an electrical engineering perspective on semiconductors, but those in other fields may find it a useful introduction to the approach that has guided the development of semiconductor technology for the past 50+ years.\u003c/p\u003e\n\u003cp\u003eStudents taking this course will be required to complete two (2) proctored exams using the edX online Proctortrack software. \u003cbr /\u003e\nCompleted exams will be scanned and sent using Gradescope for grading.\u003c/p\u003e\n\u003cp\u003eSemiconductor Fundamentals is one course in a growing suite of unique, 1-credit-hour short courses being developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters program in Nanoscience and Technology. For further information and other courses offered and planned, please see the Nanoscience and Technology page. Courses like this can also apply toward a Purdue University MSECE degree for students accepted into the full master’s program.\u003c/p\u003eb8:T4b4,\u003cp\u003eStudents will learn about the following specific topics:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eenergy bands\u003c/li\u003e\n\u003cli\u003eband gaps\u003c/li\u003e\n\u003cli\u003eeffective masses\u003c/li\u003e\n\u003cli\u003eelectrons and holes\u003c/li\u003e\n\u003cli\u003ebasics of quantum mechanics\u003c/li\u003e\n\u003cli\u003ethe Fermi function\u003c/li\u003e\n\u003cli\u003ethe density-of-states\u003c/li\u003e\n\u003cli\u003eintrinsic carrier density\u003c/li\u003e\n\u003cli\u003edoping and carrier concentrations\u003c/li\u003e\n\u003cli\u003e"])</script><script>self.__next_f.push([1,"carrier transport\u003c/li\u003e\n\u003cli\u003egeneration-recombination\u003c/li\u003e\n\u003cli\u003equasi-Fermi levels\u003c/li\u003e\n\u003cli\u003ethe semiconductor equations\u003c/li\u003e\n\u003cli\u003eenergy band diagrams\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eAmong the important learning objectives, the course will introduce learners to the process of drawing and interpreting energy band diagrams. Energy band diagrams are a powerful, conceptual way to qualitatively understand the operation of semiconductor devices. In a concise way, they encapsulate most of the device-relevant specifics of semiconductor physics. Drawing and interpreting an energy band diagram is the first step in understanding the operation of a device.\u003c/p\u003e\n\u003cp\u003eThis course material is typically covered in the first few weeks of an introductory semiconductor device course, but this class provides a fresh perspective informed by new understanding of electronics at the nanoscale.\u003c/p\u003eb9:T6a2,\u003cp\u003eThis course will aim to introduce students to the fundamentals of fiber optic communications, which constitute the backbone of the internet. The course will start with a refresher on the operation of key components needed for an effective fiber optic communication system, and then show how these components interact at a system level. Finally, the course will conclude with outlook for future research in extending the capabilities of these networks to higher bandwidths and quantum-secured communications.\u003c/p\u003e\n\u003cp\u003eStudents taking this course will be required to complete four (4) proctored exams using the edX online Proctortrack software.\u003c/p\u003e\n\u003cp\u003eCompleted exams will be scanned and sent using Gradescope for grading by Professor Bermel.\u003cbr /\u003e\nFiber Optic Communications is one course in a growing suite of unique, 1-credit-hour short courses being developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters program in Nanoscience and Technology. For further information and other courses offered and planned, please see the \u003ca hr"])</script><script>self.__next_f.push([1,"ef=\"https://www.edx.org/micromasters/purduex-nano-science-technology?index=product\u0026queryID=eeeb6c4f8b900135c3c2dd58278dd01d\u0026position=3\"\u003eNanoscience and Technology\u003c/a\u003e page.\u003c/p\u003e\n\u003cp\u003eCourses like this can also apply toward a \u003ca href=\"https://www.edx.org/masters/online-masters-in-electrical-and-computer-engineering?index=product\u0026queryID=e1bc1486eefbc6ee8ce9f7b5c61c1135\u0026position=9\"\u003eMaster's Degree in Electrical and Computer Engineering\u003c/a\u003e for students accepted into the full master’s program at Purdue University.\u003c/p\u003eba:T970,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe transistor has been called the greatest invention of the 20th century - it enabled the electronics systems that have shaped the world we live in. Today's nanotransistors are a high volume, high impact success of the nanotechnology revolution. This is a course on how this scientifically interesting and technologically important device operates. The course is designed for anyone seeking a sound, physical, intuitive understanding of how modern transistors operate. Important technology considerations and applications of transistors are also discussed. The focus is on MOSFETs for digital logic, but analog applications and other types of transistors are briefly considered.\u003c/p\u003e\n\u003cp\u003eThis course is broadly accessible to students with only a very basic knowledge of semiconductor physics and electronic circuits. Topics include device metrics for digital and analog circuits, traditional MOSFET theory, the virtual source model, 1D and 2D electrostatics, Landauer/transmission approach to nanotransistors, the limits of MOSFETs, as well as a quick look at HEMTs, bipolar transistors, and compact circuit models. The course should be useful for advanced undergraduates, beginning graduate students, as well as practicing engineers and scientists.\u003c/p\u003e\n\u003cp\u003eThis course is part of a Purdue initiative that aims to complement the expertise that students develop with the \u003cem\u003ebreadth at the edges\u003c/em\u003e needed to work effectively in today's multidisciplinary environment. These serious short courses require few prerequisites and provide a general framework that can be filled in with self-study when needed.\u003c/p\u003e\n\u003cp\u003eStudents taking this course will be required to complete two (2) proctored exams using the edX online Proctortrack software. \u003cbr /\u003e\nCompleted exams will be scanned and sent using Gradescope for grading.\u003c/p\u003e\n\u003cp\u003eFundamentals of Transistors is one course in a growing suite of unique, 1-credit-hour short courses being developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters program in Nanoscience and Technology. For further information and other courses offered and planned, please see the Nanoscience and Technology page. Courses like this can also apply toward a Purdue University MSECE degree for students accepted into the full master’s program.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"bb:T953,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course is an introduction to photonic materials and devices structured on the wavelength scale. Generally, these systems will be characterized as having critical dimensions at the nanometer scale. These can include nanophotonic, plasmonic, and metamaterials components and systems.\u003c/p\u003e\n\u003cp\u003eThis course will aim to introduce students to computational techniques employed in current design and research efforts in nanophotonics. You will learn the strengths and weaknesses of each approach; what types of problems call for which one; and how your simulation will perform.\u003c/p\u003e\n\u003cp\u003eTechniques include eigenvalue problems, fast Fourier transforms, band structure calculations, rigorous-coupled wave analysis, and finite-difference time-domain. Applications include photovoltaics, thermal management, radiative control, and nonlinear optics. It is expected to be useful for graduate students interested in incorporating these techniques into their projects or thesis research.\u003c/p\u003e\n\u003cp\u003eStudents taking this course will be required to complete four (4) proctored exams using the edX online Proctortrack software. Completed exams will be scanned and sent using Gradescope for grading by Professor Bermel. \u003c/p\u003e\n\u003cp\u003eRecommended Textbook for the course: \u003cbr /\u003e\n\u003cem\u003ePhotonic Crystals: Molding the Flow of Light\u003c/em\u003e by J.D. Jaonnopoulos, S.G.Johnson, J.N. Winn, and R.B. Meade, Princeton University Press, 2008\u003cbr /\u003e\nISNB Number: 9780691224568\u003c/p\u003e\n\u003cp\u003eNanophotonic Modeling is one course in a growing suite of unique, 1-credit-hour short courses being developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters program in Nanoscience and Technology. For further information and other courses offered and planned, please see the \u003ca href=\"https://www.edx.org/micromasters/purduex-nano-science-technology?index=product\u0026queryID=45955ea36023044d98719629382c4219\u0026position=3\"\u003eNanoscience and Technology \u003c/a\u003epage.\u003c/p\u003e\n\u003cp\u003eCourses like this can also apply toward a \u003ca href=\"https://www.edx.org/masters/online-masters-in-electrical-and-computer-engineering?index=product\u0026queryID=ed05afa80ba1aef33fa34ff5856306e7\u0026position=9\"\u003eMaster's Degree in Electrical and Computer Engineering\u003c/a\u003e for students accepted into the full master’s program at Purdue University.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"bc:T5ec,\u003cp\u003eThis course introduces the Schrödinger equation, using the tight-binding method to discuss the concept of bandstructure and E(k) relations, followed by an introduction to the NEGF method with simple illustrative examples. Concept of spinors is introduced along with the application of the NEGF method to spintronic devices.\u003c/p\u003e\n\u003cp\u003eNo prior background in quantum mechanics or statistical mechanics is assumed.\u003c/p\u003e\n\u003cp\u003eVerified students taking this course will be required to complete three (3) proctored exams using the edX online Proctortrack software. To be sure your computer is compatible, see \u003ca href=\"https://www.proctortrack.com/tech-requirements/\"\u003eProctortrack Technical Requirements\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eNanoscience and Technology MicroMasters\u003c/strong\u003e ®\u003c/p\u003e\n\u003cp\u003eIntroduction to Quantum Transport is one course in a growing suite of unique, one-credit-hour short courses developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters® program in Nanoscience and Technology.\u003c/p\u003e\n\u003cp\u003eFor further information and other courses offered, see the \u003ca href=\"https://www.edx.org/micromasters/purdue-nano-science-technology\"\u003eNanoscience and Technology MicroMasters\u003c/a\u003e® page. Courses like this can also apply toward a \u003ca href=\"https://engineering.purdue.edu/ECE/Academics/Online\"\u003ePurdue University MSECE degree\u003c/a\u003e for students accepted into the full master’s program.\u003c/p\u003ebd:T6c3,\u003cp\u003eVery different from what is taught in standard courses, \"Fundamentals of Current Flow\" provides a unified conceptual framework for ballistic and diffusive transport of both electrons and phonons - essential information for understanding nanoelectronic devices.\u003c/p\u003e\n\u003cp\u003eThe traditional description of electronic motion through a solid is based on diffusive transport, which means that the electron takes a random walk from the source to the drain of a transistor, for example. However, modern nanoelectronic devices"])</script><script>self.__next_f.push([1," often have channel lengths comparable to a mean free path so that electrons travel ballistically, or \"like a bullet.\"\u003c/p\u003e\n\u003cp\u003eVerified students taking this course will be required to complete three (3) proctored exams using the edX online Proctortrack software. To be sure your computer is compatible, see \u003ca href=\"https://www.proctortrack.com/tech-requirements/\"\u003eProctortrack Technical Requirements\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eNanoscience and Technology MicroMasters\u003c/strong\u003e ®\u003c/p\u003e\n\u003cp\u003eFundamentals of Current Flow is one course in a growing suite of unique, 1-credit-hour short courses developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters® program in Nanoscience and Technology.\u003c/p\u003e\n\u003cp\u003eFor further information and other courses offered, see the \u003ca href=\"https://www.edx.org/micromasters/purdue-nano-science-technology\"\u003eNanoscience and Technology MicroMasters\u003c/a\u003e® page. Courses like this can also apply toward a \u003ca href=\"https://engineering.purdue.edu/ECE/Academics/Online\"\u003ePurdue University MSECE degree\u003c/a\u003e for students accepted into the full master’s program.\u003c/p\u003ebe:Ta62,"])</script><script>self.__next_f.push([1,"\u003cp dir=\"ltr\"\u003eConversational AI/voice technology is the ability to interact with devices and systems using natural language speech. It has become increasingly popular and widespread in recent years, thanks to advances in artificial intelligence (AI), natural language processing (NLP), and speech recognition. The technology can be found in various applications, such as smart speakers, smart assistants, chatbots, voice search, voice commerce, voice biometrics, voice analytics, customer service automation (IVR), and generative AI tools (chatGPT).\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\n****Conversation AI//voice technology has many benefits for users and businesses alike. It can provide access to the digital world for people who have difficulties with typing or seeing, such as those with disabilities, low literacy, or low vision. It can also enhance productivity, convenience, safety, and engagement by enabling hands-free and eyes-free communication and control. Moreover, it can create personalized and immersive experiences. Within an enterprise organization, voice technology can lead to productivity enhancements, e.g., automation of processes in call centers, training facilitation, expedited information sharing, etc.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\n****However, voice technology also poses some pressing questions that need to be addressed: ****\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat are conversational AI/voice specific issues of ethical and moral concern, and how do we define them? \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat are the values to be promoted for ethical interaction with conversational/voice AI technology? \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat are the rights to be respected for successful and ethical experiences? \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat preventative measures can we take to protect people from specific harm?\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat can we do to cover gaps that are not yet fully covered by existing laws and guidelines? \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eWhat can we learn from past harmful incidents and vulnerabilities, and how can we prevent them from happening in the future?\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nThis course discusses the use and value of voice technology to provide access to the digital world and bring tangible improvements to people’s lives, the ethical challenges and impact of conversational/voice AI, and the principles and frameworks to avoid potential harm in humans interacting with the technology. This course offers practical guidance on value to be promoted, the rights to be respected, and preventative measures to be taken for successful, ethical voice experiences.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"bf:T6b4,\u003cp\u003eThis course is designed to help you navigate through your journey in graduate school at the Japanese university of your dreams and beyond. The course will introduce you to universities in different regions of Japan and discuss what sets Japanese graduate education apart from the rest of the world. You will also be guided through the application process and necessary decision-making when planning for your stay in Japan. Finally, you will be given some post-graduation career insights.\u003c/p\u003e\n\u003cp\u003eThis course is made up of interviews with students about their experiences in Japanese universities while offering a glimpse into their daily life, reasons for choosing their paths, and further aspirations. These videos are supported with written materials that go into greater detail about the necessary information you must account for when applying for graduate studies in Japan. What is the application process? How can you sustain yourself while in Japan? What does the research environment look like?\u003c/p\u003e\n\u003cp\u003eProfessor Tomohiro Nozaki on behalf of the Admissions section of the Tokyo Institute of Technology (Tokyo Tech) shares information about international graduate opportunities. Some materials from Tokyo Tech will also be shared. These materials can serve as your starting point when discussing your own graduate studies plan, whether at Tokyo Tech or at a different Japanese university, in the discussion board.\u003c/p\u003e\n\u003cp\u003eAt the end of each unit, you will meet a researcher, several alumni, and professors who can give you a broader view of what is yet to come after pursuing graduate studies in Japan. You will also be presented with a short quiz that can be a fun reinforcement of what you have learned.\u003c/p\u003ec0:T41e,\u003cp\u003eThe six modules of the course provide the participant with an overview of the context, methodology employed, and technologies and business models reviewed as part of the Innovative Business Models for Expanding Fiber-Optic Networks and Closing the Access Gap report. The first module provides background and conte"])</script><script>self.__next_f.push([1,"xt on the importance of expanding broadband Internet infrastructure and introduces the methodology used for the evaluation of 70 projects in the report. The second module provides information on key spectrum policies and technology trends that are relevant for efforts to expand access to broadband.\u003c/p\u003e\n\u003cp\u003eModules 3-5 provide more detailed information regarding business models for infrastructure deployment, including consideration of market segments and approaches to cross-border, national, middle-mile, and last-mile infrastructure deployment, as well as some of the issues and decisions faced by stakeholders.\u003c/p\u003e\n\u003cp\u003eModule 6 presents lessons learned and recommendations for policymakers seeking to promote broadband deployment.\u003c/p\u003ec1:T516,\u003cp\u003eGenerative AI (GAI) is a powerful technology that enables computers to create new content—such as text, images, or financial data, by learning from existing patterns. Unlike traditional AI, which analyses and processes data, GAI leverages advanced machine learning models to generate realistic outputs that mimic real-world information. In the financial sector, this technology is revolutionizing fraud detection, risk assessment, market forecasting, and trading strategies, making financial systems more efficient, secure, and intelligent.\u003c/p\u003e\n\u003cp\u003eThis course provides a foundational understanding of Generative AI and its transformative role in the financial industry. It covers key AI models, including Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Autoregressive Models, explaining their applications in financial forecasting, risk management, synthetic data generation, and fraud detection. Additionally, the course explores AI-driven trading strategies, regulatory and ethical considerations, and emerging trends shaping the future of finance.\u003c/p\u003e\n\u003cp\u003eThrough a mix of theoretical insights and practical real-world applications, participants will gain the skills needed to leverage Generative AI for enhancing financial operations, decision-making, and risk.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"c2:T762,\u003cp\u003eQuantum information is the foundation of the second quantum revolution.\u003cbr /\u003e\nWith classical computers and the classical internet, we are always manipulating classical information, made of bits. On the other hand, quantum computing and quantum communication consist in the processing of quantum information, made of qubits.\u003cbr /\u003e\nTake away the hardware, and all quantum computers work the same way, through the clever manipulation of quantum information and entanglement. This course provides a deeper understanding of some of the topics covered in our Quantum 101 program, namely, the representation and manipulation of quantum information at the level of abstract quantum circuits. Specifically, single and multi-qubit gates and circuits are introduced, and basic algorithms and protocols such as quantum state teleportation, superdense coding, and entanglement swapping are discussed. The course also presents quantum gate sets, their universality, and compilations between different gate expressions. These concepts are then made concrete with the Quantum Inspire simulator (a cloud-based quantum computing platform, created and maintained by QuTech at TU Delft), and the physics and operations with spin qubits will be detailed. The course concludes with an examination of quantum supremacy and near-term quantum devices, also known as “noisy-intermediate scale” (NISQ) quantum computing.\u003c/p\u003e\n\u003cp\u003eThe course is a journey of discovery, so we encourage you to bring your own experiences, insights and thoughts to discuss on the forum!\u003c/p\u003e\n\u003cp\u003eThis course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to drive research and development in quantum technology. QuTech Academy’s aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.\u003c/p\u003ec3:Tbad,"])</script><script>self.__next_f.push([1,"\u003cp\u003eDon't have a business background but want to understand how people and systems of an organisation interact with the world and each other?\u003cspan lang=\"EN-US\"\u003e Work through this course and equip yourself with the knowledge you need to make sense of the \u003c/span\u003e\u003cspan lang=\"EN-GB\"\u003eexternal influences that affect the business in its environment, including economic, legal, social and technological factors.\u003c/span\u003e\u003c/p\u003e\r\n\u003cp\u003eUnderstanding a Business and its environment is important in shaping the role of key business functions. This carefully considered assessment of the business’s environment can contribute to the efficient, effective and ethical management and development of an organisation.\u003c/p\u003e\r\n\u003cp\u003eThis course is especially beneficial if you want to:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003e\r\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eUnderstand the purpose and types of businesses\u003c/span\u003e\u003c/p\u003e\r\n\u003c/li\u003e\r\n\u003cli\u003e\r\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDelve deeper into the structure and key functions of a business, including corporate governance\u003c/span\u003e\u003c/p\u003e\r\n\u003c/li\u003e\r\n\u003cli\u003e\r\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eLaunch your own business and need an understanding \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eof leadership, management and people issues including motivation\u003c/span\u003e\u003c/p\u003e\r\n\u003c/li\u003e\r\n\u003cli\u003e\r\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003ePre\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003epare for the ACCA’s exam in Business and Technology (BT). Please note this course and the exam was previously name\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003ed\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e ‘Accountant in Business’.\u003c/span\u003e\u003c/p\u003e\r\n\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eThere is no prior knowledge required. \u003cspan lang=\"EN-US\"\u003eStart \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003elearning today\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e and accelerate your business and finance acumen.\u003c/span\u003e\u003c/p\u003e\r\n\u003cp\u003eTo check availability of this course in your country please click \u003ca href=\"http://www.acca-x.com/global/en/courses/diploma-financial-and-management-accounting-courses.html\"\u003ehere\u003c/a\u003e.\u003c/p\u003e\r\n\u003cp\u003e\u003cstrong\u003eCourse update:\u003c/strong\u003e\u003c/p\u003e\r\n\u003cp\u003eTo coincide with syllabus changes coming into effect for exams to be taken in September 2024, ACCA-X will be releasing a new version of this course on 26th August 2024. This new version will include technical content and question updates relevant to the 2024/2025 syllabus.\u003c/p\u003e\r\n\u003cp\u003eIt is therefore important to ensure you enrol onto the correct version of the course. Detailed syllabus information is available within the course and can also be found \u003ca href=\"https://www.accaglobal.com/lk/en/student/exam-support-resources/fundamentals-exams-study-resources/f1/syllabus-study-guide.html\" rel=\"noopener\" target=\"_blank\"\u003ehere \u003c/a\u003e\u003c/p\u003e\r\n\u003cp\u003e\u003cstrong\u003eThis course does not offer an edX certificate.\u003c/strong\u003e\u003c/p\u003e\r\n\u003cp\u003eThose learners who would like to earn an award will have the opportunity to register with ACCA as a student, take computer based exams and gain the ACCA Diploma in Accounting and Business.\u003c/p\u003e\r\n\u003cp\u003eYou can find your nearest ACCA exam centre on the \u003ca href=\"http://www.accaglobal.com/uk/en/student/exam-entry-and-administration/computer-based-exams.html\"\u003eACCA\u003c/a\u003e website.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"c4:T613,\u003cp\u003eTechnology, digital media, and mobile access have changed how people learn. Today’s students want to be engaged and self-directed with digital content, available anytime, anywhere. This is a challenge for instructional designers as they create online learning experiences.\u003c/p\u003e\n\u003cp\u003eIn this course, you will step into the shoes of a learner and apply learning theories to your own personal experiences. You will explore various learning theories, examine related research, and practice applying these concepts to real-world problems you are interested in solving. Furthermore, you will learn about the trends and skills instructional designers use to analyze and solve instructional problems. You will gain a comprehensive understanding of how learning works and learn to employ well-researched principles to tackle complex and diverse challenges that individuals face in their personal and professional lives.\u003c/p\u003e\n\u003cp\u003eBy the end of this course, you will be equipped with the knowledge and tools to start developing your own learning solution.\u003c/p\u003e\n\u003cp\u003ePrevious background in teaching or professional development is a plus but not required. Join us and launch your career as an instructional designer.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Instructional Design and Technology MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Learning Design and Technology. See the MicroMasters program page for more information.\u003c/p\u003ec5:T601,\u003cp\u003eInstructional designers today have a tremendous number of tools and resources available to them to create highly engaging courses. Social media, digital video, and freely available online instructional resources and applications connect and engage people in new, and exciting ways. When creating online learning experiences, instructional designers integrate and infuse these digital tools and digital content in ways that engage and connect learners to course content.\u003c/p\u003e\n"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn the third course in the Instructional Design and Technology MicroMasters Program, you will explore the design, development, and integration of digital media to enhance the learning experience.\u003c/p\u003e\n\u003cp\u003eChoosing instructional materials for a course may seem like a simple step, but in fact, there are many important aspects of online learning experience development that are important to consider, such as content creation, copyright and creative commons, accessibility testing, and visual and web design techniques.\u003c/p\u003e\n\u003cp\u003eCourse topics include media and visual design, video, screencasting, animation, storyboarding, authoring tools for interactive learning, as well as audio in instructional design.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Instructional Design and Technology MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Learning Design and Technology. See the MicroMasters program page for more information.\u003c/p\u003ec6:T9e2,"])</script><script>self.__next_f.push([1,"In 1948, the Universal Declaration of Human Rights (UDHR) was promulgated, defining freedom of expression as the right \u0026ldquo;\u003cem\u003eto seek, receive and impart information and ideas through any media and regardless of frontiers.\u003c/em\u003e\u0026rdquo; The technology revolution of the last two decades has given the world the means to realize this commitment. Technology has shaped, reshaped, and radically transformed the production and distribution of information, profoundly impacting whole societies and greatly influencing, if not defining, information and communication. However, as the course will demonstrate, the foundation of a global protection of freedom of protection and information largely predates the IT revolution of the last decade.\u0026nbsp; This course will present and analyse the global norms that have emerged over time to enshrine the protection of freedom of expression and information, across and above national and regional differences. \u003cbr /\u003e\u003cbr /\u003eThe course is comprised of recorded lectures. Dr. Agnes Callamard, the \u003ca href=\"https://globalfreedomofexpression.columbia.edu/\"\u003eDirector of Columbia Global Freedom of Expression\u003c/a\u003e and the UN Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions, who led the \u003ca href=\"https://www.ohchr.org/EN/Issues/Executions/Pages/Inquiry.aspx\"\u003ehuman rights investigation into the murder of Jamal Khashoggi\u003c/a\u003e, will deliver the lectures. Supplementary lectures by international experts will provide additional information on topics addressed by the main lectures or additional issues which could not be included in the core course.\u0026nbsp; Students will be actively invited to consult the supplementary videos to strengthen their knowledge. Weekly readings will be assigned from classic philosophical works on the concept of freedom of expression, key texts of international human rights law, significant decisions of international and national courts, as well as relevant news stories and video clips.\u0026nbsp; The course will provide access to case analyses from Columbia University's Global Case Law Database to illustrate the issues as well as for course assignments. \u0026nbsp;Most readings will be freely available on the Internet.\u003cbr /\u003e\u003cbr /\u003e\u003cem\u003eThis Foundational Course is to be followed by an Advanced Course which will focus on the complex, and often awkward, interplay of global information flows with national jurisdiction and state sovereignty, and what it means for the realization of a borderless vision for the right to freedom of expression.\u003cbr /\u003e\u003cbr /\u003e\u003c/em\u003e"])</script><script>self.__next_f.push([1,"c7:Tc7f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eInterested in learning how mobile smartphones and tablets convert digital information to and from electromagnetic signals in the radio frequency (RF) spectrum? Curious how radio designers and spectrum regulators avoid harmful interference within a network or among different wireless services? Debating whether television (TV) band spectrum or cellular spectrum is more valuable to society? Want to build a radio transmitter and receiver, or develop a business plan for a wireless network deployment in your hometown? Then sign up for \"Understanding Wireless\" today! \u003c/p\u003e\n\u003cp\u003eThis survey style course offers an opportunity to gain understanding of the technical, regulatory, and economic aspects of the mobile wireless revolution and its impact on society. The course is intended for a broad audience, from engineers to business majors to aspiring lawyers, but students will be most comfortable if they are not intimidated by early-college mathematics. \u003c/p\u003e\n\u003cp\u003eThe instructors aim to expose the intricate physics, infrastructure, industry segments, markets, and radio frequency (RF) spectrum challenges behind today's popular smart phones and tablets, and to challenge students to participate in fueling the future growth of these technologies as well as their applications. The course will include such topics as the electrical transmission of information, the physical propagation of radio signals, the principles and challenges of sharing a common medium, standards and patents, spectrum licenses and auctions, privacy and security issues, and societal impact of wireless communication services and applications. \u003c/p\u003e\n\u003cp\u003eIn addition to directed readings, video sessions, and learning exercises, students taking the course for a certificate will be required to take several quizzes and, in the last two weeks of the course, to develop a project selected from one of several options. We are excited to introduce you to the myriad aspects of the wireless revolution and to explore with you how wireless is changing today’s society.\u003c/p\u003e\n\u003cp\u003eThe University of Notre Dame's Office of Digital Learning is sponsoring a final project competition for \"Understanding Wireless\" learners located in the United States and Canada. Qualified participants will design and submit a project plan to use wireless technology to improve their local community (town, school, local government, etc.), applying the knowledge and experience they have gained in the course.\u003c/p\u003e\n\u003cp\u003eFinalists will be chosen from the projects submitted according to the potential impact, feasibility, and creativity of the proposal. Students from the U.S. and Canada interested in partaking in this competition must enroll in the Verified Certificate. We regret that the competition is only available to students in the US and Canada at this time. Please note that edX is not involved with sponsoring or administering any aspect of this competition.\u003c/p\u003e\n\u003cp\u003eThree finalists will be flown to the Notre Dame campus in South Bend, Indiana to present their projects in person to the course faculty and a jury of industry experts in September or October of 2015. The winning finalist will receive a budget of $5000 to implement their design.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"c8:T9c8,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cem\u003eRead fully to understand the verified-certificate option\u003c/em\u003e. Join Professor Eric Lander and the MITx Biology team in an exciting learning experience available \u003cstrong\u003efor free to all enrolled learners\u003c/strong\u003e. The 7.00x Introductory Biology course materials are available for exploration and completion by registering as an auditor or verified-track learner, including videos, test yourself questions, and interactive problem sets. We strongly encourage you to work through the activities, towards a goal of learning biology. We have optimized the course settings for learning: instant correctness feedback after trying formative assessment problems and all content available at all times for self-paced progress. We offer a thorough and robust means of certifying learners in their mastery of the MITx introductory biology content, through the MITx 7.00x Introduction to Biology Competency Exam. This challenging option is available \u003cstrong\u003eonly\u003c/strong\u003e to those who register for the verified-certificate track, and successful completion of this exam is the major assessment that counts toward a certificate. We recommend preparing for the Competency Exam certification using current course materials and MIT OpenCourseWare problems. The Competency Exam is offered during the last week of every course run.\u003c/p\u003e\n\u003cp\u003e7.00x is an introductory level biology course hosted by professor Eric Lander, who was one of the leaders of the Human Genome Project. The course content reflects the topics taught in the MIT introductory biology courses and many biology courses across the world. As a learner, you will first focus on the structure and function of macromolecules such as DNA, RNA and proteins. You will discover how changes in the structure of some of these macromolecules alter their functions and what the implications of such changes have on human health. As you continue in the course, you will apply an understanding of heredity and information flow within cells to human health and disease and will learn about molecular biological techniques and their potential to impact our changing world. After you complete this course, you will have a foundation in biology that will allow you to understand the remarkable medical revolution going on today.\u003c/p\u003e\n\u003cp\u003eMITx 7.00x: Introduction to Biology – The Secret of Life will let you explore the mysteries of biochemistry, genetics, molecular biology, recombinant DNA technology and genomics, and rational medicine. Good luck in your journey!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"c9:T756,\u003cp\u003eDo you want to prepare for medical school, study a STEM field, become a research scientist, or transition to a career in the booming biotechnology industry? Or maybe you just want to understand the chemical reactions that govern life itself. Join Professor Yaffe, an MIT professor and practicing surgeon, as he guides you through the science that inspires countless doctors, researchers, and students alike.\u003c/p\u003e\n\u003cp\u003eWe developed 7.05x Biochemistry with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, performing thought experiments, interpreting data, and designing experiments.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of MIT (and other current) research, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eVisualizing real molecular structures with PyMOL to better understand function and mechanism.\u003c/li\u003e\n\u003cli\u003eAppreciating the quantitative aspects of biochemistry and practicing this quantitation with MATLAB.\u003c/li\u003e\n\u003cli\u003eTranslating topics in biochemistry to diseases and medicine.\u003c/li\u003e\n\u003cli\u003eConveying the authentic MIT \u003ca href=\"http://hacks.mit.edu/Hacks/by_year/1991/fire_hydrant/\"\u003efirehose\u003c/a\u003e experience.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eWe offer a thorough and robust means of certifying edX learners in their mastery of the MITx biochemistry content, through the MITx 7.05x Biochemistry Competency Exam. This challenging option is available \u003cstrong\u003eonly\u003c/strong\u003e to those who register for the verified-certificate track, and successful completion of this exam is the majority of the assessment grade that counts toward a certificate. \u003cstrong\u003eThe Competency Exam will be open during the final week of the course.\u003c/strong\u003e\u003c/p\u003eca:T5ad,\u003cp\u003eThis is the first genetics course in a multi-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca hre"])</script><script>self.__next_f.push([1,"f=\"http://bit.ly/700xBio\"\u003e7.00x Introductory Biology MOOC\u003c/a\u003e, these genetics courses go to a new level of depth. How do we know what we know about heredity and how can we design experiments to test hypotheses in genetics?\u003c/p\u003e\n\u003cp\u003eHow do we study the inheritance of different traits? How does that information help us understand heritable diseases? Professors Michael Hemann and Peter Reddien will challenge you to take your foundational knowledge of genetics to the next level. You will explore the foundations of the field of genetics and how to apply those concepts to understand modern studies of heredity.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.03x Genetics series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, designing experiments, performing thought experiments, and interpreting data.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ecb:T6e1,\u003cp\u003eThis is the first cell biology course in a three-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca href=\"http://bit.ly/700xBio\"\u003e7.00x Introductory Biology\u003c/a\u003e and \u003ca href=\"http://bit.ly/705xBiochem\"\u003e7.05x Biochemistry\u003c/a\u003e MOOCs, these cell biology courses transition to a comprehensive discussion of biology at an experimental level. How do we know what we know about cells at a molecular level and how can we use that knowledge to design experiments to test hypotheses in cell biology?\u003c/p\u003e\n\u003cp\u003eProfessors Rebecca Lamason and Iain Cheeseman guide you through a learning experience where you will discover experiments that answered big questions and find out what is still on the horizon"])</script><script>self.__next_f.push([1,". You will embark on a lively journey through cellular transport and cellular signaling mechanisms and regulation and learn how to apply key concepts and themes of this dynamic experimental science to understand the fundamental workings of cells.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.06x Cell Biology series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, performing thought experiments, interpreting data, and designing experiments.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research. \u003c/li\u003e\n\u003cli\u003eExploring foundational experiments that defined modern cell biology. \u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ecc:T43b,\u003cp\u003eUse Tableau to explore data and discover insights to innovate data-driven decision-making. \u003c/p\u003e\n\u003cp\u003eEmployer demand for Tableau skills will grow 35% over the next 10 years. Whether you are in a data-centric role or just need to add data skills to take your job or career to the next level, this course will provide the foundation and skills to get started using one of today’s most impactful data visualization tools. \u003c/p\u003e\n\u003cp\u003eYou will learn the basics of data representation and data visualization, and then explore the various elements of graphical representation. You will practice creating Tableau representations using your data sources to visually communicate insights. \u003c/p\u003e\n\u003cp\u003eTogether we will discuss examples and cases of visual representations, assessing accuracy and identifying any misrepresentations, and ultimately evaluate decisions and solutions based on data visualizations. \u003c/p\u003e\n\u003cp\u003eYou will gain foundational skills for using tableau desktop’s drag and drop functions. You will learn how to create"])</script><script>self.__next_f.push([1," commonly used data representations to help visualize data.\u003c/p\u003ecd:T952,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe building façade forms the interface between outside conditions and the habitable indoor climate, where we spend most of our time. So its design and construction seriously affect the performance of our buildings in terms of sustainability, energy efficiency, aesthetics and comfort.\u003c/p\u003e\n\u003cp\u003eFaçade technology has advanced rapidly in the last decades and has become a key component of the modern building process. Understanding the complexity of façade construction is crucial for architects, engineers and building professionals in order to keep control over the design and engineering processes, to keep within budgeted construction costs and to support the creation of modern looking, energy efficient, sustainable and comfortable buildings.This course will provide a first insight into façades and the technology involved in their construction, from a grounded and practical perspective. It focuses on key aspects to address the complexity of façade design and engineering: its general principles, construction systems, details and tolerances, materials, geometrical complexity, sustainability and construction site processes. Consequently, learners will gain general knowledge of façade engineering, backed with technical information, which will give them the tools to explain façadedesign decisions and their potential impact on the overall performance of the building.\u003c/p\u003e\n\u003cp\u003eTU Delft holds a leading position in the façade field, marked by 15 years of education, research and applied projects delivered in close collaboration with the built industry. Therefore, learners will benefit from an exposure to a wide array of façade experts from academia and practice. Led by U. Knaack and M. Bilow, architects and experienced educators in the field of façades, the course takes a practical approach, providing insights and providing a comprehensive picture of the complexity behind building façades. The course includes visits to building sites, architecture firms, local experts and manufacturing companies, to reveal the fundamentals of façade design with technical information directly from the source. \u003c/p\u003e\n\u003cp\u003eThis course has been designed by the founding members of TU Delft’s Architectural Façades \u0026amp; Products Research Group, in association with the European Façade Network, which comprises 10 European institutions with façade education programmes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ce:T66c,\u003cp\u003eIn this course you will learn how to turn solar cells into full modules; and how to apply full modules to full photovoltaic systems.\u003c/p\u003e\n\u003cp\u003eThe course will widely cover the design of photovoltaic systems, such as utility scale solar farms or residential scale systems (both on and off the grid). You will learn about the function and operation of various components including inverters, batteries, DC-DC converters and their interaction with both the modules and the grid.\u003c/p\u003e\n\u003cp\u003eAfter learning about the components, you will be able to correctly apply them during main design steps taken when planning a real PV installation with excellent performance and reliability.\u003c/p\u003e\n\u003cp\u003eThrough modelling, you will gain a deeper understanding of PV systems performance for different solar energy applications, and proficiency in estimating the energy yield of a client's potential system.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Solar Energy Engineering MicroMasters Program designed to cover all physics and engineering aspects of photovoltaics: photovoltaic energy conversion, technologies and systems.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eEarn a Microcredential\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAfter finishing this course, and passing the related exam, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework. For more information, please read the FAQ below.\u003c/p\u003ecf:T583,\u003cp\u003eThis is the second genetics course in a three-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca href=\"http://bit.ly/700xBio\"\u003e7.00x Introductory Biology MOOC\u003c/a\u003e, these genetics courses go to a new level of depth. What are different types of genetic changes? How do nature and scientists create these genetic variations? How do we de"])</script><script>self.__next_f.push([1,"sign and perform analyses to identify the genetic basis of a trait or disease?\u003c/p\u003e\n\u003cp\u003eProfessors Peter Reddien and Mary Gehring will challenge you to expand your understanding of genetics. You will study the variety of genetic changes, different approaches to genetic analyses, and the impact of genetics on development and behavior.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.03x Genetics series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, designing experiments, performing thought experiments, and interpreting data.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ed0:T790,\u003cp\u003eA strong foundation in mathematics is critical for success in all science and engineering disciplines. Whether you want to make a strong start to a master’s degree, prepare for more advanced courses, solidify your knowledge in a professional context or simply brush up on fundamentals, this course will get you up to speed.\u003c/p\u003e\n\u003cp\u003eCalculus is the branch of Mathematics that deals with differentiation and integration of functions; techniques that play a major role in solving many of the problems encountered in an engineer’s everyday life.\u003c/p\u003e\n\u003cp\u003eThis course will lay the foundations of multivariable calculus as it introduces differentiation and integration techniques for functions of two or more variables. Among other things you will learn to differentiate and linearize multivariable functions, find critical points and extreme values, and integrate multivariable functions using a variety of coordinate systems.\u003c/p\u003e\n\u003cp\u003eOur courses in calculus offer enough depth to cover what you need to succeed in your"])</script><script>self.__next_f.push([1," engineering master’s or profession in areas such as modeling, physics, fluid dynamics, dynamical systems and more.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThis is a review course\u003c/strong\u003e\u003cbr /\u003e\nThis self-contained course is modular, so you do not need to follow the entire course if you wish to focus on a particular aspect. As a review course you are expected to have previously studied or be familiar with most of the material. Hence the pace will be higher than in an introductory course.\u003c/p\u003e\n\u003cp\u003eThis format is ideal for refreshing your bachelor level mathematics and letting you practice as much as you want. Through the Grasple platform, you will have access to plenty of exercises and receive intelligent, personal and immediate feedback.\u003c/p\u003e\n\u003cp\u003eThis course is part of our series \u003cstrong\u003eMastering Mathematics for Engineers\u003c/strong\u003e , and together with the course Calculus I part of the program \u003cstrong\u003eMastering Calculus\u003c/strong\u003e.\u003c/p\u003ed1:T66a,\u003cp\u003eThis is the final cell biology course in a three-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca href=\"http://bit.ly/700xBio\"\u003e7.00x Introductory Biology\u003c/a\u003e and \u003ca href=\"http://bit.ly/705xBiochem\"\u003e7.05x Biochemistry\u003c/a\u003e MOOCs, these cell biology courses transition to a comprehensive discussion of biology at an experimental level. How do we know what we know about cells at a molecular level and how can we use that knowledge to design experiments to test hypotheses in cell biology?\u003c/p\u003e\n\u003cp\u003eHow do you go from a single cell to trillions of cells working together? And what happens when this amazing collective is confronted with pathogens? Professors Rebecca Lamason and Sebastian Lourido will challenge you to apply your foundational knowledge of cell biology to the next level. You will explore how cells function to maintain organism health and the consequences if these processes fail.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.06x Cell Biology series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, performing"])</script><script>self.__next_f.push([1," thought experiments, interpreting data, and designing experiments.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ed2:T4d4,\u003cp\u003eThere is no doubt that the quantum computer and the quantum internet have many profound applications, they may change the way we think about information, and they could completely change our daily life.The aim of this course is to help you get up to speed with current progress in the transition to a quantum information era. After an initial review of some of the basic concepts and operating principles of quantum computing and quantum information (e.g. the ket notation and quantum bits, the qubits), the course will feature an extensive discussion on some of the different ways qubits can be built. Then, we will discuss the four types of qubits that QuTech focuses on: topological qubits, spin qubits, superconducting qubits and NV center qubits.\u003c/p\u003e\n\u003cp\u003eThe course is a journey of discovery, so we encourage you to bring your own experiences, insights and thoughts via the forum!\u003c/p\u003e\n\u003cp\u003eThis course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to enhance research and development in quantum technology. QuTech Academy’s aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.\u003c/p\u003ed3:T83b,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eFaçades are the most visible part of a building, yet they do not receive the attention they deserve in education \u003c/span\u003e – and they should! Façades play an important role in creating a healthy indoor environment, contribute to sustainable building practices, and are key in reducing operational costs due to their potential longevity. Above all, they can give a building the beautiful look that sets it apart from any other in the surroundings.\u003c/p\u003e\n\u003cp\u003eInternational experts from TU Delft, TU Darmstadt and Eurac Research have teamed up to create a series of courses on façades engineering to close this knowledge gap. This course will provide you with an in-depth exploration of façade detailing, with a focus on a stick façade system. This entails deciding on the system, the material and the connection between the façade and the building in the design process. Get it wrong and the façade will leak or worse still, break!\u003c/p\u003e\n\u003cp\u003eWe are going to do it in a thorough and practical way. You will be guided step-by-step through the development process of façade details using an example. You will gain knowledge of detailing, stick systems, and the materials available for these systems. You will learn to interpret façade details, and \u003cspan lang=\"EN-US\"\u003edraw the typical details of a stick-system façade, which will demonstrate your understanding of how the various fields impact the design. While we focus on only one type of façade system, our aim is to provide you with enough confidence to begin applying structural, building physics, and construction concepts to the detail drawings of other façade systems.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThe course is developed for (aspiring) architectural engineers who seek more information about, and practice with, façade detailing. Here we understand the detailing process as the individual technical design development of an engineer, composing various technical solutions to fulfill various functions of façades. Before beginning this course, learners should have a background in architecture, structural engineering, or similar field.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"d4:T57e,\u003cp\u003eThis is the third genetics course in a three-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca href=\"http://bit.ly/700xBio\" rel=\"noopener\" target=\"_blank\"\u003e7.00x Introductory Biology MOOC\u003c/a\u003e, these genetics courses go to a new level of depth. How do we determine the content of genomes? What can allele frequencies tell us about the genetics of different populations? And why does this matter to human society?\u003c/p\u003e\n\u003cp\u003eProfessors Mary Gehring and Olivia Corradin will challenge you to expand your understanding of genetics. You will study the content of genomes, quantitative methods for studying traits, and the impact of genetics on population structures.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.03x Genetics series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, designing experiments, performing thought experiments, and interpreting data.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eDemonstrating that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ed5:T6a3,\u003cp\u003eThis is the second cell biology course in a three-part series. Building upon the concepts from biochemistry, genetics, and molecular biology from our \u003ca href=\"https://www.edx.org/course/introduction-to-biology-the-secret-of-life-3\"\u003e7.00x Introductory Biology\u003c/a\u003e and \u003ca href=\"https://www.edx.org/course/biochemistry-biomolecules-methods-and-mechanisms\"\u003e7.05x Biochemistry\u003c/a\u003e MOOCs, these cell biology courses transition to a comprehensive discussion of biology at an experimental level. How do we know what we know about cells at a molecular level and how can we use that knowledge to design experiments to test hypotheses"])</script><script>self.__next_f.push([1," in cell biology?\u003c/p\u003e\n\u003cp\u003eDo you think you know how cells grow and divide? Professor Iain Cheeseman will challenge you to see the cytoskeleton in new and beautiful ways. You will explore these structural elements of cells with an expanded toolkit to better understand the dynamic processes that generate incredible amounts of force and regulate function throughout the cell cycle.\u003c/p\u003e\n\u003cp\u003eWe developed the 7.06x Cell Biology series with an emphasis on:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping your scientific thinking skills including articulating hypotheses, performing thought experiments, interpreting data, and designing experiments.\u003c/li\u003e\n\u003cli\u003eUsing data based on real scientific experiments and highlighting the scientific process in assessments.\u003c/li\u003e\n\u003cli\u003eAsserting that biology is an active field that changes daily through examples of research and relevance to medicine, not static information in a textbook.\u003c/li\u003e\n\u003cli\u003eUniting themes and principles that inform how scientists conduct and interpret research.\u003c/li\u003e\n\u003cli\u003eImplementing the science of learning in the course design.\u003c/li\u003e\n\u003c/ul\u003ed6:T624,\u003cp\u003eThe key factor in getting more efficient and cheaper solar energy panels is the advance in the development of photovoltaic cells. In this course you will learn how photovoltaic cells convert solar energy into useable electricity. You will also discover how to tackle potential loss mechanisms in solar cells. By understanding the semiconductor physics and optics involved, you will develop in-depth knowledge of how a photovoltaic cell works under different conditions. You will learn how to model all aspects of a working solar cell. For engineers and scientists working in the photovoltaic industry, this course is an absolute must to understand the opportunities for solar cell innovation.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Solar Energy Engineering MicroMasters Program designed to cover all physics and engineering aspects of photovoltaics: photovoltaic energy conversion, technologies and systems.\u003c/p\u003e\n\u003cp\u003eWe recommend that you complete this course prior to ta"])</script><script>self.__next_f.push([1,"king the other courses in this MicroMasters program.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eEarn a Microcredential\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAfter finishing this course, and passing the related exam, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework. For more information, please read the FAQ below.\u003c/p\u003ed7:T863,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.\u003c/p\u003e\n\u003cp\u003eIn this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.\u003c/p\u003e\n\u003cp\u003eThe goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.\u003c/p\u003e\n\u003cp\u003eFirst, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.\u003c/p\u003e\n\u003cp\u003eSecond, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.\u003c/p\u003e\n\u003cp\u003eThird, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.\u003c/p\u003e\n\u003cp\u003eFinally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.\u003c/p\u003e\n\u003cp\u003eThis offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"d8:T431,\u003cp\u003eIn this course, we will introduce you to the fundamentals of sensor fusion for automotive systems. Key concepts involve Bayesian statistics and how to recursively estimate parameters of interest using a range of different sensors. \u003c/p\u003e\n\u003cp\u003eThe course is designed for students who seek to gain a solid understanding of Bayesian statistics and how to use it to fuse information from different sensors. We emphasize object positioning problems, but the studied techniques are applicable much more generally. The course contains a series of videos, quizzes and hand-on assignments where you get to implement many of the key techniques and build your own sensor fusion toolbox. \u003c/p\u003e\n\u003cp\u003eThe course is self-contained, but we highly recommend that you also take the course ChM015x: Multi-target Tracking for Automotive Systems. Together, these courses give you an excellent foundation to tackle advanced problems related to perceiving the traffic situation around an autonomous vehicle using observations from a variety of different sensors, such as, radar, lidar and camera.\u003c/p\u003ed9:T708,\u003cp\u003eThere is no doubt that quantum computers and the quantum internet will have a great impact on our world. But we don’t yet know quite how. As with traditional computers - we will only see the effects in the decades to come.\u003c/p\u003e\n\u003cp\u003eThis course will provide you with a basic understanding of quantum computing and the quantum internet. Together, we’ll peek into the fascinating world of quantum information, learning about qubits, superposition, entanglement, and much more.\u003c/p\u003e\n\u003cp\u003eWe’ll envision the potential impact of quantum computing and the quantum internet.\u003c/p\u003e\n\u003cp\u003eYou’ll explore various application areas, such as quantum chemistry, quantum machine learning, encryption and secure communication, factorization, and blind quantum computation.\u003c/p\u003e\n\u003cp\u003eThe course is aimed at a broad and diverse audience including policy-makers, people with a scientific or personal interest, business executives, and students at all levels. We invite you on a jo"])</script><script>self.__next_f.push([1,"urney beyond what is known to us now, and to envision a world with quantum technologies.\u003c/p\u003e\n\u003cp\u003eThis journey continues with our program \u003ca href=\"https://www.edx.org/professional-certificate/delftx-quantum-computing-and-quantum-internet\" title=\"Quantum 101: Quantum Computing \u0026 Quantum Internet\"\u003e\u003cem\u003eQuantum 101: Quantum Computing and Quantum Internet\u003c/em\u003e\u003c/a\u003e, where we expand from an understanding of the building blocks of quantum computers to look at further applications and possibilities.\u003c/p\u003e\n\u003cp\u003eThis course is authored by experts from the QuTech research center at Delft University of Technology. In the center scientists and engineers work together to enhance research and development in quantum technology. QuTech Academy’s aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.\u003c/p\u003eda:T777,\u003cp\u003ePhotovoltaic systems are often placed into a microgrid, a local electricity distribution system that is operated in a controlled way and includes both electricity users and renewable electricity generation. This course deals with DC and AC microgrids and covers a wide range of topics, from basic definitions, through modelling and control of AC and DC microgrids to the application of adaptive protection in microgrids. You will master various concepts related to microgrid technology and implementation, such as smart grid and virtual power plant, types of distribution network, markets, control strategies and components. Among the components special attention is given to operation and control of power electronics interfaces.\u003c/p\u003e\n\u003cp\u003eYou will be familiarized with the advantages and challenges of DC microgrids (which are still in an early stage). As a verified learner you will also have the opportunity to master the topic of microgrids through an exercise in which you will evaluate selected pilot sites where microgrids were deployed. The evaluation will take the form of a simulation assignment and include a peer review of the results.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Solar Energy Eng"])</script><script>self.__next_f.push([1,"ineering MicroMasters program designed to cover all physics and engineering aspects of photovoltaics: photovoltaic energy conversion, technologies and systems.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eEarn a Microcredential\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAfter finishing this course, and passing the related exam, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework. For more information, please read the FAQ below.\u003c/p\u003edb:Tde4,"])</script><script>self.__next_f.push([1,"\u003cp\u003eA quantum network is very similar to a classical network (such as the internet), where we send and receive digital information. But unlike a classical network, a quantum network utilizes quantum bits, or qubits, to transmit and process information. By exploiting principles such as entanglement and superposition, it enables quantum communication protocols which can be applied to provide secure communication and enable distributed computing.\u003c/p\u003e\n\u003cp\u003eThis course aims to provide you with an introduction to this new and exciting field. It will focus on protocol and application development and the simulation of quantum networks.\u003c/p\u003e\n\u003cp\u003eWhat makes this course stand out is the utilization of QuTech’s Quantum Network Explorer (QNE) to demonstrate the capabilities of quantum networks. Using the various simulation tools provided by the platform, you will be able to experiment with quantum network applications, enabling you to discover the possibilities that this new technology offers.\u003c/p\u003e\n\u003cp\u003eThe course starts with a brief overview of quantum networks. After this, you will delve into the various tools offered by QNE, including the QNE Community Application Library (QNE-CAL), the QNE Application Development Kit (QNE-ADK), and SquidASM, an advanced application simulator developed by QuTech.\u003c/p\u003e\n\u003cp\u003eYou will gain insight into established applications of quantum networks such as quantum key distribution (QKD), teleportation, and blind quantum computation (BQC). You will also have the opportunity to engage in hands-on exercises, through which you will learn to perform your own quantum network simulations by adjusting input parameters using an intuitive graphical user interface.\u003c/p\u003e\n\u003cp\u003eFurther, you will learn how to modify existing applications and create new ones from scratch using QNE’s Application Development Kit (QNE-ADK). You will also receive a comprehensive tutorial on SquidASM, a software package designed for advanced simulations of quantum network applications.\u003c/p\u003e\n\u003cp\u003eIf you have made it thus far, you have mastered essential tools for developing and investigating quantum networking applications and will have the opportunity to join a growing community of developers! Upon successful completion of the course, EU users (both audit and verified) are entitled to a QTIndu certificate.\u003c/p\u003e\n\u003cp\u003eThis course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to drive research and development in quantum technology. QuTech Academy's aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.\u003c/p\u003e\n\u003cp\u003eThis project has received funding from the European Union's Digital Europe Programme under grant agreement no. 101100757.\u003c/p\u003e\n\u003cp\u003eThis course has been developed with the support of the European-funded project QTIndu (Quantum Technologies courses for Industry). The aim of QTIndu is to provide a solution specifically tailored to the industry needs. Together with other 10 partners which include universities, research institutes and private companies, we are creating training courses in quantum technologies for professionals in industries. Learn more on qtindu.eu (\u003ca href=\"https://qtindu.eu/\" rel=\"noopener\" target=\"_blank\"\u003ehttps://qtindu.eu/\u003c/a\u003e).\u003c/p\u003e\n\u003cp\u003e\u003cimg src='https://courses.edx.org/asset-v1:DelftX+QCQN1x+3T2024+type@asset+block@Logo_QTIndu_and_EU_funded.PNG' width='100%' height='' alt='Logo of the European-funded project QTIndu (Quantum Technologies courses for Industry)' /\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"dc:T99b,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEngineers in the automotive industry are required to understand basic safety concepts. With increasing worldwide efforts to develop connected and self-driving vehicles, traffic safety is facing huge new challenges. This course is for students or professionals who have a bachelor's degree in mechanical engineering or similar and who are interested in a future in the vehicle industry or in road design and traffic engineering. It's also of value for people already working in these areas who wantbetter insight into safety issues. \u003c/p\u003e\n\u003cp\u003eThis course teaches the fundamentals of active safety (systems for avoiding crashes or reducing crash consequences) as well as passive safety (systems for avoiding or reducing injuries). Key concepts include in-crash protective systems, collision avoidance, and safe automated driving. The course will introduce scientific and engineering methodologies that are used in the development and assessment of traffic safety and vehicle safety. This includes methods to study the different components of real-world traffic systems with the goal to identify and understand safety problems and hazards. It includes methods to investigate the attitudes and behavior of drivers and other road users as well as recent solutions to improve active safety. Italso includes methods to study human body tolerance to impact and solutions to minimize the injury risk in crashes. \u003c/p\u003e\n\u003cp\u003eStudy topics include crash data analysis and in-situ observational studies of drivers and other road users by the use of instrumented vehicles and roadside camera systems. Solutions in active safety, such as driver alertness monitoring, driver information as well as collision avoidance and collision mitigation systems, will be described. Examples of in-crash protective systems are combinations of traditional restraints such as seat belts and airbags but with advanced functions such as automatic adaption to the individual occupant as well as pre-collision activation based on advanced integrated sensor systems and communication systems. \u003c/p\u003e\n\u003cp\u003eThe course will be based on recorded lectures that use videos and animations to enhance the experience. Online tutorials that access simulation models will give the participants an experience of influencing parameters in active safety and passive safety systems. \u003c/p\u003e\n\u003cp\u003eAs a result of support from MathWorks, students will be granted access to MATLAB/Simulink for the duration of the course.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"dd:T548,\u003cp\u003eThe technologies used to produce solar cells and photovoltaic modules are advancing to deliver highly efficient and flexible solar panels. In this course you will explore the main PV technologies in the current market. You will gain in-depth knowledge about crystalline silicon based solar cells (90% market share) as well as other emerging technologies including CdTe, CIGS and Perovskites. This courseprovides answers to the questions: How are solar cells made from raw materials? Which technologies have the potential to be the major players for different applications in the future?\u003c/p\u003e\n\u003cp\u003eThis course is part of the Solar Energy Engineering MicroMasters Program designed to cover all physics and engineering aspects of photovoltaics: photovoltaic energy conversion, technologies and systems.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eEarn a Microcredential\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAfter finishing this course, and passing the related exam, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework. For more information, please read the FAQ below.\u003c/p\u003ede:T457,\u003cp\u003e\u003cspan lang=\"EN-GB\"\u003eIn this course you will gain access to the final exam of the course \u003c/span\u003ePhotovoltaic (PV) Energy Conversion. You will be given exam preparation material to help you prepare (available in the audit track as well), and two attempts.\u003cspan lang=\"EN-GB\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThe exam is offered in the format of proctored exams. To read more about proctored exam and to review the technical requirements, review the edX's help pages: https://support.edx.org/hc/en-us/articles/207249428-How-do-proctored-exams-work-\u003cspan lang=\"EN-GB\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAfter passing the exam in this course, and its related course, you are eligible to receive one microcredential. A micr"])</script><script>self.__next_f.push([1,"ocredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework.\u003cspan lang=\"EN-GB\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eFor more information, please read the FAQ on this course page.\u003c/p\u003edf:T576,\u003cp\u003eOn the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are powerful enough to obtain fine-grained information such as cryptographic keys, user input, or secrets of the operating system. This skill set and knowledge will give you the ability to spot these side channels in hardware and software projects. We will then cover countermeasures and mitigation strategies that allow you to develop side-channel-resilient hardware and software and protect your security-critical applications and sensitive information.\u003c/p\u003e\n\u003cp\u003eOn the software side, we will learn about branch prediction an prefetching. We will learn how these mechanisms can be subverted into powerful side-channel attacks. You will need programming skills (C, C++, Python) and we will provide you with the knowledge required beyond these, including basics on hardware design, computer architecture, operating systems, and cryptography.\u003c/p\u003e\n\u003cp\u003eYou will learn which attacks are relevant in the concrete environments you are working with, extending to your risk assessment skills. In a set of small exercises, you will demonstrate that you understood the techniques behind simple power analysis, and differential power analysis, as well as prefetch side channels and branch-prediction side channels.\u003c/p\u003ee0:T4cf,\u003cp\u003eSame as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, livi"])</script><script>self.__next_f.push([1,"ng in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels.\u003c/p\u003e\n\u003cp\u003eIn this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.\u003c/p\u003ee1:T842,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis Supply Chain Design course is part of the \u003ca href=\"https://www.edx.org/mitx-micromasters-credential-supply\"\u003eMITx MicroMasters Credential in Supply Chain Management\u003c/a\u003e, offered by #1 ranked SCM Master's program at the Massachusetts Institute of Technology.\u003c/p\u003e\n\u003cp\u003eCTL.SC2x Supply Chain Design covers all aspects involved in the design of supply chains for companies and organizations anywhere in the world. The course is divided into four main topic areas: Physical flow design, Supply chain finance, Information flow design, and Organization/Process design. In the design of physical flows, we show how to formulate and solve Transportation, Transshipment, Facility Location, and Network Design Problems. For financial flows we show how to translate supply chain concepts and actions into the language of the Chief Financial Officer (CFO) of a company. We cover Activity Based Costing, Working Capital, the Cash-to-Cash cycle and Discounted Cash Flow Analysis. The design of the information flow section describes how firms communicate with suppliers (procurement, risk contracts), internal resources (production planning, bills of materials, material requirements planning), and customers (Sales \u0026amp; Operations Planning and other collaboration based processes). In the last section, we introduce performance metric design and organizational design within the supply chain organization focusing mainly on the centralize/decentralize decision.\u003c/p\u003e\n\u003cp\u003eThe main topic areas we will focus on in this course are:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eSupply Chain Network Design\u003c/li\u003e\n\u003cli\u003eSupply Chain Finance\u003c/li\u003e\n\u003cli\u003eSupplier Management\u003c/li\u003e\n\u003cli\u003eProduction and Demand Planning\u003c/li\u003e\n\u003cli\u003eProcess and Organizational Design\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course is indispensable if you’re considering a supply chain management career and, specifically, the positions of \u003cstrong\u003eSupply Chain Analyst\u003c/strong\u003e , \u003cstrong\u003eOperations Manager\u003c/strong\u003e , or \u003cstrong\u003eLogistics Coordinator\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThis is an open enrollment course\u003c/strong\u003e , making it accessible for almost anyone, anywhere in the world to enroll and learn for free.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e2:Tcbb,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course is authored by experts from the QuTech research center at Delft University of Technology. In the center, scientists and engineers work together to drive research and development in quantum technology. QuTech Academy's aim is to inspire, share and disseminate knowledge about the latest developments in quantum technology.A quantum computer is a new class of computer that promises to find solutions to specific problems, which a classical computer either cannot solve or will take much longer to solve. Unlike classical computers, a quantum computer is built-up with qubits and utilizes concepts such as the superposition principle and quantum entanglement to solve complex problems.\u003c/p\u003e\n\u003cp\u003eThis course aims to provide you with an introduction to this exciting field beyond the theoretical. It will focus on understanding the hardware of a quantum computer, provide basic applications, and introduce the software and programming language to run a quantum computer.\u003c/p\u003e\n\u003cp\u003eWhat makes this course stand out is the utilization of QuTech’s Quantum Inspire (QI) to demonstrate the capabilities of quantum computers. Using the real quantum hardware and the various simulation tools provided by the platform, you will be able to experiment and execute quantum algorithms on a real quantum computer, enabling you to discover the possibilities that this new technology offers.\u003c/p\u003e\n\u003cp\u003eThe course starts with a brief overview of the quantum hardware, that makes a quantum computer, and of quantum algorithms that can be run on a quantum computer. After this, you will delve into the various tools offered by QI, including cQASM, a programming language developed to operate on a quantum computer, and QI Software Development Kit (SDK), that allows you to develop and execute your own algorithms on the quantum computers developed by QuTech.\u003c/p\u003e\n\u003cp\u003eIf you have made it this far, you will have mastered the essential tools for developing and investigating quantum computing applications and will have the opportunity to join a growing community of developers! Upon successful completion of the course, participants from the EU (both audit and verified) are entitled to a QTIndu certificate.\u003c/p\u003e\n\u003cp\u003eThis course was developed by a team of experts in quantum computing infrastructure and quantum information from TU Delft, drawing on the extensive expertise of leading experts in quantum technology from QuTech.\u003c/p\u003e\n\u003cp\u003eThis project has received funding from the European Union's Digital Europe Programme under grant agreement no. 101100757.\u003c/p\u003e\n\u003cp\u003eThis course has been developed with the support of the European-funded project QTIndu (Quantum Technologies courses for Industry). The aim of QTIndu is to provide solutions specifically tailored to the needs of industry. Together with ten other partners, which include universities, research institutes and private companies, we are creating training courses in quantum technologies for professionals in various industries. Learn more on qtindu.eu (https://qtindu.eu/).\u003c/p\u003e\n\u003cp\u003e\u003cimg src='https://courses.edx.org/asset-v1:DelftX+QCQN1x+3T2024+type@asset+block@Logo_QTIndu_and_EU_funded.PNG' width='100%' height='' alt='Logo of the European-funded project QTIndu (Quantum Technologies courses for Industry)' /\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e3:T73e,\u003cp\u003eProcessing information is the hallmark of all modern organizations, which are increasingly digital: absorbing, processing and generating information is a key element of their business.\u003cbr /\u003e\nBeing able to interact flexibly and efficiently with the underlying data and software systems is an indispensable skill. Knowledge of the Unix shell and its command-line tools boosts the effectiveness and productivity of software developers, IT professionals, and data analysts.\u003c/p\u003e\n\u003cp\u003eThe Unix tools were designed, written, actively used and refined by the team that defined the modern computing landscape. They allow the performance of almost any imaginable computing task quickly and efficiently by judiciously combining key powerful concepts. The power of Unix tools for exploring, prototyping and implementing big data processing workflows, and software engineering tasks remains unmatched. Unix tools, running on hardware ranging from tiny IoT platforms to supercomputers, uniquely allow an interactive, explorative programming style, which is ideal for the efficient solution of many of the engineering and business analytics problems that we face every day.\u003c/p\u003e\n\u003cp\u003eThrough the use of Unix tools:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eSoftware developers can quickly explore and modify code, data, and tests.\u003c/li\u003e\n\u003cli\u003eIT professionals can scrutinize log files, network traces, performance figures, filesystems and the behavior of processes.\u003c/li\u003e\n\u003cli\u003eData analysts can extract, transform, filter, process, load, and summarize huge data sets.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe course is uniquely based on carefully-selected, interactive walk-through examples that demonstrate how each command operates in practice. The examples that we use involve problems that engineers and analysts face every day.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e_ ___ Class Central: Best Online Courses of the Year (2021 edition)\u003c/strong\u003e\u003c/p\u003ee4:T9a7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eUrban planners, policy makers and managers have an important role in making cities and communities more sustainable and resilient by incentivizing and developing smart solutions. Medellín in Colombia is a good example of how effective governance and cooperation with citizens led to the remake of the city and transformed it to a safer environment with a thriving economy. But how can those initiatives be sustained and governed? How can we deal with the challenges along the way, like effective stakeholders’ engagement, conflicting interests, decision-making under deep uncertainty, interdependent problems, spatial justice, and the transformation towards a digital society? To sum it up: building smart sustainable cities initiatives requires a strong governance capacity and new approaches!\u003c/p\u003e\n\u003cp\u003eThis course will:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eprovide the principles for incentivising, planning, developing and managing sustainable smart city initiatives\u003c/li\u003e\n\u003cli\u003epresent an overview of the drivers and barriers for SSC development\u003c/li\u003e\n\u003cli\u003epresent sustainability challenges and tools for SSC development\u003c/li\u003e\n\u003cli\u003eshow practical recommendations to strengthen SSC governance capacity\u003c/li\u003e\n\u003cli\u003eintroduce a smart city governance roadmap\u003c/li\u003e\n\u003cli\u003eexplain the conditions for effective stakeholder engagement and ways to organize co-creation pathways\u003c/li\u003e\n\u003cli\u003eclarify the regulatory and legal framework for SSC including privacy and cybersecurity issues\u003c/li\u003e\n\u003cli\u003edescribe the conditions to implement digital innovation that benefit citizens including data governance\u003c/li\u003e\n\u003cli\u003eshow the importance of close monitoring and assessing SSC projects including data reliability and algorithms\u003c/li\u003e\n\u003cli\u003eequip you with knowledge and learnings from case studies from various projects that were carried out in Lain America, next to familiarizing you with common challenges that arise in the process. These cases range from urban transportation to participatory budgeting, safety and waste management applications, but always making the connection with the governance and sustainability aspects.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe course will be moderated in English, Spanish and Portuguese.\u003c/p\u003e\n\u003cp\u003eThis MOOC is a spin-off of the EU-funded Cap4City project. This course has been developed, and will be delivered by experts in the field of Smart Sustainable Cities from twelve different universities in Latin America and Europe. You will find more information on the instructors while you navigate the course.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e5:T972,"])</script><script>self.__next_f.push([1,"\u003cp\u003eRandomness is inherent in all processes including manufacturing. The fundamental concepts taught in this course will help learners develop powerful statistical process control methods that are the foundation of world-class manufacturing quality.\u003c/p\u003e\n\u003cp\u003eAs part of the Principles of Manufacturing MicroMasters program, this course will introduce statistical methods that apply to any unit manufacturing process. We will cover the following topics:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRecognizing inherent variability in continuous production\u003c/li\u003e\n\u003cli\u003eIdentifying sources of process output variation\u003c/li\u003e\n\u003cli\u003eDescribing variation in a structured manner\u003c/li\u003e\n\u003cli\u003eApplying basic probability and statistics concepts to characterize process variation\u003c/li\u003e\n\u003cli\u003eDifferentiating between design specifications and process capability\u003c/li\u003e\n\u003cli\u003eSynthesizing novel approaches to unfamiliar situations by extending the core material (i.e. go beyond the “standard” uses).\u003c/li\u003e\n\u003cli\u003eAssessing the appropriateness of various statistical methods for a variety of problems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eDevelop the engineering and management skills needed for competence and competitiveness in today’s manufacturing industry with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT’s #1-ranked Mechanical Engineering department in the world. Learners who pass the 8 courses in the program will earn the MicroMasters Credential and qualify to apply to gain credit towards MIT’s Master of Engineering in Advanced Manufacturing \u0026amp; Design program.\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://news.mit.edu/2021/mit-harvard-transfer-edx-2u-0629\"\u003eagreement to transfer the edX platform to 2U, Inc\u003c/a\u003e., which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e6:Tc9e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eClimate change is an urgent global challenge demanding engineering solutions and large-scale, systems-oriented coordination. In Sustainable Energy, you’ll join thousands of global learners in examining conventional and renewable energy generation technologies, studying how they are deployed throughout the world, and evaluating their roles in the future energy landscape. Technologies include solar power, wind power, storage, nuclear power, hydropower, and bioenergy.\u003c/p\u003e\n\u003cp\u003eIn addition to technological components, you’ll become familiar with the economic, political, and social dimensions of energy project planning. Professionals from diverse backgrounds must work together to determine pathways to decarbonization amidst scientific uncertainty and unique geopolitical challenges. You will be presented with advanced tools and strategies to explore pathways to decarbonization in specific contexts, and to build consensus among stakeholders.\u003c/p\u003e\n\u003cp\u003eThe course is instructed by Michael Golay, Professor of Nuclear Science and Engineering at the Massachusetts Institute of Technology. Additional experts in various technologies will offer guest lectures, including:\u003c/p\u003e\n\u003cp\u003eDr. Patrick Brown, \u003ca href=\"https://www.nrel.gov/\"\u003eNational Renewable Energy Lab\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Diane Rigos, \u003ca href=\"http://energy.mit.edu/\"\u003eMIT Energy Initiative\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Alex Kalmikov, Lead Data Scientist, \u003ca href=\"https://www.aetna.com/\"\u003eAetna\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Francis O' Sullivan, \u003ca href=\"https://us.orsted.com/\"\u003eOrsted North America\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Charles Forsberg, \u003ca href=\"https://web.mit.edu/nse/\"\u003eMIT Department of Nuclear Science and Engineering\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Donald Sadoway, \u003ca href=\"https://dmse.mit.edu/\"\u003eMIT Department of Materials Science and Engineering\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Dennis Whyte, \u003ca href=\"https://www.psfc.mit.edu/\"\u003eMIT Plasma Science and Fusion Center\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Zach Hartwig, \u003ca href=\"https://www.psfc.mit.edu/\"\u003eMIT Plasma Science and Fusion Center\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Gregory Stephanopoulos, \u003ca href=\"https://cheme.mit.edu/\"\u003eMIT Department of Chemical Engineering\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eDr. Vrushank Phadnis, \u003ca href=\"http://meche.mit.edu/\"\u003eMIT Department of Mechanical Engineering\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eCourse image is the cover to \u003cem\u003eSustainable Energy, Choosing Among Options, second edition,\u003c/em\u003e reprinted courtesy of The MIT Press.\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://press.edx.org/2u-inc.-and-edx-to-join-together-in-industry-redefining-combination\"\u003eagreement to transfer the edX platform to 2U, Inc.\u003c/a\u003e, which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e7:Tcc3,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course focuses on early-stage biotechnology companies, with particular emphasis on understanding the underlying science, technology, and disease targets—together with the application of novel business structures and financing methods—to facilitate drug discovery, clinical development, and greater patient access to new therapies.\u003c/p\u003e\n\u003cp\u003eCurrent research is enhancing our understanding of the genetic, molecular, and cellular bases of many human diseases, and is leading to many new types of biotherapeutics that we will cover in this course, including recombinant therapeutic proteins; monoclonal antibodies and antibody drug conjugates; cancer immunotherapies, replacement cells and genetically engineered cells; and nucleic acid and gene therapies. Translating these discoveries into drugs and diagnostics increasingly requires the establishment of for-profit companies, but funding for early-stage development of novel therapies is becoming scarcer, especially for therapeutics for “rare” diseases that affect small populations. The dearth of funding for early-stage biotherapeutics companies in the so-called “Valley of Death” can be attributed to several factors, but a common thread is increasing financial risks in the biopharma industry and greater uncertainty surrounding the scientific, medical, economic, political, and academic environments within the biomedical ecosystem. Increasing risk and uncertainty inevitably leads to an outflow of capital as investors and other stakeholders seek more attractive opportunities in other industries.\u003c/p\u003e\n\u003cp\u003eBy applying financial techniques such as portfolio theory, securitization, and derivative securities to biomedical contexts, more efficient business and funding structures can be developed to reduce financial risks, lower the cost of capital, and bring more life-saving therapies to patients faster. Thus this course will also cover basic financial analysis for the life-sciences professional; the historical financial risks and returns of the biotech and pharmaceutical industries; the evaluation of the science and business potential as well as the mechanics of financing biotech startups; capital budgeting for biopharmaceutical companies; and applications of financial engineering in drug royalty investment companies, biomedical megafunds, drug approval swaps, and life sciences investment banking.\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://news.mit.edu/2021/mit-harvard-transfer-edx-2u-0629\"\u003eagreement to transfer the edX platform to 2U, Inc\u003c/a\u003e., which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"e8:T6f9,\u003cp\u003eA supply chain entails two or more parties that are linked together by material, information and money flows. The management of a supply chain attempts to coordinate the activities of the parties so that merchandise is produced and distributed at the right quantities, to the right locations, and at the right time, in order to minimize system-wide costs while satisfying service level requirements. \u003c/p\u003e\n\u003cp\u003eAs part of the Principles of Manufacturing MicroMasters program, this course will expose learners to concepts and models important in supply chain and manufacturing system planning,so that you canbettercoordinatevarious resources and assets to optimize the delivery of goods, with an emphasis on key tradeoffs and phenomena. There will be a particular emphasis on how to cope with variability as it arises across a supply chain. The course will introduce a set of operational tactics for dealing with supply chain variability, including: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRisk pooling\u003c/li\u003e\n\u003cli\u003eInventory placement\u003c/li\u003e\n\u003cli\u003eIntegrated planning and collaboration\u003c/li\u003e\n\u003cli\u003eInformation sharing\u003c/li\u003e\n\u003cli\u003eDelayed differentation\u003c/li\u003e\n\u003cli\u003eDual sourcing\u003c/li\u003e\n\u003cli\u003eSmoothing\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLectures, computer exercises, and case discussions introduce various models and methods for supply chain analysis and optimization. \u003c/p\u003e\n\u003cp\u003eDevelop the engineering and management skills needed for competence and competitiveness in today’s manufacturing industry with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT's #1-ranked Mechanical Engineering departmentin the world. Learners who pass the 8 courses in the program earn the MicroMasters Credential and qualify to apply to gain credit for MIT’s Master of Engineering in Advanced Manufacturing \u0026amp; Design program.\u003c/p\u003ee9:T6c3,\u003cp\u003eIn this course, part of the Principles of Manufacturing MicroMasters program, you will learn how to analyze manufacturing systems to optimize performance and control cost. You will develop an understanding of seemingly opaque production lines w"])</script><script>self.__next_f.push([1,"ith a particular emphasis on random disruptive events – their effects and how to deal with them, as well as inventory dynamics and management. \u003c/p\u003e\n\u003cp\u003eManufacturing systems are complex and require decision-making skills and analytical analysis. Managers and practitioners use a wide variety of methods to optimize the performance of manufacturing systems and control costs. The many processes and functions involved in building and maintaining these systems demand a high-level of knowledge. \u003c/p\u003e\n\u003cp\u003eIn this course, you will learn about these various methods and processes. We will start with a review of probability and statistics, and then cover topics in linear programming, queueing theory, inventory management and the Toyota Production System (TPS). Lastly, we will introduce stochastic manufacturing systems models developed here at MIT. \u003c/p\u003e\n\u003cp\u003eThe topics covered will provide the basis for learners to continue into the manufacturing field in such roles as an operations manager or supply chain manager. \u003c/p\u003e\n\u003cp\u003eDevelop the skills needed for competence and competitiveness in today’s manufacturing industry with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT’s #1-ranked Mechanical Engineering department in the world. Learners who pass the 8 courses in the program will earn the MicroMasters Credential and qualify to apply to gain credit towards MIT’s Master of Engineering in Advanced Manufacturing \u0026amp; Design program.\u003c/p\u003eea:T6d0,\u003cp\u003eAre you interested in taking your first steps in robotics? Do you seek a practical approach and want to learn by doing? Join our course and learn how to program a complete real-world robotic system with ROS!\u003c/p\u003e\n\u003cp\u003eThe Robot Operating System (ROS) enables you to quickly build robotic applications through access to a large set of open-source software and tools. Over the years, ROS has become the essential tool for roboticists. A large community surrounds ROS and there has been extensive input from industrial users in the development of these tools."])</script><script>self.__next_f.push([1,"\u003c/p\u003e\n\u003cp\u003eMany of the new advanced robot capabilities for manipulation, perception, and navigation have been developed using ROS. Companies such as Airbus and Boeing are using ROS for several of their applications. And we at Delft University of Technology won the Amazon Robotics Challenge 2016 with a robotic system developed with ROS.\u003c/p\u003e\n\u003cp\u003eIn this course, you will learn to use different ROS tools to create a complete robotic application. You will be working with your own standalone Ubuntu-Linux installation and with industrial and mobile robots on the physics-based simulation engine, Gazebo. You will learn to program and configure basic robotic tasks such as pick-and-place objects, and navigate through obstacles. You will then integrate all this knowledge to build an industrial production line with two robotic arms and a mobile robot.\u003c/p\u003e\n\u003cp\u003eAre you ready to make your robot say \"Hello\" to the (real) world with ROS?\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eThe development of this course is supported by ROSIN - ROS-Industrial Quality-Assured Robot Software Components. ROSIN project is funded by the European Union's Horizon 2020 research and innovation program under grant agreement no. 732287.\u003c/em\u003e\u003c/p\u003eeb:Tc7a,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAs global energy demand grows, to mitigate climate change we must drive a swift transition to clean energy resources and enhanced electric power grid infrastructure.\u003c/p\u003e\n\u003cp\u003eIn this course, you will explore systemic principles of future electric power system management, such as the role of smart grids, data-enabled machine learning, power electronics-control, and data-driven decision-making. You will learn how energy technologies, including intermittent renewable energy technologies, can be modeled and controlled at both the component and system level to achieve sustainable, well-functioning, and economically sound results.\u003c/p\u003e\n\u003cp\u003eYou will also learn about assumptions underlying today’s hierarchical control and the innovations needed to support end-to-end flexible efficient electricity services by conventional and new resources. A particular emphasis is on data-enabled distributed cooperative systems solutions.\u003c/p\u003e\n\u003cp\u003eThroughout, you will examine examples of real-world industry problems and solutions, such as methods for achieving stable integration of diverse power resources, demand response, and fast storage at reasonable cost. Modeling can be used for developing the next generation software needed to operate these systems, and for implementing incentives for new technologies in electric energy markets.\u003c/p\u003e\n\u003cp\u003eThis course is designed for people engaging the energy transition across disciplines and professions. It introduces fundamental concepts for those interested in working in power systems planning, operations, and management. Researchers with a background in dynamical systems and control will learn how to model the dynamics and objectives of enabling clean and resilient electricity services as systems problems while making physically meaningful assumptions and using these models as the basis for introducing their own novel data-enabled methods. Experienced professionals, including utility and energy industry executives, will gain insights into cutting-edge research, concepts, and software. Policymakers in government and leaders in non-governmental organizations (NGOs) will find strategies for building resilience in grid infrastructure, driving more equitable access to energy, and driving higher renewable energy penetration in local markets.\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://press.edx.org/2u-inc.-and-edx-to-join-together-in-industry-redefining-combination\"\u003eagreement to transfer the edX platform to 2U, Inc.\u003c/a\u003e, which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ec:Tc38,"])</script><script>self.__next_f.push([1,"\u003cp\u003eFor 30 years the Space Shuttle enabled human spaceflight in the United States and partner nations. Learn all about the Shuttle with thisunique course, which also serves as a unique historical record. Since the lecturers are the same people who designed, built and operated the Shuttle, this is a first-hand testimonial to the world’s first reusable spacecraft.\u003c/p\u003e\n\u003cp\u003eThis course examines how the Space Shuttle was designed and how its design was influenced by economics and politics. The course goes into detail on many of the Shuttle’s subsystems (e.g. rocket engines, thermal protection, aerodynamics, environmental control and life support, communications, etc.) and explains how the Shuttle was operated (launch, mission control, payloads, etc.). The course also uses the Space Shuttle to present the fundamentals of Systems Engineering.\u003c/p\u003e\n\u003cp\u003eStudents will gain a systems perspective on the complexities of Shuttle development and its operations. Itexplores both the Shuttle’s successes and its shortcomings and has valuable object lessons for future space initiatives.The Shuttle is a valuable case study in the advantages and difficulties involved in reusable space systems - particularly relevant today as reusability is a key requirement of many rockets and spacecraft currently under development.\u003c/p\u003e\n\u003cp\u003eIn addition, understanding how the Shuttle was first conceived and how it achieved governmental approval is relevant for understanding how politics and economics interact with technology on all large public programs.\u003c/p\u003e\n\u003cp\u003eThe lectures are organized in three fundamental sections: history and policy, technical design of Shuttle systems, and how the Shuttle was operated. Although the sections relate to one another, students can benefit from any of the sections independently.\u003c/p\u003e\n\u003cp\u003eThis course does not require advanced mathematics.It is targeted to students with a variety of interests including the history of human spaceflight,space policy, the design of human spaceflight systems, the operation of complex space systems, and principles of systems engineering.\u003c/p\u003e\n\u003cp\u003eImage courtesy of NASA: https://www.nasa.gov/sites/default/files/thumbnails/image/739339main_space_shuttle_challenger_04-04-1983.jpg\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://news.mit.edu/2021/mit-harvard-transfer-edx-2u-0629\" title=\"ToS\"\u003eagreement to transfer the edX platform to 2U, Inc.\u003c/a\u003e, which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ed:T8c9,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDo you want to learn more about data and gain programming experience? If yes, this is the right course for you to start!\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e“Big data”, “data science”, “data-mining” and “artificial intelligence” are all popular terms that are often encountered nowadays in the academic and in business worlds.\u003c/p\u003e\n\u003cp\u003eComputer Science is a field where the usage of computers and “computations” have continuously evolved. As computational power increases, computation becomes an indispensable tool for solving complex problems and making predictions. We are now able to “compute” various things from DNA sequencing to aerodynamics simulations and weather forecasting.\u003c/p\u003e\n\u003cp\u003eIn this course, you will learn the essence of computer science. You will obtain an overview of cutting-edge computer science as well as learn the basics and introductory level knowledge of computer science, while experiencing, designing and writing your own simple programs. This revised course consists of 5 weekly units. A separate course covering the same content is also offered where the lectures are given in Japanese. \u003c/p\u003e\n\u003cp\u003eThe course begins by introducing the notion of computation and data and how things work inside a computer. Before jumping into advanced topics like encryption and cryptanalysis, we will discover important notions like \"arrays\", \"characters\" and \"strings\" and we will know more about functions and subroutines throughout the lectures. Along the way we will practice with exercises to have a hands-on experience and deeper understanding of the explained notions. All exercises have files that can be downloaded and used. A detailed explanation about setting up the environment to run the programs using the language Ruby is provided at the beginning of the course.\u003c/p\u003e\n\u003cp\u003eBy the end of this course you will be able to write your own programs for encryption and decryption of English texts. The course concludes with a general overview of the recent progress and research trends in the computer science field. This last part covers topics discussing the nature of computation as well as applications of computation in our modern society such as simulations, data mining and artificial intelligence AI.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ee:Ta78,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHalf of all Americans have money in the stock market, yet economists can’t agree on whether investors and markets are rational and efficient, as modern financial theory assumes, or irrational and inefficient, as behavioral economists believe—and as financial bubbles, crashes, and crises suggest. This is one of the biggest debates in economics, and the value or futility of investment management and financial regulation hang on the outcome. In this course, MIT finance professor Andrew W. Lo cuts through this debate with a new framework—the Adaptive Markets Hypothesis—in which rationality and irrationality coexist.\u003c/p\u003e\n\u003cp\u003eDrawing on psychology, evolutionary biology, neuroscience, artificial intelligence, and other fields, this course shows that the theory of market efficiency isn’t wrong, but merely incomplete. When markets are unstable, investors react instinctively, creating inefficiencies for others to exploit. This new paradigm explains how evolution shapes behavior and markets at the speed of thought—a fact revealed by swings between stability and crisis, profit and loss, and innovation and regulation.\u003c/p\u003e\n\u003cp\u003eA fascinating intellectual journey filled with compelling stories, the course begins with the origins of market efficiency and its failures, turns to the foundations of investor behavior, and concludes with some practical implications—including how hedge funds have become the Galápagos Islands of finance, what really happened in the 2008 meltdown, and how we might avoid future crises.\u003c/p\u003e\n\u003cp\u003eThis course provides ambitious new approaches to address some of the biggest challenges facing us today such as cancer, climate change, the energy crisis, and how to navigate through the choppy waters of global financial markets in a post-COVID-19 world.\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://news.mit.edu/2021/mit-harvard-transfer-edx-2u-0629\"\u003eagreement to transfer the edX platform to 2U, Inc\u003c/a\u003e., which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ef:T4b8,Computational thinking is becoming widely recognized as a skill necessary for every educated person in a technologically advanced society.\u0026nbsp; \u003cbr /\u003e\u003cbr /\u003eWe will focus on just a subset of computational thinking which concerns creating models of the physical world \u0026ndash; something that engineers frequently need to do.\u0026nbsp; Because of that choice, this course covers many topics normally viewed as within the domain of mathematics such as algebra and calculus, but the solution procedures are algorithmic rather than symbolic. \u003cbr /\u003e \u003cbr /\u003eThe major themes of the course are:\u003cbr /\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eRepresentation -- How do you encode information about the world in a computer?\u0026nbsp; How do your choices in representation affect the ease with which you can solve problems?\u003c/li\u003e\r\n\u003cli\u003eDecomposition -- How do you break a large and diverse problem into many simpler parts?\u003c/li\u003e\r\n\u003cli\u003eDiscretization -- How do you break up space and time into a large number of relatively small pieces?\u0026nbsp; What are the alternative ways of doing this?\u0026nbsp; What are the consequences of discretization procedures for accuracy and speed?\u003c/li\u003e\r\n\u003cli\u003eVerification -- How do you build confidence in the results of a model?\u003c/li\u003e\r\n\u003c/ul\u003ef0:T5c3,\u003cp\u003eManufacturing systems are complex systems that require analytical analysis. Managers and practitioners use a wide variety of methods to analyze and optimize the performance of manufacturing systems and control costs. \u003c/p\u003e\n\u003cp\u003eIn this course, part of the Principles of Manufacturing MicroMasters program, you will learn about Multi-Part-Type Manufacturing Systems. We will discuss Material Requirements Planning (MRP), Multi-Stage Control and Scheduling as well as Simulation and Quality. \u003c/p\u003e\n\u003cp\u003eThis course will enableyou to develop an intuition about stochastic production lines.You will understand the importance and cost of inventory buffers, run basic simulation and optimizations and develop a policy to manage production systems. \u003c/p\u003e\n\u003cp\u003eThe topics that we cover will provide the basis for you to continue into the "])</script><script>self.__next_f.push([1,"manufacturing field in roles such as an operations manager and supply chain manager. \u003c/p\u003e\n\u003cp\u003eThis course should be taken in sequence following Introduction to Manufacturing Systems. \u003c/p\u003e\n\u003cp\u003eDevelop the skills needed for competence and competitiveness in today’s manufacturing industry with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT’s #1-ranked Mechanical Engineering department in the world. Learners who pass the 8 courses in the program will earn the MicroMasters Credential and qualify to apply to gain credit towards MIT’s Master of Engineering in Advanced Manufacturing \u0026amp; Design program.\u003c/p\u003ef1:T8a3,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAs part of the Principles of Manufacturing MicroMasters program, this course focuses on decision making for system design, as it arises in manufacturing systems and supply chains.\u003c/p\u003e\n\u003cp\u003eYou will learn about frameworks and models for structuring key system design issues and trade-offs that arise in today’s supply chains and manufacturing systems.\u003c/p\u003e\n\u003cp\u003eThe course will also cover various models, methods and software tools for decision support for:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLogistics network design\u003c/li\u003e\n\u003cli\u003eCapacity planning and flexibility\u003c/li\u003e\n\u003cli\u003eMake-buy\u003c/li\u003e\n\u003cli\u003eSupply chain contracting\u003c/li\u003e\n\u003cli\u003eSupply chain risk mitigation\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eYou will learn through industry applications and cases to illustrate concepts and challenges.This course should be taken in sequence following Supply Chains and Manufacturing Systems: Planning.\u003c/p\u003e\n\u003cp\u003eDevelop the engineering and management skills needed for competence and competitiveness in today’s manufacturing industry with the Principles of Manufacturing MicroMasters Credential, designed and delivered by MIT’s #1-ranked Mechanical Engineering department in the world. Learners who pass the 8 courses in the program will earn the MicroMasters Credential and qualify to apply to gain credit towards MIT’s Master of Engineering in Advanced Manufacturing \u0026amp; Design program.\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003ePlease note: edX Inc. has recently entered into an \u003ca href=\"https://news.mit.edu/2021/mit-harvard-transfer-edx-2u-0629\"\u003eagreement to transfer the edX platform to 2U, Inc\u003c/a\u003e., which will continue to run the platform thereafter. The sale will not affect your course enrollment, course fees or change your course experience for this offering. It is possible that the closing of the sale and the transfer of the edX platform may be effectuated sometime in the Fall while this course is running. Please be aware that there could be changes to the edX platform Privacy Policy or Terms of Service after the closing of the sale. However, 2U has committed to preserving robust privacy of individual data for all learners who use the platform. For more information see the \u003ca href=\"https://support.edx.org/hc/en-us/articles/4403415754007-edX-and-2U\"\u003eedX Help Center\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"f2:T780,\u003cp\u003eCities - home to 55% of the global population, or 4.2 billion people - are responsible for up to 70% of human-caused fossil fuel emissions and therefore have a crucial role in addressing climate change across sectors. 11.270x Cities and Climate Change: Mitigation and Adaptation explores all of these areas with critical examination of the strategies cities have already deployed, enabling course participants to investigate urban climate change actions and develop policy recommendations for adaptation and mitigation response.\u003c/p\u003e\n\u003cp\u003eThis instructor-paced course is equal parts information assimilation and hands-on application. Learners will gain a deeper understanding of fundamental theories of urban social and economic governance and evaluate these from the standpoint of climate resilience. Learners will improve their understanding of the operation of actors and systems involved in structuring policy and climate action. Through the perspectives of leading academics and practitioners, students will gain fundamental knowledge on core topics in urban climate mitigation and adaptation, including urban climate science, global warming, energy and transportation systems, environmental justice and equity, governance and policy, Traditional Ecological Knowledge (TEK), land use planning, urban design, disaster risk management, among others.\u003c/p\u003e\n\u003cp\u003eBuilding on and working with the Urban Climate Change Research Network’s (UCCRN’s) scientific community, learners will hear from climate change experts in different disciplines to understand how challenges and opportunities are experienced across the world. They will apply insights gleaned in class to explore city-specific research on climate resilience strategies. This course offers a foundation of knowledge on cities and climate change, with the opportunity to apply what is learned through city case study research for climate policy and action.\u003c/p\u003ef3:T7bf,\u003cp\u003eHow do you design a mobile app that truly changes people's lives? How can you understand how a new service is"])</script><script>self.__next_f.push([1," being used, both quantitatively and qualitatively? How can you use all of the rich sensing and I/O capabilities of mobile devices to create experiences that go far beyond what's possible on a traditional computer?\u003c/p\u003e\n\u003cp\u003eMobile devices are changing the ways that we interact with each other and information in the world. This course will take you from a domain of interest, through generative research, design, usability, implementation and field evaluation of a novel mobile experience. You'll finish the course with a working, field-tested application suitable for release in the app store as well as a deep understanding of human interaction with mobile devices and services.\u003c/p\u003e\n\u003cp\u003eBased on a popular MIT class that has been taught since 2006 by Frank Bentley of Yahoo Labs and Ed Barrett, a Senior Lecturer at MIT, this course will explore what makes mobile devices unique. A primary focus will be on studying existing behavior and using key findings for design. While writing the code for an app is a part of the class, the majority of the topics will cover designing and evaluating a unique mobile experience. Along the way, you will have opportunities to share your work with other students from around the world! Java experience (or Objective C for iOS users) and a smartphone are required.\u003c/p\u003e\n\u003cp\u003eAll required readings are available within the courseware, courtesy of The MIT Press. A print version of the course textbook, \u003ca href=\"http://mitpress.mit.edu/books/building-mobile-experiences-0\"\u003e\u003cem\u003eBuilding Mobile Experiences\u003c/em\u003e\u003c/a\u003e, is also available for purchase. The MIT Press is offering enrolled students a special 30% discount on books ordered directly through the publisher’s website. To take advantage of this offer, please use promotion code BME30 at \u003ca href=\"http://mitpress.mit.edu/books/building-mobile-experiences-0\"\u003eThe MIT Press\u003c/a\u003e site.\u003c/p\u003ef4:Tbae,"])</script><script>self.__next_f.push([1,"\u003cul\u003e\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,9089,[null,0],null,null,null,null,null,null,2,1,0,null,null,null,10]\" data-sheets-value=\"[null,2,\u0026quot;\\u2022 To understand the entire HCI design process, as applied to mobile applications\\n\\u2022 To construct a novel mobile application and assess its use in daily life for two weeks\\n\\u2022 To prepare and evaluate three different types of HCI research studies (generative, usability, and field studies), related to the topic of your application \\n\\u2022 To identify and discuss papers from the CHI research community and design and compose your own CHI-style paper\\n\u0026quot;]\"\u003eTo understand the entire HCI design process, as applied to mobile applications\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,9089,[null,0],null,null,null,null,null,null,2,1,0,null,null,null,10]\" data-sheets-value=\"[null,2,\u0026quot;\\u2022 To understand the entire HCI design process, as applied to mobile applications\\n\\u2022 To construct a novel mobile application and assess its use in daily life for two weeks\\n\\u2022 To prepare and evaluate three different types of HCI research studies (generative, usability, and field studies), related to the topic of your application \\n\\u2022 To identify and discuss papers from the CHI research community and design and compose your own CHI-style paper\\n\u0026quot;]\"\u003eTo construct a novel mobile application and assess its use in daily life for two weeks\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,9089,[null,0],null,null,null,null,null,null,2,1,0,null,null,null,10]\" data-sheets-value=\"[null,2,\u0026quot;\\u2022 To understand the entire HCI design process, as applied to mobile applications\\n\\u2022 To construct a novel mobile application and assess its use in daily life for two weeks\\n\\u2022 To prepare and evaluate three different types of HCI research studies (generative, usability, and field studies), related to the topic of your application \\n\\u2022 To identify and discuss papers from the CHI research community and design and compose your own CHI-style paper\\n\u0026quot;]\"\u003eTo prepare and evaluate three different types of HCI research studies (generative, usability, and field studies), related to the topic of your application\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,9089,[null,0],null,null,null,null,null,null,2,1,0,null,null,null,10]\" data-sheets-value=\"[null,2,\u0026quot;\\u2022 To understand the entire HCI design process, as applied to mobile applications\\n\\u2022 To construct a novel mobile application and assess its use in daily life for two weeks\\n\\u2022 To prepare and evaluate three different types of HCI research studies (generative, usability, and field studies), related to the topic of your application \\n\\u2022 To identify and discuss papers from the CHI research community and design and compose your own CHI-style paper\\n\u0026quot;]\"\u003eTo identify and discuss papers from the CHI research community and design and compose your own CHI-style paper\u003c/span\u003e\u003cbr /\u003e\n\t \u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"f5:T756,\u003cp\u003eOver one hundred years have passed since \u003cem\u003eThe Principles of\u003c/em\u003e \u003cem\u003eScientific Management\u003c/em\u003e was published by A.F. Taylor, who is recognized as the originator of Industrial Engineering, and the manufacturing of goods and business operations have become very complex. Now is the time for applying engineering methodology to Enterprise Activities, that is also known as Enterprise Engineering.\u003c/p\u003e\n\u003cp\u003eIn this course, you will be introduced to the representative methodology called DEMO (Design \u0026amp; Engineering Methodology for Organizations) in Enterprise Ontology. You will have a better understanding of the concept and learn how to apply it to the targeted systems with a certain size. In this course, there are two versions of this methodology that are described, DEMO-3 (old) and DEMO-4 (new). DEMO-3 nomenclature is used and applied throughout the course with the introduction of new methodology, DEMO-4. The difference between DEMO-3 and DEMO-4 is indicated and compared. Many examples and case studies are also provided in this course revision compared to the original course with a new set of quizzes.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAcknowledgements\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThe course instructors express their special thanks of gratitude to their Ciao! friends, Prof. Jan Dietz and Prof. Hans Mulder who gave valuable suggestions to revise the course materials related to the new version of DEMO, DEMO-4. Furthermore, Jan and Hans checked the contents of the previous course materials.\u003c/p\u003e\n\u003cp\u003eSecondly, the course instructors would also like to thank their former Ph.D. students, Dr. Natt Leelawat and Dr. Jing Tang who helped modify the course by adding quizzes and answers.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eTextbook Reference\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eJan L. G. Dietz and Hans B. F. Mulder, \u003cem\u003eEnterprise Ontology: A Human-Centric Approach to Understanding the Essence of Organization.\u003c/em\u003e Springer, 2020\u003c/p\u003ef6:T64e,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThis course teaches Japanese law. It covers the legal system and basic concepts. The course starts with the study of concepts that a"])</script><script>self.__next_f.push([1,"re common to many countries, such as sovereignty, constitution, separation of three rights, basic human rights and personal security. Furthermore, it covers current issues in Japan, for example, those faced in daily life from a legal perspective based upon laws and related practices. By studying Japanese law, you learn about the relationship between law and contemporary Japanese culture and society, and then can compare it to the law of other countries.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eTopics covered are sovereignty, separation of powers, basic principles of the constitution, principles of freedom of contract (the socioeconomic activity of the law in promoting functionality), the meaning of property rights (relativization of absolute principles of ownership by an aging society and commons), tort and contract comparison, accident and tort law, the characteristics of Japanese family law (including international marriage, divorce and child protection), learning of labor-related law and reform of Japanese-style employment and way of working, the court as a dispute resolution system, and the Japanese court system.\u003c/p\u003e\n\u003cp\u003eThe course covers major law amendments up to March 2021.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eAcknowledgement\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eSpecial thanks to Stephen Mason, barrister and Associate Research Fellow at the Institute of Advanced Legal Studies, School of Advanced Study, University of London, UK for reviewing parts of this revised course.\u003c/p\u003ef7:Tab2,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLane-keeping is a basic technology for autonomous driving. What engineering techniques are needed to achieve this? Here, you will discover the fun and excitement of \"sensing\" and \"feedback control\" by challenging virtual experiments and simulations of line tracing (controlling a robot to move automatically along a drawn line) of a LEGO robot.\u003c/p\u003e\n\u003cp\u003eParticipants with a MATLAB runtime environment can run the simulator and enjoy line tracing.\u003c/p\u003e\n\u003cp\u003eParticipants who do not have a MATLAB environment will be issued a limited-time (approximately 5-week) license for MATLAB, courtesy of Mathworks, the developer of MATLAB.\u003c/p\u003e\n\u003cp\u003eFor students, faculty, and the Institute of SCIENCE TOKYO staff, please refer to “ \u003ca href=\"https://www.t4.gsic.titech.ac.jp/en/MATLAB\" rel=\"noopener\" target=\"_blank\"\u003eUsing MATLAB's Campus-Wide License\u003c/a\u003e ” for information on installing MATLAB.\u003c/p\u003e\n\u003cp\u003eThis course is produced and delivered by \u003ca href=\"https://online.wise-sss.titech.ac.jp/en/\" rel=\"noopener\" target=\"_blank\"\u003eThe Academy of Super Smart Society Online Education\u003c/a\u003e, \u003ca href=\"https://www.isct.ac.jp/en\" rel=\"noopener\" target=\"_blank\"\u003eThe Institute of Science Tokyo.\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eNote: This course is available only in Japanese.\u003c/p\u003e\n\u003cp\u003e----------\u003c/p\u003e\n\u003cp\u003e車線維持(車線から逸れずに自動車を動かすこと)は自動運転の基本です。 では,車線維持を実現するためにはどのような工学的技術が必要なのでしょうか? ここではレゴロボットを用いたライントレース(与えられた線に沿ってロボットを自動的に動かすこと)を題材とした仮想実験とシミュレーションによって,「センサによる計測」と「フィードバック制御」の楽しさと面白さを体験していただきます。\u003c/p\u003e\n\u003cp\u003eMATLABの実行環境をお持ちの受講者は、実際にシミュレータを実行してライントレースを楽しむことができます。MATLABの実行環境をお持ちでない受講者には、MATLAB開発元のMathworks社の協力により、本コースの受講者限定で、MATLABの期間限定(約5週間)ライセンスが発行されます。\u003c/p\u003e\n\u003cp\u003e東京科学大学の学生・教職員は、MATLABのインストールについては「\u003ca href=\"https://www.t4.gsic.titech.ac.jp/MATLAB\" rel=\"noopener\" target=\"_blank\"\u003eMATLABのCampus-Wideライセンスの利用\u003c/a\u003e」をご覧ください。\u003c/p\u003e\n\u003cp\u003e本コースは\u003ca href=\"https://www.isct.ac.jp/ja\" rel=\"noopener\" target=\"_blank\"\u003e東京科学大学\u003c/a\u003eの\u003ca href=\"https://online.wise-sss.titech.ac.jp/\" rel=\"noopener\" target=\"_blank\"\u003e超スマート社会卓越教育院オンライン教育\u003c/a\u003eが制作・配信しています。\u003c/p\u003e"])</script><script>self.__next_f.push([1,"f8:T63e,\u003cp\u003eビッグデータやAI,いま,そういった言葉が世の中に満ち溢れています。それは,いろいろなことが計算に載るようになって,ビッグデータの利用や,それを使ったAI技術が本格化してきたからです。こうした潮流の中心となる「計算」の活用法を開発してきたのがコンピュータサイエンスという分野です。このコースでは,そのコンピュータサイエンスのエッセンスを学びます。ごく基礎的・入門的なところからはじめ,最先端のコンピュータサイエンスを概観できるまでの素養を身に付けられます。超入門的プログラミングで「計算」の設計法を体験しながら,コンピュータサイエンスの基礎を学びます。\u003c/p\u003e\n\u003cp\u003eBig data, data-mining, machine learning and AI are commonly used terms world-wide these days. We are now able to “compute” various things with computers, and it allows us to use big data and AI technology effectively. Computer Science is a field where the usage of computers and “computations” have continuously evolved.In this course, you will learn the essence of computer science. You will obtain an overview of cutting-edge computer science as well as learn the basics and introductory level knowledge of computer science, while experiencing, designing and writing your own simple programs. The video lectures in this course are delivered in Japanese and accompanied by Japanese transcripts. An English version of this course is also available on edX.\u003c/p\u003ef9:T999,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.\u003c/p\u003e\r\n\u003cp\u003eSystems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.\u003c/p\u003e\r\n\u003cp\u003eThe course covers five main areas:\u003c/p\u003e\r\n\u003col\u003e\r\n\u003cli\u003eIntroduction to key concepts in security economics. Here, we provide an overview of how information security is shaped by economic mechanisms, such as misaligned incentives, information asymmetry, and externalities.\u003c/li\u003e\r\n\u003cli\u003eMeasuring cybersecurity. We introduce state of the art security and IT metrics and conceptualize the characteristics of a security metric, its challenges and advantages.\u003c/li\u003e\r\n\u003cli\u003eEconomics of information security investment. We discuss and apply different economic models that help determine the costs and benefits of security investments in network security.\u003c/li\u003e\r\n\u003cli\u003eSecurity market failures. We discuss market failures that may lead to cybersecurity investment levels that are insufficient from society\u0026rsquo;s perspective and other forms of unsafe behaviour in cyber space.\u003c/li\u003e\r\n\u003cli\u003eBehavioural economics for information security, policy and regulation. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment.\u003c/li\u003e\r\n\u003c/ol\u003e\r\n\u003cp\u003eAfter finishing this course, you will be able to apply economic analysis and data analytics to cybersecurity. You will understand the role played by incentives on the adoption and effectiveness of security mechanisms, and on the design of technical, market-based, and regulatory solutions to different security threats.\u003c/p\u003e\r\n\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"fa:Tb1d,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course is in succession to the TokyoTechX \"Basic Japanese Civil Law\", which covered concepts common to many countries, such as sovereignty, constitution, separation of three powers, basic human rights, and personal safety. The course considers current issues in Japan, such as those faced in daily life from a legal perspective based upon laws and related methods. This course teaches Japanese civil law in more detail related to contemporary problems. The course starts with a review of the civil code and covers cancellation of contracts, intellectual property, internet-related legal issues, cashless transactions, bankruptcy, torts, and protection of the elderly.\u003c/p\u003e\n\u003cp\u003eTopics covered in this course are consumer contract, credit, cooling-off periods, contracts, failure to perform contract obligations, remedies for contract failure, comparative negligence, elements of intellectual property (manageability, controllability, exclusivity, and disposability); strategies for intellectual property, law related to the Internet, defamation on SNS, disclosure of personal information, privacy protection, e-commerce, cashless payments, collateral (mortgages, pledge, rights of retention, statutory liens, ownership transfer, accord, satisfaction reservation, temporary registration guarantee, deposit collateral, proxy receipt, and factoring); guaranty, consumer bankruptcy, tort by company, new problems related to torts like accidents of autonomous driving car, AI and robotics, unscientific judges, the elderly in Japan, adult guardianship, inheritance, and digital transformation.\u003c/p\u003e\n\u003cp\u003eAfter each unit in this course, the participant is requested to answer a quiz questions, ranging from easy to difficult, both ungraded and graded for those that purchase a certificate. The purpose of each quiz is to check learner's understanding with respect to Japanese civil law.\u003c/p\u003e\n\u003cp\u003eThe lecturer of this course, Dr. Hironao Kaneko is an associate professor at the Tokyo Institute of Technology. His research interests are in electronic evidence, bankruptcy law, civil procedure law, and consumer law. He teaches courses such as \"Law (Civil Law)\", and \"Graduate Lecture in Politics, Law and Administration\" among others at Tokyo Tech.\u003c/p\u003e\n\u003cp\u003eLearning Japanese civil law is not only relevant when living in Japan, but also enables learners to study more about contemporary Japanese culture and its relationship with civil law, because law is affected by the culture of a country. By comparing it to the law of various countries, you can understand cultures in the world more deeply.\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eAcknowledgment\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eSpecial thanks to Mr. Stephen Mason, barrister and Associate Research Fellow at the Institute of Advanced Legal Studies, School of Advanced Study, University of London, UK for reviewing parts of this revised course.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"fb:T703,\u003cp\u003eAll engineers will come to face ethical challenges in their professional practice. If these challenges are not dealt with wisely, their careers, their organizations, and most importantly, the wellbeing and safety of people and our environment may be exposed to risk.\u003c/p\u003e\n\u003cp\u003eThis course will provide you with a practical framework for dealing with such situations, an understanding of the professional rules of ethics for engineers and how to apply them.\u003c/p\u003e\n\u003cp\u003eThe course discusses the following topics:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCodes of ethics as an expression of professional rules of conduct\u003c/li\u003e\n\u003cli\u003eDifferent types of codes of conduct\u003c/li\u003e\n\u003cli\u003eChallenges and limitations in codes of ethics\u003c/li\u003e\n\u003cli\u003eWhistleblowing and the circumstances in which it is morally warranted\u003c/li\u003e\n\u003cli\u003eConflicts of interest and ways of handling them\u003c/li\u003e\n\u003cli\u003eThe importance of communication with societal stakeholders and best ways of achieving it\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThrough informative videos, readings, case studies, assignments and interviews with CEOs we will familiarize you with these topics.\u003c/p\u003e\n\u003cp\u003eThe assignments are application-oriented: in addition to deepening your understanding of the professional responsibilities themselves, we invite you to reflect on how these issues are dealt with within your own work practice and organization. The course will benefit engineers who:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ewant to learn professional rules of ethics and how to act in conflicting situations\u003c/li\u003e\n\u003cli\u003eaim to become a Chartered Engineer or maintain this qualification as part of their continuing professional development\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eIndividualized Feedback\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eIf you upgrade to the verified track of this course, you will receive personalized feedback and formal grading of your assignments by the instructor.\u003c/p\u003efc:T89a,"])</script><script>self.__next_f.push([1,"\u003cstrong\u003eInterested in earning a certificate at no cost? Enroll to audit this course, and we\u0026rsquo;ll send more information about this opportunity shortly before the course begins.\u0026nbsp;\u003cbr /\u003e\u003cbr /\u003e\u003c/strong\u003eCommunities have always wrestled with the multiple purposes of education: to train young people for careers, vocations, and college; to prepare them for their roles as citizens; to develop habits of reflective, ethical adults; and to create a common experience in a pluralistic society while meeting the needs of individual learners. As the world changes and grows more complex, returning to these important questions of purpose can help guide schools in their growth and strategic change. To ensure our schools are effective, we need to routinely reimagine what the high school graduate of the future will need to know and be able to do. The artifact that communicates these ideas is called a graduate profile. Making explicit the capabilities, competencies, knowledge, and attitudes for secondary school graduates, and inviting key stakeholders like students and community members to be engaged in the process, can help you and your school to focus your vision of success and drive school innovation efforts.\u003cbr /\u003e\u003cbr /\u003eInstructor Justin Reich and the course team from the MIT Teaching Systems Lab look forward to guiding teachers, administrators, community members, and others passionate about improving secondary school in the process of designing a graduate profile. Over four weeks, you will reflect on the purpose and goals of secondary school, as well as desirable characteristics for graduates. You\u0026rsquo;ll learn how schools have benefited from a graduate profile development process and begin the process yourself.\u0026nbsp; You\u0026rsquo;ll learn more about your own context, its values and beliefs. You\u0026rsquo;ll leave the course with a shareable artifact that communicates a vision of a multi-faceted secondary school graduate.\u003cbr /\u003e\u003cbr /\u003e This course has been authored by one or more members of the Faculty of the Massachusetts Institute of Technology. Its educational objectives, methods, assessments, and the selection and presentation of its content are solely the responsibility of MIT."])</script><script>self.__next_f.push([1,"fd:T829,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHave you been learning MIT App Inventor at school and want to prove your new skills? Are you a new coder starting out with MIT App Inventor and want to get a certificate from MITx that demonstrates you’ve got what it takes? Then you want to sign up for this fully online exam!\u003c/p\u003e\n\u003cp\u003eThis timed 90-minute Level 1 exam is designed mostly for middle-school students who have had at least one or more terms of experience with MIT App Inventor and are able to create their own simple mobile app without assistance from a teacher or others. You should already know both the Designer and Block screen well and know how to transfer your app to the AI Companion app on an Android compatible device or Android emulator\u003c/p\u003e\n\u003cp\u003eThis is the Level 1 exam covering only the most basic design components and blocks of the platform. Exams covering more advanced topics will be released in the future. There are 25 multiple choice questions most with graphics and about 5 (or fewer) exercises and you only need to obtain 50% to earn a Level 1 certificate from MITx.\u003c/p\u003e\n\u003cp\u003eNOTE: To earn a certificate, you MUST present a government-issued identification with your photograph. There are no exceptions to this policy, unfortunately, and there are no refunds if you cannot comply with this requirement.\u003c/p\u003e\n\u003cp\u003e--\u003c/p\u003e\n\u003cp\u003eThe edX website (“Website”) and this course are not intended for children under 13 years of age, and no one under age 13 may provide any personal information to us or through the Website. We do not knowingly collect personal information from children under age 13. If you are under 13, do not use or provide any information on our Website or on or through our services. If we learn that we have collected personal information from a child under age 13, we will delete it. MIT AppInventor has developed a different version of its platform which does not collect or maintain any personally identifiable information (“PII”). This platform is available at \u003ca href=\"http://code.appinventor.mit.edu/\"\u003ehttp://code.appinventor.mit.edu\u003c/a\u003e and may be more appropriate for your use.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"fe:Tb53,"])</script><script>self.__next_f.push([1,"\u003cul\u003e\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,12801,[null,0],null,null,null,null,null,null,null,null,0,null,null,\u0026quot;arial,sans,sans-serif\u0026quot;,10]\" data-sheets-value=\"[null,2,\u0026quot;- Appreciate the complexity of sustainable development and understand how it relates to everyday life.\\n- Critically evaluate and reflect on the information flow from the public media\\n- Develop cognitive and decision-making skills that can be applied to issues and problems in everyday life.\\n- How to discuss these topics appropriately, and encourage others to make informed decisions regarding sustainable living.\u0026quot;]\"\u003eAppreciate the complexity of sustainable development and understand how it relates to everyday life\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,12801,[null,0],null,null,null,null,null,null,null,null,0,null,null,\u0026quot;arial,sans,sans-serif\u0026quot;,10]\" data-sheets-value=\"[null,2,\u0026quot;- Appreciate the complexity of sustainable development and understand how it relates to everyday life.\\n- Critically evaluate and reflect on the information flow from the public media\\n- Develop cognitive and decision-making skills that can be applied to issues and problems in everyday life.\\n- How to discuss these topics appropriately, and encourage others to make informed decisions regarding sustainable living.\u0026quot;]\"\u003eCritically evaluate and reflect on the information flow from the public media\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,12801,[null,0],null,null,null,null,null,null,null,null,0,null,null,\u0026quot;arial,sans,sans-serif\u0026quot;,10]\" data-sheets-value=\"[null,2,\u0026quot;- Appreciate the complexity of sustainable development and understand how it relates to everyday life.\\n- Critically evaluate and reflect on the information flow from the public media\\n- Develop cognitive and decision-making skills that can be applied to issues and problems in everyday life.\\n- How to discuss these topics appropriately, and encourage others to make informed decisions regarding sustainable living.\u0026quot;]\"\u003eDevelop cognitive and decision-making skills that can be applied to issues and problems in everyday life\u003c/span\u003e\u003c/li\u003e\n\t\u003cli\u003e\u003cspan data-sheets-userformat=\"[null,null,12801,[null,0],null,null,null,null,null,null,null,null,0,null,null,\u0026quot;arial,sans,sans-serif\u0026quot;,10]\" data-sheets-value=\"[null,2,\u0026quot;- Appreciate the complexity of sustainable development and understand how it relates to everyday life.\\n- Critically evaluate and reflect on the information flow from the public media\\n- Develop cognitive and decision-making skills that can be applied to issues and problems in everyday life.\\n- How to discuss these topics appropriately, and encourage others to make informed decisions regarding sustainable living.\u0026quot;]\"\u003eHow to discuss these topics appropriately, and encourage others to make informed decisions regarding sustainable living\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"ff:T73b,\u003cp\u003eThis course integrates the power of systems thinking with computer models designed to ‘bring to life’ biology topics including evolution, ecology and the chemistry of life. Developed in collaboration with the University of Pennsylvania Graduate School of Education and the Massachusetts Institute of Technology Scheller Teacher Education Program, this six-week interactive and collaborative professional development course draws on research in teaching and learning to develop the best experience for teachers.\u003c/p\u003e\n\u003cp\u003eIn this discussion-based course, you will learn how to use online simulations which are aligned with the Next Generation Science Standards in order to develop core biology content and practices. The student facing materials consist of five modules designed for implementation over several class periods, serving as a replacement for an existing lab or activity. The online simulations include optional entry-level coding and the course provides support for learning to teach this with students. The materials include student and teacher guides with built in informal assessments. You will get a chance to work through these materials, watch teachers experienced with the materials teach the lessons, and then interact with experienced BioGraph teachers through online forums, webinars, and expert facilitation.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eImportant Information Regarding Verified Certificates:\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThe BioGraph Team will cover the cost of the Verified Certificate for participants who complete the course, including all surveys. In order to be eligible for this benefit please DO NOT register for the Verified Certificate. Upon completing the course, you will be issued a coupon which will allow you to receive the certificate free of charge. We cannot issue refunds or reimbursements for personally purchased certificates.\u003c/p\u003e100:T786,\u003cp\u003eThe Data Structures \u0026amp; Algorithms course begins with a review of some important Java techniques and nuances in programming. The course requires some prior knowledge of Java a"])</script><script>self.__next_f.push([1,"nd object-oriented programming, but not in data structures or algorithms. This course introduces you to time complexity, and threads this concept throughout all data structures and algorithms presented in the course. You will work with the principles of data storage in Arrays and LinkedList nodes. You will program the low-level data structures: Singly, Circular and Doubly LinkedLists; and explore edge cases and efficiencies. LinkedLists and Arrays are used to implement Abstract Data Types, ADTs: Stacks, Queues and Deques. Harnessing the power of recursion to move through these data structures is necessary. As the size changes in your data structures, it becomes important to examine amortized analysis of the operations.\u003c/p\u003e\n\u003cp\u003eThe course design has several components and is built around modules. A module consists of a series of short (3-5 minute) instructional videos. In between the videos, there are textual frames with additional content information for clarification, as well as video errata dropdown boxes. All modules include an Exploratory Lab that incorporates a Visualization Tool specifically designed for this course. The lab includes discovery questions that lead you towards delving deeper into the efficiency of the data structures and examining the edge cases. This is followed by a set of comprehension questions on topics covered in the module that count for 10% of your grade. The modules end with Java coding assignments which are 60% of your grade. Lastly, you'll complete a course exam, which counts for the remaining 30% of your grade.\u003c/p\u003e\n\u003cp\u003eThis is a great course that has been derived from the on-campus version of CS1332 at the Georgia Institute of Technology, and is backed with an impressive reputation.\u003c/p\u003e101:T49b,\u003cp\u003eThis course provides an introduction to basic probability concepts. Our emphasis is on applications in science and engineering, with the goal of enhancing modeling and analysis skills for a variety of real-world problems. \u003c/p\u003e\n\u003cp\u003eIn order to make the course completely self-contained (and t"])</script><script>self.__next_f.push([1,"o bring back long-lost memories), we’ll start off with Bootcamp lessons to review concepts from set theory and calculus. We’ll then discuss the probability axioms that serve as the basis for all of our subsequent work – what makes probability tick? That discussion will give us the tools to study elementary probability counting rules, including permutations and combinations. We’ll use these rules to work on various cool applications, including poker probability calculations and baseball line-ups!\u003c/p\u003e\n\u003cp\u003eThe next venues on our tour are the concepts of independence and conditional probability, which allow us to see how the probabilities of different events are related to each other, and how new information can be used to update probabilities. The course culminates in a discussion of Bayes Rule and its various interesting consequences related to probability updates.\u003c/p\u003e102:T96e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis Data Structures \u0026amp; Algorithms course extends beyond linear data structures in CS1332xI to the nonlinear and hierarchical data structures here in CS1332xII. A short Java review is presented on topics relevant to new data structures covered in this course. The course does require prior knowledge of Java, object-oriented programming and linear data structures. Time complexity is threaded throughout the course within all the nonlinear data structures and algorithms.\u003c/p\u003e\n\u003cp\u003eYou will explore the hierarchical data structure of trees. Trees have important properties such as shape and order which are used to categorize trees into different groups and define their functionality. The course begins by explaining Binary Trees and two subgroups: Binary Search Trees (BSTs) and Binary Heaps. You will program BSTs, their operations and traversal algorithms. BSTs are an important structure when wanting to access information quickly. Heaps approach access differently and prioritize what data is accessed. Heaps also employ the concept of up-heap and down-heap operations not found in other structures.\u003c/p\u003e\n\u003cp\u003eHashMaps and SkipLists are the last data structures discussed in the course. The HashMap ADT is a collection of key-value pairs. The key-value pairs are stored in an unordered manner based on hash codes and compression functions that translate keys into integers. You will investigate different collision strategies and implement one. SkipLists are a probabilistic data structures where data is placed in the structure based on a randomization procedure.\u003c/p\u003e\n\u003cp\u003eThe course design has several components and is built around modules. A module consists of a series of short (3-5 minute) instructional videos. In between the videos, there are textual frames with additional content information for clarification, as well as video errata dropdown boxes. All modules include an Exploratory Lab that incorporates a Visualization Tool specifically designed for this course. The lab includes discovery questions that lead you towards delving deeper into the efficiency of the data structures and examining the edge cases. This is followed by a set of comprehension questions on topics covered in the module that count for 10% of your grade. The modules end with Java coding assignments which are 60% of your grade. Lastly, you'll complete a course exam, which counts for the remaining 30% of your grade.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"103:Tb86,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course takes you through the first eight lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. \u003c/p\u003e\n\u003cp\u003eIn this course, you’ll take the first steps toward being a solid HCI practitioner and researcher. You’ll learn the fundamentals of how HCI relates to fields like user experience design, user interface design, human factors engineering, and psychology. You’ll also learn how human-computer interaction has influence across application domains like healthcare and education; technology development like virtual and augmented reality; and broader ideas like context-sensitive computing and information visualization. \u003c/p\u003e\n\u003cp\u003eYou’ll then dive into the fundamentals of human-computer interaction. You’ll learn three views of the user’s role in interface design: the behaviorist ‘processor’ view, the cognitivist ‘predictor’ view, and the situationist ‘participant’ view. You’ll discover how these different views of the user’s role affect the scope we use to evaluate interaction. These perspectives will be crucial as you move forward in designing interfaces to ensure you’re considering what goes on inside the user’s head, as well as in the environment around them. \u003c/p\u003e\n\u003cp\u003eYou’ll then learn the gulfs of execution and evaluation, which determine how easily the user can accomplish their goals in a system and how well they can understand the results of their actions. All of user interface design can be seen as taking steps to bridge these gulfs. You’ll also investigate the notion of direct manipulation, which shortens the distance between the user and the objects they are manipulating in the interface. With these tools, you’ll be well-equipped to start designing effective interfaces. \u003c/p\u003e\n\u003cp\u003eYou’ll then take a deeper dive into what humans are even capable of accomplishing. You’ll learn the limitations of human sensing and memory and how we must be aware of the cognitive load we introduce on the user while using our interfaces. Cognitive load can have an enormous impact on a user’s satisfaction with an interface, and must be kept in mind as you begin your career as a designer. \u003c/p\u003e\n\u003cp\u003eYou’ll finally conclude with an overview of the major design principles in human-computer interaction. Curated from the work of Don Norman, Jakob Nielsen, Ronald Mace, Larry Constantine, and Lucy Lockwood, these design principles cover revolutionary ideas in the design of interfaces: discoverability, affordances, perceptibility, constraints, error tolerance, and more. These principles are crucial whether you move forward as a designer, an evaluator, a front-end engineer, or any other role in technology design. \u003c/p\u003e\n\u003cp\u003eBy the end of the course, you’ll have an understanding of where HCI sits in the broader field, a grasp of the goals of HCI, and a foundation in core principles that inform interface design.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"104:T42e,\u003cul\u003e\n\u003cli\u003eThe overall goals of human-computer interaction.\u003c/li\u003e\n\u003cli\u003eThe relationship between HCI, user experience design, human factors engineering, and psychology.\u003c/li\u003e\n\u003cli\u003eThe relevance of HCI to domains like healthcare, education, and cybersecurity.\u003c/li\u003e\n\u003cli\u003eThe trends in HCI technology including virtual reality, augmented reality, and robotics.\u003c/li\u003e\n\u003cli\u003eThe emerging ideas in HCI research, such as context-sensitive computing, gesture-based interaction, and social computing.\u003c/li\u003e\n\u003cli\u003eThe three main schools of thought in HCI: the processor, predictor, and participant views.\u003c/li\u003e\n\u003cli\u003eThe feedback cycle in user interaction, including gulfs of execution and evaluation.\u003c/li\u003e\n\u003cli\u003eThe notion of directness in interaction, and the role of direct manipulation.\u003c/li\u003e\n\u003cli\u003eThe strengths and limitations of the human user, including sensation and memory.\u003c/li\u003e\n\u003cli\u003eThe role of design principles and heuristics in user interface design.\u003c/li\u003e\n\u003cli\u003eThe most important principles for design, including discoverability, affordances, perceptibility, and error tolerance.\u003c/li\u003e\n\u003c/ul\u003e105:Tc45,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis Data Structures \u0026amp; Algorithms course completes the data structures portion presented in the sequence of courses with self-balancing AVL and (2-4) trees. It also begins the algorithm portion in the sequence of courses. A short Java review is presented on topics relevant to new data structures covered in this course. The course does require prior knowledge of Java, object-oriented programming, and linear and nonlinear data structures. Time complexity is threaded throughout the course within all the data structures and algorithms.\u003c/p\u003e\n\u003cp\u003eYou will investigate and explore the two more complex data structures: AVL and (2-4) trees. Both of these data structures focus on self-balancing techniques that will ensure all operations are O(log n). AVL trees are a subgroup of BSTs and thus inherit all the properties and constraints from BSTs. Additionally, AVLs incorporate rotations that are triggered when the tree is mutated and becomes out of balance. (2-4) trees are a subgroup of B-Trees and are non-binary trees with more than 2 children. 2-4 defines the range of children that exists in the trees. However, these trees are extremely flexible and allow the nodes to shrink and grow as needed to store more data. With this flexibility comes more issues to handle, like overflow and underflow which require more intense techniques to resolve the issues.\u003c/p\u003e\n\u003cp\u003eAs you enter the algorithm portion of the course, you begin with a couple of familiar iterative sorting algorithms: Bubble and Selection. There are optimizations that can be included in the standard Bubble sort to make it more adaptive in sorting. There is also a derivation of bubble sort, called Cocktail Shaker sort, that puts new a spin on the basic algorithm. Insertion sort is the last iterative sort that is investigated in this group of sort algorithms. Divide \u0026amp; Conquer sorting algorithms are examined and are broken into two groups: comparison sorts and non-comparison sorts. The two comparison sorts are Merge and In-place Quick sort. Both are recursive and focus on subdividing the array into smaller portions. LSD Radix sort is the non-comparison sort that deconstructs an integer number and examines the digits. All algorithms are analyzed for stability, memory storage, adaptiveness, and time complexity.\u003c/p\u003e\n\u003cp\u003eThe course design has several components and is built around modules. A module consists of a series of short (3-5 minute) instructional videos. In between the videos, there are textual frames with additional content information for clarification, as well as video errata dropdown boxes. All modules include an Exploratory Lab that incorporates a Visualization Tool specifically designed for this course. The lab includes discovery questions that lead you towards delving deeper into the efficiency of the data structures and examining the edge cases. This is followed by a set of comprehension questions on topics covered in the module that count for 10% of your grade. The modules end with Java coding assignments which are 60% of your grade. Lastly, you'll complete a course exam, which counts for the remaining 30% of your grade.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"106:T4ea,\u003cp\u003eThis course discusses properties and applications of random variables. When you’re done, you’ll have enough firepower to undertake a wide variety of modeling and analysis problems; and you’ll be well-prepared for the upcoming Statistics courses. \u003c/p\u003e\n\u003cp\u003eWe’ll begin by introducing the concepts of discrete and continuous random variables. For instance, how many customers are likely to arrive in the next hour (discrete)? What’s the probability that a lightbulb will last more than a year (continuous)? \u003c/p\u003e\n\u003cp\u003eWe’ll learn about various properties of random variables such as the expected value, variance, and moment generating function. This will lead us to a discussion of functions of random variables. Such functions have many uses, including some wonderful applications in computer simulations. \u003c/p\u003e\n\u003cp\u003eIf you enjoy random variables, then you’ll really love joint (two-dimensional) random variables. We’ll provide methodology to extract marginal (one-dimensional) and conditional information from these big boys. This work will enable us to \u003cbr /\u003e\nstudy the important concepts of independence and correlation. \u003c/p\u003e\n\u003cp\u003eAlong the way, we’ll start working with the R statistical package to do some of our calculations and analysis.\u003c/p\u003e107:Tba7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course takes you through lessons 14 through 18 of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. \u003c/p\u003e\n\u003cp\u003eIn this course, you’ll begin by learning the design life cycle. This is the process by which we investigate user needs, brainstorm potential designs, create prototypes, and evaluate those prototypes. This life cycle provides the structure for the third and fourth courses in this professional certificate. \u003c/p\u003e\n\u003cp\u003eA key part of the design life cycle, however, is human subjects research. In interface design, this involves asking users for information about what they do and what they need, and then asking them for feedback on the prototypes that you develop. In HCI more broadly, this may involve testing different ideas with users to see what facilitates the best user experience. Whenever we interact with users, though, we need to keep in mind users’ rights to privacy and transparency, and so we begin this course with a discussion of ethics in HCI. This is grounded in the university Institutional Review Board process, but also investigates the role of ethics in HCI in industry as well. \u003c/p\u003e\n\u003cp\u003eFrom there, you’ll move on to needfinding and requirements gathering. It is always tempting to jump straight into designing an interface based on our intuitive understanding of a task or need, but successful interface design always starts with an understanding of the users: who are they, what they do, and what they need. This involves both interacting directly with them via surveys and interviews, as well as observing them at a distance or even attempting the tasks ourselves. This concludes with an understanding of the requirements of any interface we create. \u003c/p\u003e\n\u003cp\u003eFrom there, you’ll move on to brainstorming design alternatives. Again, it is often tempting to jump straight to the design we have in mind, but successful interface design starts with the results of needfinding and attempts a more grounded investigation of possible solutions. Through this lesson, you’ll learn techniques for managing effective brainstorming sessions and approaches to exploring the ideas that are created including artifacts like user personas, interaction timelines, and storyboards. \u003c/p\u003e\n\u003cp\u003eFinally, you’ll conclude by learning about prototyping. Implementing an interface is a complicated process, and there is a risk that we may invest lots of time into an interface that is doomed to fail because we do not get user feedback on the idea. The goal of prototyping is to get an idea in front of users as quickly as possible to validate and improve it before we move on to the high pressures of implementation. \u003c/p\u003e\n\u003cp\u003eBy the end of this course, you’ll have an understanding of the design life cycle and its first three major stages: needfinding, brainstorming, and prototyping. You’ll also understand the ethical implications of HCI research and how to safeguard users’ rights.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"108:T55b,\u003cul\u003e\n\u003cli\u003eThe structure of the design life cycle: needfinding, brainstorming, prototyping, and evaluation.\u003c/li\u003e\n\u003cli\u003eThe value of research ethics and the importance of emphasizing the user’s rights.\u003c/li\u003e\n\u003cli\u003eThe role of Institutional Review Boards in governing university research.\u003c/li\u003e\n\u003cli\u003eThe importance of ethics in industry and the mechanisms for ensuring they are maintained.\u003c/li\u003e\n\u003cli\u003eThe importance of needfinding in the design life cycle.\u003c/li\u003e\n\u003cli\u003eMechanisms for active needfinding, including surveys, interviews, and focus groups.\u003c/li\u003e\n\u003cli\u003eApproaches to personal needfinding, including participant observation and apprenticeship.\u003c/li\u003e\n\u003cli\u003eWays to observe organic interaction, such as naturalistic observation or investigation of hacks and workarounds.\u003c/li\u003e\n\u003cli\u003eThe data inventory, a structure for ensuring you understand your user and their problems.\u003c/li\u003e\n\u003cli\u003eApproaches to brainstorming design ideas, both individually and in groups.\u003c/li\u003e\n\u003cli\u003eMethods for further exploring design ideas, such as user personas and storyboards.\u003c/li\u003e\n\u003cli\u003eThe spectrum of prototyping, from low-fidelity to high-fidelity.\u003c/li\u003e\n\u003cli\u003eThe importance of low-fidelity prototypes in getting early feedback.\u003c/li\u003e\n\u003cli\u003eApproaches to low-fidelity prototyping, such as paper prototypes and Wizard of Oz.\u003c/li\u003e\n\u003cli\u003eMulti-level prototyping, or prototyping at variouslevels of abstraction.\u003c/li\u003e\n\u003c/ul\u003e109:T9bc,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis course takes you through the last nine lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. \u003c/p\u003e\n\u003cp\u003eIn this final course in the professional certificate, you’ll complete your understanding of the design life cycle, and learn about the modern relevance of human-computer interaction. \u003c/p\u003e\n\u003cp\u003eYou’ll begin by learning about evaluation. This is the critical final step of the design life cycle, where we put our prototypes in front of real users (or strong approximations thereof) to get feedback on their quality. You’ll learn about three methods for evaluation: first, qualitative evaluation lets you get direct feedback on the strengths and weaknesses of your interface from real users. Second, quantitative evaluation lets you make strong claims about the effectiveness of your interface or the validity of your theories of interaction. Third, heuristic evaluation lets you inject evaluation much more completely into the design process, persistently putting yourself into the mindset of a user to investigate an interface. \u003c/p\u003e\n\u003cp\u003eThen, you’ll learn how human-computer interaction relates to a modern trend in software development, Agile design. HCI and Agile development have a deep symbiosis in the way they each value rapid feedback. Moreover, modern technologies have allowed high-fidelity prototypes to be developed with the relative ease of low-fidelity prototypes in the past, allowing even better feedback and evaluation to come in throughout the design process. \u003c/p\u003e\n\u003cp\u003eAfter wrapping up your understanding of the design life cycle and its iterative nature, you’ll turn your attention to a deeper dive into the modern state of human-computer interaction. You’ll have the chance to explore cutting-edge research in HCI, from technologies like extended reality to domains like cybersecurity to ideas like gesture-based interaction. HCI is a dynamic and evolving field, and any education it would not be complete without a chance to look at what’s happening today. \u003c/p\u003e\n\u003cp\u003eFinally, you’ll conclude by looking at how far you’ve come and what you could do next. From other MOOCs to graduate degrees in the field, there are enormous possibilities for further studies in HCI. \u003c/p\u003e\n\u003cp\u003eBy the end of this course, you’ll have an understanding of the importance of evaluation in the design life cycle, as well as an understanding of where HCI sits in modern development and research.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"10a:T4d8,\u003cp\u003eThe use of English for doing business in multinational settings is a fact of life for many business people. As Asian economies expand and become more involved in the global economy, a lingua franca – a language used to communicate among groups of people who do not share a mother tongue – is needed to exchange information. This course has two goals. The first is to introduce non-native speakers of English to methods for developing spoken English language and communication skills for doing business in Asia. The second is to examine the impact of interculturality and globalization on English communications. By exploring and participating in a business simulation set in Asia, you will develop the principal skills for effective communication in English when conducting business in China and other Asian countries.\u003c/p\u003e\n\u003cp\u003eThis course is part of a series developed by the same instructors. Enroll in \u003ca href=\"https://www.edx.org/course/english-doing-business-asia-writing-hkustx-eba102x-2\"\u003e\u003cem\u003eEBA102x English for Doing Business in Asia – Writing\u003c/em\u003e\u003c/a\u003e to continue developing your English language and written communication skills. Learn about business writing format, audience, culture, purpose, grammar, style and more.\u003c/p\u003e10b:T564,\u003cp\u003eErgonomics is the application of scientific information about people in order to design products and systems so that they are safe, productive, comfortable and healthy for people to use. \u003c/p\u003e\n\u003cp\u003ePeople are of different shapes, sizes, strength, speed, judgment, skills, and capabilities. Hence when designing products the necessary aspects for task performance have to be considered. What is important is to fit the task to the person rather than fitting a person to a task so that a majority of the people are able to and like to do what needs to be done.\u003c/p\u003e\n\u003cp\u003eIn this course, regardless of your background, you will learn the core concepts of ergonomics so that you can evaluate and redesign products to fit people. The course will focus on recognizing the workings of the human body "])</script><script>self.__next_f.push([1,"so that products and systems are compatible with the structure of people and will allow you to be creative and to identify engineering solutions thereby improving human performance, reducing the risk of discomfort and injury when interacting with products \u003c/p\u003e\n\u003cp\u003eThis course will allow you to get hands-on experience through a wide variety of demonstrations and case studies for you to grasp the concepts easily. With the knowledge gained, you can experience the excitement of creating your own products that will wow users whether it be for continuing education or just for knowledge.\u003c/p\u003e10c:T4ba,\u003cp\u003eThe use of English for doing business in multinational settings is a fact of life for many business people. And, as Asian economies expand and become more involved in the global economy, having the ability to write clear and concise English is important when exchanging information. This course has two goals. The first is to introduce non-native speakers of English to methods for developing \u003cstrong\u003ewritten\u003c/strong\u003e English language and communication skills for doing business in Asia. The second is to examine the impact of cross-cultural interactions and globalization on English communications. By exploring and participating in a business simulation set in Asia, you will develop the principal skills for effective communication in English when conducting business in China and other Asian countries.\u003c/p\u003e\n\u003cp\u003eThis course is part of a series developed by the same instructors. Enroll in \u003ca href=\"https://www.edx.org/course/english-doing-business-asia-speaking-hkustx-eba101x-3\"\u003e\u003cem\u003eEBA101x English for Doing Business in Asia – Speaking\u003c/em\u003e\u003c/a\u003e to continue developing your English language communication skills. Learn about business presentations, audience, format, pronunciation, rhythm and more.\u003c/p\u003e10d:T439,\u003cp\u003eErgonomics is the application of scientific information about people in order to design products and systems so that they are safe, productive, comfortable and healthy for people to use. \u003c/p\u003e\n\u003cp\u003ePeople are of different shapes, "])</script><script>self.__next_f.push([1,"sizes, strength, speed, judgment, skills, and capabilities. Hence, there is a need to evaluate and quantify differing metrics to evaluate the differences. What is important is to fit the task and equipment used to the person rather than fitting a person to a task or equipment so that a majority of the people are able to and like to do what needs to be done.\u003c/p\u003e\n\u003cp\u003eThe course will focus on recognizing the basic needs of people in terms of biomechanics and present the various design strategies so that products and systems are compatible with people who use them thereby improving human performance, reducing the risk of discomfort and injury. \u003c/p\u003e\n\u003cp\u003eWith the knowledge gained, you can experience the excitement of redesigning or retrofitting workplaces and other types of products whether it be for continuing education or just for knowledge.\u003c/p\u003e10e:T6e5,\u003cp\u003eGenerative AI modeling is an in-demand skill for AI model development. Employers now expect generative AI skills to be on an AI engineer’s resume. This hands-on course, which is also part of the IBM AI Applied Professional Certificate, will help you build the generative AI skills you need to stand out as an AI developer.\u003c/p\u003e\n\u003cp\u003eThroughout the course, you’ll get valuable practical experience working on guided projects that provide step-by-step instructions for building generative AI-powered applications. As part of this, you’ll work with Python and related libraries like Flask and Gradio, plus you’ll use frameworks such as Langchain. The course includes learning elements such as videos and readings to help you understand the models, frameworks, and technologies used in the projects.\u003c/p\u003e\n\u003cp\u003eYou’ll also dive into building intelligent chatbots and apps using popular large language models (LLMs) such as GPT3 and Llama 2 hosted on platforms like IBM watsonx and Hugging Face. You'll explore retrieval-augmented generation (RAG) technology to enhance LLMs by incorporating external information beyond their training data. You’ll be able to build voice-enabled chatbo"])</script><script>self.__next_f.push([1,"ts and apps using IBM Watson ® Speech Libraries for Embed. \u003c/p\u003e\n\u003cp\u003eTo get the most out of this course, it is essential that you have a basic understanding of the Python programming language. It is also of benefit if you are familiar with HTML, CSS, and JavaScript, though this is not a requirement. This course is ideal for tech professionals who have some experience with Python and are ready to build the highly sought-after generative AI skills required to be an AI engineer or AI developer. If that’s you… enroll today and build job-ready gen AI skills in 6 weeks.\u003c/p\u003e10f:T916,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eTransforming\u003c/span\u003e drone data into crop management decisions\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eWould you like to have the power to gather precise, timely information about crops? Curious about how that is possible? Then join this online course to unlock the potential of drone technology!\u003c/p\u003e\n\u003cp\u003eUncrewed Aerial Vehicles (UAVs) or drones have become useful tools for optimizing crop management. They collect valuable spatial information that can help optimize\u003cspan lang=\"EN-US\"\u003e yields while conserving precious resources\u003c/span\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eSensing beyond true colour imagery unlocks new possibilities for precision agriculture\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eModern UAV platforms can host a range of sensors that collect different types of information. Each of these offers unique insights on crop health.\u003c/p\u003e\n\u003cp\u003eIn this course you will learn about available advanced sensing approaches. You will discover what multispectral, hyperspectral, thermal and LiDAR sensing brings to precision agriculture.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eBy the end of this course, you will:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eU\u003c/span\u003enderstand how different sensors operate;\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eBe able\u003c/span\u003e to choose the most suitable solutions for your needs;\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eHave\u003c/span\u003e the skills to interpret data from various sensors; and\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eL\u003c/span\u003eearn how to design data processing workflows.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eAs you progress through the course, you will transition from theory to hands-on exercises. This practical experience will equip you with the skills to adapt analysis to your unique datasets and specific farming applications.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eUpgrade to the verified track\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eLooking to further develop your practical skills and get feedback on your data processing choices? Then upgrading to the Verified Track may be just the right choice for you! You will gain access to materials on future sensing approaches and graded assignments evaluating your data processing choices.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFor whom?\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAre you an avid agricultural enthusiast or a professional looking to enhance your expertise? Then this course provides you a gateway to tap into the opportunities of UAV-based sensing. Enroll today and position yourself at the forefront of the future of farming!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"110:T412,\u003cp\u003eThis course covers key topics in the use of quantum mechanics in many modern applications in science and technology, introduces core advanced concepts such as spin, identical particles, the quantum mechanics of light, the basics of quantum information, and the interpretation of quantum mechanics, and covers the major ways in which quantum mechanics is written and used in modern practice. It follows on directly from the \"\u003ca href=\"https://www.edx.org/course/quantum-mechanics-for-scientists-and-engineers-1\"\u003eQuantum Mechanics for Scientists and Engineers 1\u003c/a\u003e\" course, and is also accessible to others who have studied some quantum mechanics at the equivalent of a first junior or senior college-level physics quantum mechanics course. All of the material for the earlier course is also provided as a resource. The course should prepare the student well to understand quantum mechanics as it is used in a wide range of current applications and areas and provide a solid grounding for deeper studies of specific more advanced topics.\u003c/p\u003e111:T46c,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003ePlease stay on the AUDIT path for free access. \u003c/span\u003eGrupo-AE and HP will provide a letter of completion with course hours upon completing all modules for this course when using the free audit path. Additionally, you will not have a time limit to complete this course. There is no difference in content between the audit (free) and verified (certification) learning paths. For best viewing experience, view course on full screen.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis course aims to provide educators with essential knowledge and skills to understand and effectively use computers and Microsoft tools in their teaching processes. Through seven interactive, self-guided modules, participants will learn about digital literacy, basic computer skills and to integrate Microsoft tools in their workflows to communicate, collaborate, create engaging lessons as well as enhance their productivity. \u003cspan lang=\"ES-US\"\u003eThe\u003c/span\u003e course also delves into the fundamentals of"])</script><script>self.__next_f.push([1," privacy and security in a digital world, ensuring that educators are well-equipped to protect their information and that of their students.\u003c/p\u003e112:T6f5,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough the HP \u003c/span\u003eDigital Skills for Educators course, learners will be able to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eDevelop foundational knowledge of using Technology and Computers in Teaching\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eUnderstand what is Digital literacy and\u003c/span\u003e key Digital skills that can make teaching more engaging \u0026amp; productive\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLearn \u003c/span\u003efundamental aspects / concepts like Hardware, Software, Applications, Internet, Email etc.\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eExplore basics of Privacy and Security\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLearn\u003c/span\u003e about Microsoft 365 Tools and discover ways to integrate them into Teaching processes \u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eExplore Microsoft tools and get an understanding of \u003c/span\u003etheir diverse applications in Education\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eEngage with \u003c/span\u003ethe internet, learn to communicate via email or collaborate with students, parents or other colleagues\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eExplore \u003c/span\u003edocument creation and editing tools to create lesson plans, teaching material or assessments\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLearn to design engaging \u003c/span\u003eand interactive lessons for your students with presentation tools\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eEfficiently e\u003c/span\u003evaluate and manage essential student data such as grades, attendance, progress etc. with spreadsheet tools\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLearn to manage and organize digital educational resources\u003c/span\u003e to streamline your workflows and enhance productivity\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eEnroll in this introductory course to acquire digital skills to create a more engaging and productive learning environment for your students. Utilize technology to enhance your teaching methods.\u003c/p\u003e113:T701,\u003cp\u003eRemote sensing observations from airborne and spaceborne platforms have become an essential tool in di"])</script><script>self.__next_f.push([1,"saster management. They provide an immediate and large-area overview of evolving disaster situations, revealing important hazard information to disaster response personnel.\u003c/p\u003e\n\u003cp\u003eThis course will introduce you to Synthetic Aperture Radar (SAR), a remote sensing technology that can see the earth surface even during darkness and through rain, clouds, or smoke. As a participant in this course, you will gain an intuitive understanding of the information contained in SAR earth observations and learn to use a range of analysis techniques and algorithms to apply SAR data to disaster mapping and management. Specific topics will include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe mathematical and physical principles of SAR remote sensing\u003c/li\u003e\n\u003cli\u003eHow to access and visualize SAR data\u003c/li\u003e\n\u003cli\u003eInterpretation of SAR imagery in the context of disaster monitoring\u003c/li\u003e\n\u003cli\u003eInterferometric SAR (InSAR) concepts\u003c/li\u003e\n\u003cli\u003eFlood mapping and SAR change detection for hazard analysis\u003c/li\u003e\n\u003cli\u003eInSAR-based analysis of volcanoes and landslides\u003c/li\u003e\n\u003cli\u003eThe learned concepts will be put into action in simulated disaster response exercises, in which class participants will analyze SAR data sets to create hazard information for several real-life disaster events from the recent past.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLearners registered for the verified track will additionally get the opportunity for hands-on lab exercises using Jupyter Notebooks. The verified track will also include peer discussions and a verified certificate upon successful completion.\u003c/p\u003e\n\u003cp\u003eThis course is produced by the Alaska Satellite Facility at the University of Alaska Fairbanks, which has been selected as the NASA data hub for the upcoming NISAR mission.\u003c/p\u003e114:T7d3,\u003cp\u003eHow to process big data is an ongoing challenge facing machine learning. Currently, the problem of machine learning processing large-scale data is very common. How to propose a machine learning algorithm that meets the needs of big data processing is a hot research topic in the era of big data. The \"Big Data Machine Learning\" course is a basic th"])</script><script>self.__next_f.push([1,"eoretical course for senior undergraduates and graduate students in the Department of Information Science. Its purpose is to train students to comprehensively understand the theoretical basis of big data machine learning and firmly master the methods and solutions of big data machine learning. Ability to solve practical problems. This course mainly studies machine learning and deep learning methods, aiming to realize the application of big data machine learning. The main contents of this course include:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eBasic theory of statistical learning\u003c/li\u003e\n\u003cli\u003e.Basic methods of machine learning\u003c/li\u003e\n\u003cli\u003eDeep learning theories and methods\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eAn ongoing challenge for machine learning is how to deal with big data. At present, the problem of machine learning dealing with large-scale data is widespread. How to propose a machine learning algorithm to meet the needs of big data processing is a hot research topic in the big data era. The course \" Big Data Machine Learning\" is a basic theory course for senior undergraduates and postgraduates in information science department. Its purpose is to cultivate students' comprehensive ability to understand the theoretical basis of Big Data Machine Learning, master the methods of Big Data Machine Learning firmly, and solve practical problems. This course focuses on the methodsof machine learning and deep learning, and aims to realize the application of big data machine learning. The main contents of the course include:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eThe basic theories of statistical learning\u003c/li\u003e\n\u003cli\u003eThe basic methods of machine learning\u003c/li\u003e\n\u003cli\u003eThe theories and methods of deep learning\u003c/li\u003e\n\u003c/ol\u003e115:T466,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003ePlease stay on the AUDIT path for free access. \u003c/span\u003eGrupo-AE and HP will provide a letter of completion with course hours upon completing all modules for this course when using the free audit path. Additionally, you will not have a time limit to complete this course. There is no difference in content between the audit (free) and verified (certification) learnin"])</script><script>self.__next_f.push([1,"g paths. For best viewing experience, view course on full screen.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis course aims to provide educators with essential knowledge and skills to understand and effectively use computers and Google tools in their teaching processes. Through seven interactive, self-guided modules, participants will learn about digital literacy, basic computer skills and to integrate Google tools in their workflows to communicate, collaborate, create engaging lessons as well as enhance their productivity. \u003cspan lang=\"ES-US\"\u003eThe\u003c/span\u003e course also delves into the fundamentals of privacy and security in a digital world, ensuring that educators are well-equipped to protect their information and that of their students.\u003c/p\u003e116:T754,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThrough the HP \u003c/span\u003eDigital Skills for Educators course, learners will be able to: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eDevelop foundational knowledge of using Technology and Computers in Teaching\u003c/span\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eUnderstand what is Digital literacy and\u003c/span\u003e key Digital skills that can make teaching more engaging \u0026amp; productive\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLearn \u003c/span\u003efundamental aspects / concepts like Hardware, Software, Applications, Internet, Email etc.\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eExplore basics of Privacy and Security\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eLearn\u003c/span\u003e about Google Workspace Tools and discover ways to integrate them into Teaching processes\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eExplore \u003c/span\u003eGoogle tools and get an understanding of their diverse applications in Education\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eEngage with \u003c/span\u003ethe internet, learn to communicate via email or collaborate with students, parents or other colleagues\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eExplore \u003c/span\u003edocument creation and editing tools to create lesson plans, teaching material or assessments\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eLearn to design engaging \u003c/span\u003eand interactive lessons for your students with presentation tools\u003c/p\u003e\n\u003c/li"])</script><script>self.__next_f.push([1,"\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eEfficiently e\u003c/span\u003evaluate and manage essential student data such as grades, attendance, progress etc. with spreadsheet tools\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eLearn to manage and organize digital educational resources\u003c/span\u003e to streamline your workflows and enhance productivity\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEnroll in this introductory course to acquire digital skills to create a more engaging and productive learning environment for your students. Utilize technology to enhance your teaching methods.\u003c/p\u003e117:T826,"])</script><script>self.__next_f.push([1,"\u003cp\u003eRemote sensing observations have become an essential tool in observing the state and evolution of the earth’s ecosystems. They are a unique means within earth sciences to gain an immediate and regional- to continental-scale view of the earth environment, allowing for the monitoring and change detection of entire biomes over time.\u003c/p\u003e\n\u003cp\u003eThis course will introduce you to Synthetic Aperture Radar (SAR), a remote sensing technology that can see the earth surface even during darkness and through rain, clouds, or smoke. As a participant in this course, you will learn how the weather-independence of SAR combined with its ability to penetrate into vegetation canopies make SAR an excellent information source to characterize vegetation structure, measure above-ground biomass, and analyze the change of vegetation long term and throughout the seasons. Each SAR ecosystem application will be illustrated with relevant data sets and hands-on exercises. Specific topics include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe concepts and principles of SAR and polarimetric SAR\u003c/li\u003e\n\u003cli\u003eHow to access and visualize SAR data and SAR imagery\u003c/li\u003e\n\u003cli\u003eInterpretation of SAR images at different wavelengths and polarizations in the context of ecosystems monitoring\u003c/li\u003e\n\u003cli\u003eThe use of SAR techniques in monitoring forest degradation\u003c/li\u003e\n\u003cli\u003eTechniques for estimating forest biomass through SAR earth observation\u003c/li\u003e\n\u003cli\u003eThe application of SAR to the monitoring of agriculture extent\u003c/li\u003e\n\u003cli\u003eThe learned concepts will be put into action in using SAR time series data sets from spaceborne SAR missions over agriculture sites and forested regions undergoing degradation. Learners registered for the verified track will additionally get the opportunity for hands-on lab exercises and tutorials using Jupyter Notebooks. The verified track will also include peer discussions and a verified certificate upon successful completion.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course is produced by the Alaska Satellite Facility at the University of Alaska Fairbanks, which has been selected as the NASA data hub for the upcoming NISAR mission.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"118:T4d9,\u003cp\u003eThis course is the final part of the Cloud Technology Consultant Professional Certificate that brings together and deepens all of the information you have learned along the way. Up until this point, you’ve built up your foundational knowledge of technology and AWS Cloud, but how do you know if the solutions you create are following best practices? This is where the AWS Well-Architected Framework is critical knowledge for any cloud consultant or cloud professional. The AWS Well-Architected Framework is a set of best practices and guidelines for designing and building secure, high-performing, resilient, and efficient solutions on AWS. \u003c/p\u003e\n\u003cp\u003eThe framework covers areas such as security, reliability, performance efficiency, cost optimization, operational excellence, and sustainability. You’ll follow along as we evaluate workloads against the design principles laid out in the AWS Well-Architected Framework. You’ll also get to explore the AWS Well-Architected Tool and apply the AWS Well-Architected Framework to your Capstone project. You’ll also learn about some next steps you can take to launch your career, like AWS Certification exams, getting hands-on with AWS, and practicing interviewing for technical roles.\u003c/p\u003e119:T7f4,\u003cp\u003eTokyo Institute of Technology (Tokyo Tech) created this online as a edX member before it merged with Tokyo Medical and Dental University (TMDU) to form Institute of Science Tokyo (Science Tokyo) on October 1, 2024.\u003c/p\u003e\n\u003cp\u003eThe institute names “Tokyo Tech” and “Tokyo Institute of Technology” are used in this course, however, the current name of the institute is “Institute of Science Tokyo”.\u003c/p\u003e\n\u003cp\u003e---\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis course teaches Japanese law. It covers the legal system and basic concepts. The course starts with the study of concepts that are common to many countries, such as sovereignty, constitution, separation of three rights, basic human rights and personal security. Furthermore, it covers current issues in Japan, for example, those faced"])</script><script>self.__next_f.push([1," in daily life from a legal perspective based upon laws and related practices. By studying Japanese law, you learn about the relationship between law and contemporary Japanese culture and society, and then can compare it to the law of other countries.\u003c/p\u003e\n\u003cp\u003eTopics covered are sovereignty, separation of powers, basic principles of the constitution, principles of freedom of contract (the socioeconomic activity of the law in promoting functionality), the meaning of property rights (relativization of absolute principles of ownership by an aging society and commons), tort and contract comparison, accident and tort law, the characteristics of Japanese family law (including international marriage, divorce and child protection), learning of labor-related law and reform of Japanese-style employment and way of working, the court as a dispute resolution system, and the Japanese court system.\u003c/p\u003e\n\u003cp\u003eThe course covers major law amendments up to March 2021.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eAcknowledgement\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eSpecial thanks to Stephen Mason, barrister and Associate Research Fellow at the Institute of Advanced Legal Studies, School of Advanced Study, University of London, UK for reviewing parts of this revised course.\u003c/p\u003e11a:Tbf9,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eDemystify complex big data technologies\u003cbr /\u003e\n\u003c/strong\u003e Compared to traditional data processing, modern tools can be complex to grasp. Before we can use these tools effectively, we need to know how to handle big data sets. You will understand how and why certain principles – such as immutability and pure functions – enable parallel data processing (‘divide and conquer’), which is necessary to manage big data. \u003c/p\u003e\n\u003cp\u003eDuring this course you will acquire this principal foundation from which to move forward. Namely, how to recognise and put into practice the scalable solution that’s right for your situation. \u003c/p\u003e\n\u003cp\u003eThe insights and tools of this course are regardless of programming language, but user-friendly examples are provided in Python, Hadoop HDFS and Apache Spark. Although these principles can also be applied to other sectors, we will use examples from the agri-food sector.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eData collection and processing in an Agri-food context\u003cbr /\u003e\n\u003c/strong\u003e Agri-food deserves special focus when it comes to choosing robust data management technologies due to its inherent variability and uncertainty. Wageningen University \u0026amp; Research’s knowledge domain is healthy food and the living environment. That makes our data experts especially equipped to forge the bridge between the agri-food business on the one hand, and data science, artificial intelligence (AI) on the other. \u003c/p\u003e\n\u003cp\u003eCombining data from the latest sensing technologies with machine learning/deep learning methodologies, allows us to unlock insights we didn’t have access to before. In the areas of smart farming and precision agriculture this allows us to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eBetter manage dairy cattle by combining animal-level data on behaviour, health and feed with milk production and composition from milking machines.\u003c/li\u003e\n\u003cli\u003eReduce the amount of fertilisers (nitrogen), pesticides (chemicals) and water used on crops by monitoring individual plants with a robot or drone.\u003c/li\u003e\n\u003cli\u003eMore accurately predict crop yields on a continental scale by combining current with historic data on soil, weather patterns and crop yields.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eIn short, this course’s foundational knowledge and skills for big data prepare you for the next step: to find more effective and scalable solutions for smarter, innovative insights.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFor whom?\u003c/strong\u003e\u003cbr /\u003e\nYou are a manager or researcher with a big data set on your hands, perhaps considering investing in big data tools. You’ve done some programming before, but your skills are a bit rusty. You want to learn how to effectively and efficiently manage very large datasets. This course will enable you to see and evaluate opportunities for the application of big data technologies within your domain. Enrol now.\u003c/p\u003e\n\u003cp\u003eThis course has been partially supported by the European Union Horizon 2020 Research and Innovation program (Grant #810\u003cspan lang=\"EN-US\"\u003e 775, \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e“\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eDragon\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e”\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e).\u003c/span\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"11b:Td44,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCyberbullying is the use of technology, such as the internet and social media, to harass, intimidate, or harm someone. This type of bullying can take many forms, including sending mean or threatening messages, posting embarrassing photos or videos, or creating fake profiles to impersonate someone. Cyberbullying can be especially harmful because it can be done anonymously and can reach a wide audience quickly. Cyberbullying includes sending, posting, or sharing false , negative, harmful, or mean content about someone else. It may include sharing of personal or private information about someone else causing embarrassment or humiliation. Sometimes it crosses, the line into unlawful or criminal behaviour.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThe mentioned below are some common places where cyberbullying generally occurs : -\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eSocial Media, such as Facebook, Instagram, Snapchat, Tik Tok or any such other platforms \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eThrough text messaging and some messaging apps on mobile or tablet devices \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eInstant or direct messaging, and online chat over the internet\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eOnline forums, chat rooms, and message boards, such as Reddit etc., \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eOnline gaming communities \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eThrough emails \u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eNowadays, with the prevalence of social media and digital forums, comments, photos, posts, and content shared by individuals can often be viewed by strangers as well as acquaintances. The content an individual shares online, both their personal content as well as any negative, mean, or hurtful content creates a permanent public record of their views, activities, and behaviour. This public record can be thought of as an online reputation, that may be accessible to employers, educational institutes, clubs, and others who may be researching about an individual. It also harms the online reputations of everyone involved in or participating in it.\u003c/p\u003e\n\u003cp\u003eTo hide their identity the bullies generally use fake profiles or anonymous accounts. It makes very difficult for the law enforcement authorities to trace the bully and make accountable for their actions.\u003c/p\u003e\n\u003cp\u003eThere are steps that parents and educators can take to prevent and address this issue. One of the most important is to educate children and young adults about the dangers of cyberbullying and how to recognize it. Parents and educators should also monitor their children’s online activity and encourage them to be open and honest about any cyberbullying they may be experiencing. This can help parents and educators intervene early, before the situation escalates.\u003c/p\u003e\n\u003cp\u003eAnother important step is to work with schools and law enforcement to develop policies and protocols for dealing with cyberbullying. This can include creating a system for reporting cyberbullying and ensuring that victims receive the support and resources they need to heal and move forward. \u003c/p\u003e\n\u003cp\u003eCyberbullying is a threat to one's productivity, motivation level and creates mental stress. The primary objective of the course is to give a complete idea on cyberbullying, discuss different forms of cyber bullying and how to address them in an efficient manner. The course will also discuss about various causes of cyberbullying and the impacts like social, mental, and physical health of a person in detail along with the preventive and reporting mechanisms.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"11c:T7d0,\u003cp\u003eAs COVID-19 continues to affect the world, many people want to learn more about the vaccines developed to tame the pandemic. This short course from the Perelman School of Medicine at the University of Pennsylvania teaches learners the science behind the SARS-CoV-2 virus and the mRNA vaccine platform developed against it. Taught by a team of experts led by Dr. Drew Weissman, a pioneer of the mRNA vaccine technology, this course briefly explains:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ea useful framework for understanding viral epidemics and pandemics\u003c/li\u003e\n\u003cli\u003ewhat a virus is and how viruses cause diseases\u003c/li\u003e\n\u003cli\u003ethe various types of vaccines and how they work\u003c/li\u003e\n\u003cli\u003esome details about coronaviruses, including the ones that have transferred from animals to humans\u003c/li\u003e\n\u003cli\u003ethe basic science and development of mRNA vaccines\u003c/li\u003e\n\u003cli\u003ethe clinical aspects of COVID-19 disease\u003c/li\u003e\n\u003cli\u003ethe clinical aspects, side effects, and effectiveness of mRNA vaccines for COVID-19\u003c/li\u003e\n\u003cli\u003eanswers to common questions and concerns about mRNA vaccines for COVID-19, and\u003c/li\u003e\n\u003cli\u003esome potential future applications of mRNA vaccines\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003ePlease note:\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThis course is designed for educational purposes only. It does not provide or constitute medical advice or professional services. The information in this course should not be used for diagnosing or treating any health problem or a disease. It is not a substitute for professional care. If you have or suspect you may have a health problem, you should consult your health care provider.\u003c/p\u003e\n\u003cp\u003eThe Pfizer/BioNTech and Moderna COVID-19 mRNA vaccines mentioned in this course both use licensed University of Pennsylvania technology. As a result of these licensing relationships, Penn and Dr. Weissman have received and may continue to receive significant financial benefits in the future based on the sale of these products. BioNTech provides funding for Dr. Weissman’s research into the development of additional infectious disease vaccines.\u003c/p\u003e11d:Ta13,"])</script><script>self.__next_f.push([1,"\u003cp\u003eDive into the dynamic world of cartography with our comprehensive course, \"Planet Earth and Geovisualization.\" This two-part series is designed to equip students with both theoretical knowledge and practical skills in modern map-making and geospatial analysis. Throughout this course, students will explore the art and science of cartography, focusing on the principles and techniques essential for effective map communication.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eLearning Objectives:\u003c/strong\u003e\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eExamine the Art and Science of Cartography\u003c/strong\u003e :\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the fundamental principles and history of cartography.\u003c/li\u003e\n\u003cli\u003eAnalyze the key components that contribute to effective map communication, including scale, projection, and symbolization.\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eCreate Vector Map Data from Raster Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLearn to convert raster map data into vector formats.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDevelop skills in organizing and managing geospatial data within a geodatabase.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eDesign Choropleth Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eMaster the creation of choropleth maps to visually represent spatial data.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eApply appropriate data classification techniques and symbology to convey clear and accurate information.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eDevelop Graduated Symbol Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCreate graduated symbol maps to represent varying data magnitudes.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eImplement effective data classification techniques and symbology for enhanced visual interpretation.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eConstruct Isarithmic Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLearn to produce isarithmic maps to illustrate continuous data surfaces.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUtilize appropriate data classification techniques and symbology for accurate representation of phenomena.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eRender 3D Digital Elevation Models (DEMs)\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eTransform DEMs into 3D visualizations for advanced geospatial analysis.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003ePerform viewshed and line of sight calculations to assess visibility and spatial relationships in a three-dimensional context.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eBy the end of this course, students will have a thorough understanding of cartographic principles and will be proficient in using various mapping techniques to create informative and visually compelling maps. Whether you're a novice or an experienced GIS professional, this course will enhance your ability to communicate spatial information effectively through innovative and precise map design.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"11e:Ta50,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn this two-part series you will dive into the dynamic world of cartography with our comprehensive course, \"Planet Earth Geovisualization, Deeper Diver - Micromasters.\" These courses are designed to equip students with both theoretical knowledge and practical skills in modern map-making and geospatial analysis. Throughout the courses, students will explore the art and science of cartography, focusing on the principles and techniques essential for effective map communication.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eLearning Objectives:\u003c/strong\u003e\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eExamine the Art and Science of Cartography\u003c/strong\u003e :\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the fundamental principles and history of cartography.\u003c/li\u003e\n\u003cli\u003eAnalyze the key components that contribute to effective map communication, including scale, projection, and symbolization.\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eCreate Vector Map Data from Raster Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLearn to convert raster map data into vector formats.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDevelop skills in organizing and managing geospatial data within a geodatabase.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eDesign Choropleth Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eMaster the creation of choropleth maps to visually represent spatial data.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eApply appropriate data classification techniques and symbology to convey clear and accurate information.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eDevelop Graduated Symbol Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCreate graduated symbol maps to represent varying data magnitudes.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eImplement effective data classification techniques and symbology for enhanced visual interpretation.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eConstruct Isarithmic Maps\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eLearn to produce isarithmic maps to illustrate continuous data surfaces.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUtilize appropriate data classification techniques and symbology for accurate representation of phenomena.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eRender 3D Digital Elevation Models (DEMs)\u003c/strong\u003e :\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eTransform DEMs into 3D visualizations for advanced geospatial analysis.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003ePerform viewshed and line of sight calculations to assess visibility and spatial relationships in a three-dimensional context.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eBy the end of this two-part series, students will have a thorough understanding of cartographic principles and will be proficient in using various mapping techniques to create informative and visually compelling maps. Whether you're a novice or an experienced GIS professional, this course will enhance your ability to communicate spatial information effectively through innovative and precise map design.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"11f:Taf4,"])</script><script>self.__next_f.push([1,"\u003cp\u003eGenerative AI has emerged as a transformative force in personalization strategies, revolutionizing how businesses tailor experiences, products, and services to individual users, while also introducing complex ethical considerations and unprecedented opportunities for enhancing user engagement and satisfaction.\u003c/p\u003e\n\u003cp\u003eThis course is tailored to introduce the exciting world of Generative AI (GenAI) and its applications in creating personalized user experiences. Participants will gain valuable insights into how GenAI is shaping the digital landscape and influencing user interactions across various platforms.\u003c/p\u003e\n\u003cp\u003eThis course blends theory and practice to immerse students in Generative AI (GenAI) and its personalization applications. Participants will explore key GenAI tools and techniques, learning how to enhance user experiences. The curriculum covers basic implementation strategies for real-world scenarios and addresses critical ethics and privacy concerns in AI-driven personalization. Students will also gain insights into the latest GenAI trends and their impact on digital interactions. This comprehensive approach provides a well-rounded understanding of GenAI’s potential and challenges in creating personalized user experiences.\u003c/p\u003e\n\u003cp\u003eBy the end of this course, participants will have a solid foundation in understanding GenAI’s role in personalization, preparing them for future academic pursuits and potential careers in technology, marketing, or related fields. This course serves as an excellent starting point for students looking to broaden their knowledge in the rapidly evolving field of AI-driven user experiences.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWho is this course for?\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eAspiring Content Creators\u003c/strong\u003e – Those looking to start a career in content creation (YouTube, TikTok, Instagram, blogging, podcasting).\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDigital Media Professionals\u003c/strong\u003e – Those working or transitioning into digital marketing, social media management, or media production.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eMarketing Professionals\u003c/strong\u003e – Traditional marketing specialists who want to enhance their digital and social media skills.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eLive interactive sessions\u003c/strong\u003e :\u003c/p\u003e\n\u003cp\u003eThis course includes two \u003cstrong\u003e1.5-hour live interactive sessions\u003c/strong\u003e on Wednesdays, where you'll engage directly with course instructors and industry experts, ask questions, and gain hands-on experience.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eWednesday, April 30 at 5 PM PST / 8 PM EST\u003c/li\u003e\n\u003cli\u003eWednesday, May 7 at 5 PM PST / 8 PM EST\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWhat You’ll Get:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLive expert-led session for real-time insights\u003c/li\u003e\n\u003cli\u003eInteractive Q\u0026amp;A to address your challenges\u003c/li\u003e\n\u003cli\u003ePractical strategies to create engaging and high-impact content\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"120:T83f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eBioethics provides an overview of the legal, medical, and ethical questions around reproduction and human genetics and how to apply legal reasoning to these questions.\u003c/p\u003e\n\u003cp\u003eThis law course includes interviews with individuals who have used surrogacy and sperm donation, with medical professionals who are experts in current reproductive technologies like In Vitro Fertilization and Preimplantation Genetic Diagnosis, and bioethicists and journalists who study the ownership and use of genetic information within human tissue. Additional Harvard colleagues will also share with you their thoughts on topics such as disability law as it relates to reproductive technology.\u003c/p\u003e\n\u003cp\u003eWhile the law and ethics surrounding these technologies are a central component to this course, we also show you examples of the deeply personal and human side of these issues. Throughout the course, and with the help of law students, we will discuss leading legal cases in this field, which will illuminate the types of questions the law has struggled with – stretching and evolving over time. From the famous Baby M surrogacy case, to cases on the paternity of sperm donors, to a case related to the ownership of human tissue turned into a commercial product, and others. We will show you the ethical, legal, and rhetorical underpinnings, which have served as the basis for various court decisions over the past 20 or 30 years. We will also explore potential future technologies and their implications for society: genetic enhancements to increase our intelligence, let us live a hundred years longer, or make us immune to diseases – and the possibility of creating animal-human hybrids, for example a mouse with a humanized brain.\u003c/p\u003e\n\u003cp\u003eThe content within this course is intended to be instructive, and show how legal reasoning has been applied, or could be applied, to questions related to parenthood, reproduction, and other issues surrounding human genetic material. The material organized within this course should be considered an authoritative overview, but is not intended to serve as medical or legal advice.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"121:T778,\u003cp\u003eIs the threat of nuclear terrorism real? Listen to Graham Allison, Martha Crenshaw, David Holloway and Joe Martz as they investigate the evidence with myself and selected Stanford students. What would be the consequences of a nuclear terror attack? The scenario is difficult to imagine, but Alex Wellerstein and Lynn Eden help me and our students understand just what could happen if the worst case occurs, and how we can work to limit the damage. What can we do to prevent or mitigate this risk? Participate as I explore this crucial question with the help of Stephen Flynn, Rachel Bronson, Valerie Plame Wilson, Ellen Tauscher and Jeffrey Lewis.\u003c/p\u003e\n\u003cp\u003eWith the expert help of Stanford Online, we are able to bring to you this unprecedented group of experts from a wide variety of fields, who share a strong commitment to the urgency of educating people on this important topic. In some of the sessions, you will also hear students actively participating in the conversation. You’ll be exposed to a profound and sometimes disturbing body of research and information, and challenged to find a path forward out of this predicament.\u003c/p\u003e\n\u003cp\u003eWe do not have required reading, but under Additional Resources you will find numerous books, articles, web links and videos to enhance your experience. In addition, we offer a \"Nukes in the News\" section to add topicality. The more you participate, the more you will get out of your experience.\u003c/p\u003e\n\u003cp\u003eOur course differs from most online courses in a fundamental way: our goal is not just to provide facts, but to inspire you to take action. You have the power to make a difference, and I believe this course will give you knowledge and hopefully motivation to do so. You can read more about the subject, and find ways to become involved, by visiting the website of the William J. Perry Project: \u003ca href=\"http://www.wjperryproject.org\"\u003ewww.wjperryproject.org\u003c/a\u003e.\u003c/p\u003e122:T21de,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eCourse Instructors\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. William J. Perry\u003c/strong\u003e was the 19th Secretary of Defense for the United States, serving from February 1994 to January 1997. He previously served as Deputy Secretary of Defense (1993-1994) and as Under Secretary of Defense for Research and Engineering (1977-1981). Dr. Perry is the Michael and Barbara Berberian Professor (emeritus) at Stanford University. He is a Senior Fellow at the Freeman Spogli Institute and the Hoover Institution, and he serves as Director of the Preventive Defense Project. In 2013, Dr. Perry founded the William J. Perry Project (www.wjperryproject.org) to engage and educate the public on the dangers of nuclear weapons in the 21st century.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eGraham Allison\u003c/strong\u003e is the Douglas Dillon Professor of Government at Harvard’s Kennedy School and former Director of the Belfer Center for Science and International Affairs. He is a leading analyst of U.S. national security and defense policy with a special interest in nuclear weapons, terrorism, and decision-making. His latest book, Destined for War: Can America and China Escape Thucydides’s Trap?, was published by Houghton Mifflin Harcourt in May 2017 and quickly became a national bestseller. Dr. Allison served as Assistant Secretary of Defense in the first Clinton Administration and as Special Advisor to the Secretary of Defense under President Reagan. He has the sole distinction of having twice been awarded the Department of Defense's highest civilian award, the Distinguished Public Service Medal, first by Secretary Cap Weinberger and second by Secretary Bill Perry.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Rachel Bronson\u003c/strong\u003e is the Executive Director and Publisher of the Bulletin of the Atomic Scientists where she oversees the publishing programs, the management of the Doomsday Clock, and a growing set of activities around nuclear weapons, nuclear energy, climate change and emerging technologies. She is the author of Thicker than Oil: America’s Uneasy Partnership with Saudi Arabia (Oxford Press, 2006). Her writings have appeared in publication such as Foreign Policy, Foreign Affairs, The National Interest, The New York Times, The Washington Post, Huffington Post, and The Chicago Tribune. Dr. Bronson has testified before the Congressional Anti-Terrorist Finance Task Force, Congress’ Joint Economic Committee, and the 9/11 Commission.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Martha Crenshaw\u003c/strong\u003e is a Senior Fellow at Stanford’s Center for International Security and Cooperation and Freeman Spogli Institute and a Professor of Political Science by courtesy at Stanford. She is a world-renowned expert on political terrorism. In recognition of her work, the National Science Foundation/Department of Defense Minerva Initiative awarded Dr. Crenshaw a grant for a project on \"mapping terrorist organizations\" (see mappingmilitants.stanford.edu). In 2011, Routledge published Explaining Terrorism, a collection of Dr. Crenshaw's previously published writings. Most recently, she co-authored a book with Gary LaFree titled, Countering Terrorism.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Lynn Eden\u003c/strong\u003e is a Senior Research Scholar Emerita. She was a Senior Research Scholar at Stanford University's Center for International Security and Cooperation until January 2016, as well as the Associate Director for Research. Dr. Eden's book, Whole World on Fire: Organizations, Knowledge, and Nuclear Weapons Devastation, explores how and why the U.S. government--from World War II to the present--has greatly underestimated the damage caused by nuclear weapons by failing to predict damage from firestorms. Whole World on Fire won the American Sociological Association's 2004 Robert K. Merton Award for the Best Book in Science, Knowledge, and Technology.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Stephen Flynn\u003c/strong\u003e is Founding Director of the Global Resilience Institute at Northeastern University (https://globalresilience.northeastern.edu/) where he leads a university-wide research enterprise to inform and advance societal resilience. At Northeastern, he is also a Professor of Political Science with affiliated faculty appointments in the College of Engineering and the School of Public Policy and Urban Affairs. Dr. Flynn is recognized as one of the world’s leading experts on both critical infrastructure and supply chain security and resilience. Among his most influential publications are the critically acclaimed The Edge of Disaster: Rebuilding a Resilient Nation and the national bestseller America the Vulnerable: How Government is Failing to Protect Us From Terrorism.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. David Holloway\u003c/strong\u003e is the Raymond A. Spruance Professor of International History, a Professor of Political Science, and a Freeman Spogli Institute Senior Fellow at Stanford University. He is an expert on the development of the Soviet nuclear program and has published widely on this subject. His book, Stalin and the Bomb: The Soviet Union and Atomic Energy, 1939-1956 (Yale University Press, 1994), was chosen by the New York Times Book Review as one of the eleven best books of 1994, and it won the Vucinich and Shulman prizes of the American Association for the Advancement of Slavic Studies.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Jeffrey Lewis\u003c/strong\u003e is the Director of the East Asia Nonproliferation Program at the Middlebury Institute of International Studies at Monterey. Previously, Dr. Lewis served as the Executive Director of the Managing the Atom Project at the Belfer Center for Science and International Affairs, Executive Director of the Association of Professional Schools of International Affairs, a Visiting Fellow at the Center for Strategic and International Studies, and a desk officer in the Office of the Undersecretary of Defense for Policy. He is also a Research Scholar at the Center for International and Security Studies at the University of Maryland's School of Public Policy (CISSM).\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Joseph Martz\u003c/strong\u003e is a physicist and 35-year employee of Los Alamos National Laboratory, who has focused on issues surrounding nuclear security, nuclear weapons, and stockpile stewardship. His early work led to a nationwide evaluation and repackaging of stored nuclear materials, and he was a co-developer of the ARIES system, a means to dismantle and safely recover plutonium from excess nuclear weapons. In addition to his research at Los Alamos, Dr. Martz has led national project teams, including the recent reliable-replacement warhead design competition and several complex nuclear material experiments.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eEllen O’Kane Tauscher\u003c/strong\u003e represented California’s 10th Congressional District in the East Bay of San Francisco for seven terms from 1997-2009. She served on the House Armed Services Committee and was Chair of the Strategic Forces Subcommittee, overseeing the nuclear weapons stockpile and complex, among other forces, from 2006-2009. In 2009, Tauscher was nominated by President Barack Obama and confirmed by the United States Senate as Under Secretary of State for Arms Control and International Security Affairs. As Under Secretary of State, Tauscher was responsible for successfully closing negotiations of the New Start Treaty with the Russian Federation in March 2010 in Geneva and representing the United States at the Non-Proliferation Treaty Review Conference at the United Nations in May 2010.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDr. Alex Wellerstein\u003c/strong\u003e is an Assistant Professor of Science and Technology Studies (STS) in the College of Arts and Letters at the Stevens Institute of Technology in Hoboken, New Jersey. Dr. Wellerstein has been an Associate Historian (a postdoctoral position) at the Center for the History of Physics at the American Institute of Physics, as well as a postdoctoral fellow at the Managing the Atom Project (MTA) and the International Security Program at the Belfer Center for Science and International Affairs, Harvard Kennedy School of Government.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eValerie Plame Wilson\u003c/strong\u003e : As a former career covert CIA operations officer, Valerie Plame Wilson worked to protect America’s national security and prevent the proliferation of weapons of mass destruction, in particular nuclear weapons. During her career with the CIA, Valerie managed top-secret covert programs designed to keep terrorists and rogue nation states from acquiring nuclear weapons. Her position involved decision-making at senior levels, recruiting foreign assets, deploying resources around the world, managing multi-million dollar budgets, briefing U.S. policymakers, and demonstrating consistently solid judgment in a field where mistakes could prove disastrous to national security.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"123:T711,\u003cp\u003e\u003cem\u003eTech for Good\u003c/em\u003e was developed by UNESCO and Cetic.br/NIC.br, the Brazilian Network Information Center’s Regional Center for Studies on the Development of the Information Society. It brings together thought leaders and changemakers in the fields of information and communication technologies (ICT) and sustainable development to show how \u003cstrong\u003edigital technologies are empowering billions of people around the world\u003c/strong\u003e by providing access to education, healthcare, banking, and government services; and how “big data” is being used to inform smarter, evidence-based policies to improve people’s lives in fundamental ways. \u003c/p\u003e\n\u003cp\u003eIt also addresses the \u003cstrong\u003enew challenges that technology can introduce\u003c/strong\u003e , such as privacy, data management, risks to cybersecurity, e-waste, and the widening of social divides. Ultimately, \u003cem\u003eTech for Good\u003c/em\u003e looks at the ways in which stakeholders are coming together to answer big questions about what our future will look like in a hyper-digitized world. \u003c/p\u003e\n\u003cp\u003eThis course is for: \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eTechnology specialists\u003c/strong\u003e who want to understand more about how ICT is being used to improve people’s lives around the world.\u003cbr /\u003e\n\u003cstrong\u003eSustainable development practitioners\u003c/strong\u003e who need to understand the opportunities and limitations of technology in a development context.\u003cbr /\u003e\n\u003cstrong\u003eAdvanced undergraduates and graduate students\u003c/strong\u003e interested in the key concepts and practices of this exciting and ever-changing field. \u003c/p\u003e\n\u003cp\u003ePlease note that the course is free to audit, but there is a fee if you choose to pursue a Verified Certificate. \u003ca href=\"https://support.edx.org/hc/en-us/articles/215167857-Does-edX-offer-financial-assistance-How-do-I-apply-\"\u003eFinancial assistance\u003c/a\u003e is available through edX.\u003c/p\u003e124:T858,"])</script><script>self.__next_f.push([1,"\u003cp dir=\"ltr\"\u003eIn an increasingly digitized and technologically evolving world, it is crucial to stay informed about the tools and resources that are reshaping education. Undoubtedly, ChatGPT is one of these tools, revolutionizing how students access and process information, and how educators design and deliver personalized educational content.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nChatGPT is a conversational language model developed by OpenAI. It operates by employing natural language processing techniques and is trained on vast amounts of text to generate responses to user-provided questions or prompts.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nThe potential of these technologies in education is evident. ChatGPT, Bard, or Bing can assist educators in several tasks, such as content generation and learning activities. However, new technologies bring along a series of changes, challenges, and concerns regarding their use in education. On one hand, optimists praise these tools for supporting teaching. On the other hand, skeptics perceive a clear challenge, particularly regarding the possibility of students easily completing tasks using tools like ChatGPT. These concerns and questions arise whenever new technologies appear in the educational domain. Yet, as usual, these concerns must be considered within a broader framework of reflection, encompassing the relationship (past, present, and future) between technologies and education.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nIn this course, you will discover how to effectively and creatively engage with ChatGPT to obtain surprising and relevant responses in the educational realm. Through practical examples, we will explore everything you need to know about ChatGPT, from designing curriculum plans and orchestrating learning experiences to creating instructional materials and crafting assessments.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAt the end of this course, participants will have a better understanding of how to use ChatGPT to enhance teaching and learning processes. Participants will also have the opportunity to experiment with ChatGPT and develop their own ideas on how to integrate it into their teaching practice.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"125:T89e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eRemote sensing observations from airborne and spaceborne platforms have become an essential tool in earth observation and earth sciences. They provide an immediate and large-area overview of the evolving earth environment, revealing important information on the state of ecosystems, unfolding natural hazards, enabling change detection of geodynamic phenomena such as volcanoes, earthquakes, and the cryosphere.\u003c/p\u003e\n\u003cp\u003eThis course will introduce you to Synthetic Aperture Radar (SAR), a remote sensing technology that can see the earth surface even during darkness and through weather conditions such as rain, clouds, or smoke. As a participant in this course, you will gain an intuitive understanding of the information contained in SAR observations. You will learn about the concepts and applications of interferometric SAR and experience how SAR data acquired at different polarizations can reveal a wealth of information about the earth environment. Each SAR analysis concept will be illustrated with relevant applications. Specific topics include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe mathematical and physical principles of SAR remote sensing\u003c/li\u003e\n\u003cli\u003eHow to access and visualize SAR data\u003c/li\u003e\n\u003cli\u003eInterpretation of SAR images at different wavelengths and polarizations\u003c/li\u003e\n\u003cli\u003eInterferometric SAR (InSAR) concepts\u003c/li\u003e\n\u003cli\u003eThe principles of Polarimetric SAR (PolSAR)\u003c/li\u003e\n\u003cli\u003eA summary of applications of InSAR and PolSAR in geoscience, hazard mapping, and ecosystem monitoring\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLearners on the verified track will put their learned knowledge into action in data analysis and data processing exercises, in which class participants will analyze SAR data sets, generate and interpret interferometric SAR data, and explore the importance of polarization in earth observation. Learners who select the verified track will also have access to online computational labs and tutorials using Jupyter notebooks that will allow deeper exploration and practice.\u003c/p\u003e\n\u003cp\u003eThis course is produced by the \u003ca href=\"https://asf.alaska.edu/\" rel=\"noopener\" target=\"_blank\"\u003eAlaska Satellite Facility\u003c/a\u003e at the University of Alaska Fairbanks, which has been selected as the NASA data hub for the upcoming NISAR mission.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"126:T4fb,\u003cp\u003eFrom helping us spark creative ideas, refine our writing and improve efficiency, GenAI is revolutionising the way we work and study.\u003c/p\u003e\n\u003cp\u003eLike many new developments in technology however, it’s also opened a Pandora’s box of ethical challenges that must be considered. AI bias, inaccuracy and plagiarism have caused many people to be cautious about embracing the potential benefits of GenAI.\u003c/p\u003e\n\u003cp\u003eIn this course, you’ll explore the benefits of using GenAI as well as the ethical challenges AI presents, so you can be confident that the AI content you produce is unbiased, accurate and transparent. As a result, you’ll learn how to confidently use GenAI to its full potential and become a responsible digital citizen.\u003c/p\u003e\n\u003cp\u003eOur approach is simple yet effective — we believe in the power of scenarios to enhance your understanding and retention of key concepts.\u003c/p\u003e\n\u003cp\u003eInstead of bombarding you with theoretical lectures, we want to immerse you in practical situations where you can apply your newfound knowledge in real-world, practical scenarios.\u003c/p\u003e\n\u003cp\u003eBy actively engaging with these scenarios, you'll not only grasp the fundamentals of AI ethics but also develop critical thinking skills essential for navigating the complexities of our digital world.\u003c/p\u003e127:T936,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cem\u003ePlease note: The capstone project is only accessible for ID-verified MicroMasters Program learners who successfully obtained verified certificate in all MicroMasters Program courses.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eIn the first three courses of the MicroMasters Program, you will learn about all the different steps in a biobased process and the business and operations aspects you should consider before choosing a certain process. In this capstone project, you will work on integrating the technological section with the business and operations sections to develop a sustainable biobased practice. The focus is on linking the various aspects into an integral research, based on literature research and applied to a practical case.\u003c/p\u003e\n\u003cp\u003eThe final product in this capstone project is a written report. From a business perspective, you will write an advice for an audience of your choice, for example the executive board of a company, an investor or a governmental agency. You are free to choose the subjects you want to address in this advice. This means you get the opportunity to work on a case of your choice and receive feedback from experts in the field.\u003c/p\u003e\n\u003cp\u003eIn order to find the information and publications you need, you will get tips and advice on how to do proper literature research. Along the way, you will get feedback on your proposal, draft and final report. The final report should reflect the academic research capabilities on a master's level, i.e. defining a research proposal, proper literature research, methodology, data, results and conclusions and discussion.\u003c/p\u003e\n\u003cp\u003eYou can start the capstone project after completing all other courses in the \u003ca href=\"https://www.edx.org/micromasters/wageningenx-business-and-operations-for-a-circular-bio-economy\"\u003eMicroMasters Program Business and Operations for a Circular Economy\u003c/a\u003e, with a verified certificate for every course:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/circular-economy-an-interdisciplinary-approach\"\u003eCircular Economy: An Interdisciplinary Approach\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/business-strategy-and-operations-in-a-biobased-eco\"\u003eBusiness Strategy and Operations in a Biobased Economy\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/from-fossil-resources-to-biomass-a-chemistry-persp\"\u003eFrom Fossil Resources to Biomass: a Chemistry Perspective\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"128:Tae5,"])</script><script>self.__next_f.push([1,"\u003cp dir=\"ltr\"\u003eAHA (Agile, Healthy, Attractive) organizations are intentionally built to flourish in unstable, unpredictable, complicated, and unclear (VUCA) situations by using complexity economics, which differ from conventional neoclassical economic models.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nCore Elements of AHA Organizations:\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nFlexibility: These organizations stay flexible by constantly updating their business plans and mental models, reacting quickly to changes in their external environments. This adjustability ensures they remain competitive within their respective industries.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nHealth: AHA entities stay healthy by keeping the ability to adapt, and balancing their purpose, skills, and resources.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nPurposeful: Being purpose-driven makes AHA organizations appealing to both employees and customers. They are great places to work and partner with, as they match organizational goals with individual values and needs.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nCommunication and Decision-Making: AHA organizations see communication as essential, creating flexible organizational entities that are constantly changing through interactions and information flow.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nOrganizational Structure: AHA organizations shape their internal fitness landscape according to their external contexts, using business plans and mental models that align different internal groups.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nStrategic Tools and Advanced Models:\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nBusiness Plan Elements: AHA business plans incorporate innovative technologies and skills, adapting to the changing requirements and expectations of the organization and the market.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAdaptive and Routine Capabilities: AHA organizations are proficient in both responding to new situations (adaptive capabilities) and running daily activities (routine capabilities), essential for lasting success.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nComposable Enterprise: AHA organizations relies on digital technologies like cloud computing and APIs to enable easy integration and reconfiguration.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDigital Twins and Causal AI: These technologies improve how organizations work by giving current data and forecasts, helping with choices, and making operations better.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAI-Managed Programs and Leadership: Composable enterprises use AI-enhanced programs to boost efficiency and decision-making. This way, leaders can handle rapidly changing situations, creating a culture of innovation and collaboration.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAHA organizations are built to thrive in today's complex business environment by being highly adaptable, communicating strategically, and using technology creatively, establishing a strong foundation for lasting success and growth.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"129:T45e,\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eObserve how AHA organizations excel in VUCA environments by adopting complexity economics, ensuring flexibility through constant updates to business models and mental frameworks, enhancing competitive edge.\u003c/li\u003e\n\u003cli\u003eLearn why communication is central to AHA entities, fostering adaptive and dynamic organizational structures through active interaction and efficient information flow, critical for agile decision-making.\u003c/li\u003e\n\u003cli\u003eUnderstand how AHA utilizes strategic tools like causal AI and cloud technologies to enable seamless integration, reconfiguration, and enhanced operational efficiency, facilitating precise and proactive decision-making.\u003c/li\u003e\n\u003cli\u003eSee how AHA organizations prioritize health by maintaining adaptability, balancing purpose with the necessary skills and resources, fostering environments that are beneficial for both employees and customers.\u003c/li\u003e\n\u003cli\u003eRecognize how AHA organizations promote a culture of innovation and collaboration, equipping leaders to effectively navigate and thrive in rapidly changing business scenarios, through AI-managed programs.\u003c/li\u003e\n\u003c/ul\u003e12a:Ta84,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eBiodiversity in crisis\u003cbr /\u003e\n\u003c/strong\u003e Climate change. Habitat destruction. Overexploitation. Wild animals face anthropogenic threats from the growing human population and our increasing consumption rate. Biodiversity is declining, with over 40,000 species threatened with extinction - over a quarter of the species assessed. At the same time, some species have learnt to exploit new opportunities in human-dominated landscapes, leading to human-wildlife conflicts. We live in a shared world, and the only way forward is sustainable coexistence with wildlife. For this we vitally need the animal perspective.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eTake the animal perspective\u003cbr /\u003e\n\u003c/strong\u003e Developed by the makers of the popular MOOC ‘Introduction to Animal Behaviour’, this course helps you take the ‘conservation behaviour’ perspective in major conservation challenges, such as environmental change, human-wildlife conflict and wildlife reintroductions.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDesign innovative conservation interventions\u003cbr /\u003e\n\u003c/strong\u003e We will explore key concepts from animal behaviour and apply them to practical wildlife conservation issues. Such behaviour-sensitive management has led to successful conservation interventions:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eA wind farm with technology warning for migrating birds decreased soaring bird mortality to zero with a shutdown period of only 0.2–1.2%.\u003c/li\u003e\n\u003cli\u003eA livestock grazing strategy avoiding cheetah communication hubs reduced livestock losses with 86%.\u003c/li\u003e\n\u003cli\u003eA mammal translocation program taking neighbour relations into account led to 24 times more offspring for translocated individuals.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThrough informative knowledge clips, case studies, interviews, and practical assignments, you’ll learn how you can use animal behaviour in conservation to effectively monitor threats, increase your understanding of the diverse responses to environmental change, and design innovative interventions.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFor whom?\u003cbr /\u003e\n\u003c/strong\u003e For professionals working with wildlife, this course will build understanding of how animal behaviour mediates the impact of anthropogenic threats on animal populations. It will become clear how behavioural principles can be used to make behaviour-based management decisions. \u003cbr /\u003e\nStudents of wildlife conservation or animal behaviour will be able to expand their knowledge into a complementary field. Learn how to integrate academic knowledge of behaviour with threatened species conservation planning.\u003c/p\u003e\n\u003cp\u003eSo, whether you are a wildlife conservation practitioner, a student in environmental or animal sciences, or simply someone with a general interest in animal behaviour or conservation, join us!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"12b:T61d,\u003cp\u003eWelcome to How to Use ChatGPT in Education! We're excited to show you the power of ChatGPT in education. This course is designed for students and instructors to explore the many ways that ChatGPT can be used to enhance the learning experience. \u003c/p\u003e\n\u003cp\u003eIn this course, you'll learn how to use ChatGPT for content creation, grading, and more. You'll discover how to create personalized learning experiences for students and automate grading and feedback. We'll also cover ethical and legal considerations for using ChatGPT in education, and explore advanced techniques for customization and integration with other educational tools. \u003c/p\u003e\n\u003cp\u003eBy the end of the course, you'll be able to unlock the limitless potential of ChatGPT in education, and significantly improve your efficiency and access to information. Join us in this exciting journey and explore how AI and language models can transform the way we teach and learn. \u003c/p\u003e\n\u003cp\u003eEnroll now to join us on this journey. We can't wait to see how you'll apply the knowledge you'll learn to enhance the learning experience for instructors and students! \u003c/p\u003e\n\u003cp\u003eBy the end of the course, you'll be able to unlock the limitless potential of ChatGPT in education, and significantly improve your efficiency and access to information. Join us in this exciting journey and explore how AI and language models can transform the way we teach and learn. Enroll now to join us on this journey. We can't wait to see how you'll apply the knowledge you'll learn to enhance the learning experience for instructors and students!\u003c/p\u003e12c:T60c,\u003cp\u003eThe Internet is transforming the world’s economy. It is radically changing how people live, learn, work, play and consume. At the center of this revolution is technology. Technology has moved from the “back office” to the “frontline”. Namely, the interface between the customer and the firm has changed dramatically. Increasingly, technology is shifting the firm’s relationships with its customers from a “face-to-face” to a “screen-to-face” "])</script><script>self.__next_f.push([1,"interaction.\u003c/p\u003e\n\u003cp\u003eDisruption and opportunity to business emerged with new technological innovations. E-commerce is also not an exception. E-commerce used technology enabled transactions. The use of Internet browsers in the World wide web to make these transactions perhaps the best-known example of technology enabled customer interfaces.\u003c/p\u003e\n\u003cp\u003eThe digital technology has made it possible to covert characters, sounds, pictures and motion video into a bit stream that can be combined, stored, manipulated, and transmitted quickly, efficiently, and in large volumes without loss of quality. As a result, the shift towards distributed electronic commerce paved the way from traditional business.\u003c/p\u003e\n\u003cp\u003eThis course will help to choose a collection of various concepts, frameworks, and approaches that represent an entire applications suite of tools for doing business through electronic commerce. This course will be an entry point into a learning system about the fundamentals of electronic commerce for teaching the state of the art in e-commerce business practice and theory.\u003c/p\u003e12d:T6fa,\u003cp\u003ePreparing for the AP Biology exam requires a deep understanding of many different topics in biology as well as an understanding of the format of the AP exam and the types of questions it asks. This course is Part 2 of the AP Biology series designed to prepare you for the AP Biology exam. \u003c/p\u003e\n\u003cp\u003eIn Part 2, you will explore genes and learn how information is passed from one generation to the next. You will look at the molecular level of genetics as well as the bigger picture, learning how DNA holds the instructions to life.\u003c/p\u003e\n\u003cp\u003eAs you work through this course, you will find lecture videos taught by expert AP Biology teachers, practice multiple choice questions and free response questions that are similar to what you will encounter on the AP exam and tutorial videos that show you step-by-step how to solve problems. By the end of the course, you will be prepared to take on the AP exam!\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://www.edx.org/high-school-initia"])</script><script>self.__next_f.push([1,"tive\"\u003eLearn more about our High School and AP* Exam Preparation Courses\u003c/a\u003e\u003c/p\u003e\n\u003chr /\u003e\n\u003cp\u003eThis course is authorized as an Advanced Placement® (AP®) course by the AP Course Audit. The AP Course Audit was created by the College Board to give schools and students the confidence that all AP courses meet or exceed the same clearly articulated curricular expectations of colleges and universities.\u003c/p\u003e\n\u003cp\u003eBy taking an AP course and scoring successfully on the related AP Exam, students can:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStand Out in College Admissions\u003c/li\u003e\n\u003cli\u003eEarn College Credits\u003c/li\u003e\n\u003cli\u003eSkip Introductory Classes\u003c/li\u003e\n\u003cli\u003eBuild College Skills\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cem\u003eAdvanced Placement® and AP® are trademarks registered and/or owned by the College Board, which was not involved in the production of, and does not endorse, these offerings.\u003c/em\u003e\u003c/p\u003e12e:T6f3,\u003cp\u003e\"Managing Museums in the 21st Century\" is a course brought to you by the Smithsonian Institution with support from the United States Agency for International Development (USAID). Parts of this course were developed for the My Armenia Program, a collaborative program of the people of Armenia, USAID, and the Smithsonian Institution. \u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eThis course provides a broad introduction to various aspects of operating a museum. It considers the myriad ways that museums attract and engage visitors onsite and online. It also considers ways museums must be creative in seeking funding. Though museums have existed for hundreds of years, they are always changing, and that change has only accelerated over the last few years as content generation has increased, demands on people's time have increased, audience expectations have evolved, technology has changed, and new approaches to museum exhibitions and programs have taken shape. \u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eThis course is made up of four sections, each designed to share information and perspective, while offering moments for thought and reflection that you can apply to your work.: Exhibition Design and Interpretation, Public Programs, Social M"])</script><script>self.__next_f.push([1,"edia and Outreach, and Fundraising.\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eWe’ve designed this course to address content with a range of audiences in mind, with particular focus on early-career museum professionals or mid-career professionals who have an interest in refreshing their understanding of function areas outside of their core expertise. This course is not intended to serve as a primer for operating a museum, but rather as a resource for thinking about different approaches to museum operations and activities as shared by a number of diverse Smithsonian professionals.\u003c/p\u003e12f:T639,\u003cp\u003eThrough examples and case studies from the Smithsonian and My Armenia Program, you’ll develop a broader understanding of the approaches, tools, and techniques for designing and interpreting exhibitions, developing and implementing public programs, managing social media and outreach, and fundraising.\u003c/p\u003e\n\u003cp\u003eThe first section of this course looks at exhibition design and interpretation. It reviews exhibition audience types and discusses different ways to curate and conceive narrative delivery. Lastly, it briefly provides recommendations for creating engaging museum labels.\u003c/p\u003e\n\u003cp\u003eThe second section of this course discusses public programs - how to design and implement them both onsite in the museum, as well as online. Public programs are an important means of engaging lifelong learners, attract new visitors, and can be a valuable source of revenue for museums.\u003c/p\u003e\n\u003cp\u003eThe third section of this course explores social media and outreach. More and more, the public seeks and finds information about museums through social media, so it has become an increasingly important tool for both promotion as well as content creation and delivery.\u003c/p\u003e\n\u003cp\u003eThe final section of this course discusses fundraising and how museums must think creatively about revenue generation. Different countries approach formal fundraising differently - some cultures have more developed philanthropic environments than others. This section acknowledges that fundraising itself is rea"])</script><script>self.__next_f.push([1,"lly an art, and museums need to be both resourceful and resilient when approaching ways to raise funds.\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e130:T8f5,"])</script><script>self.__next_f.push([1,"\u003cp\u003eTokyo Institute of Technology (Tokyo Tech) created this online as a edX member before it merged with Tokyo Medical and Dental University (TMDU) to form Institute of Science Tokyo (Science Tokyo) on October 1, 2024. The institute names “Tokyo Tech” and “Tokyo Institute of Technology” are used in this course, however, the current name of the institute is “Institute of Science Tokyo”.\u003c/p\u003e\n\u003cp\u003e---\u003c/p\u003e\n\u003cp\u003eOver one hundred years have passed since \u003cem\u003eThe Principles of\u003c/em\u003e \u003cem\u003eScientific Management\u003c/em\u003e was published by A.F. Taylor, who is recognized as the originator of Industrial Engineering, and the manufacturing of goods and business operations have become very complex. Now is the time for applying engineering methodology to Enterprise Activities, that is also known as Enterprise Engineering.\u003c/p\u003e\n\u003cp\u003eIn this course, you will be introduced to the representative methodology called DEMO (Design \u0026amp; Engineering Methodology for Organizations) in Enterprise Ontology. You will have a better understanding of the concept and learn how to apply it to the targeted systems with a certain size. In this course, there are two versions of this methodology that are described, DEMO-3 (old) and DEMO-4 (new). DEMO-3 nomenclature is used and applied throughout the course with the introduction of new methodology, DEMO-4. The difference between DEMO-3 and DEMO-4 is indicated and compared. Many examples and case studies are also provided in this course revision compared to the original course with a new set of quizzes.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAcknowledgements\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThe course instructors express their special thanks of gratitude to their Ciao! friends, Prof. Jan Dietz and Prof. Hans Mulder who gave valuable suggestions to revise the course materials related to the new version of DEMO, DEMO-4. Furthermore, Jan and Hans checked the contents of the previous course materials.\u003c/p\u003e\n\u003cp\u003eSecondly, the course instructors would also like to thank their former Ph.D. students, Dr. Natt Leelawat and Dr. Jing Tang who helped modify the course by adding quizzes and answers.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eTextbook Reference\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eJan L. G. Dietz and Hans B. F. Mulder, \u003cem\u003eEnterprise Ontology: A Human-Centric Approach to Understanding the Essence of Organization.\u003c/em\u003e Springer, 2020\u003c/p\u003e"])</script><script>self.__next_f.push([1,"131:T8c0,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eAbout the Database Series of Courses\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\"Databases\" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced versions on a variety of platforms continuously since 2011. The material is now being offered as a set of five self-paced courses, which can be taken in a variety of ways to learn about different aspects of databases. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eRelational Databases and SQL\u003c/em\u003e is the most popular course in the Databases series. It is applicable to learners seeking to gain a strong understanding of relational databases, and to master SQL, the long-accepted standard query language for relational database systems. Additional courses focus on advanced concepts in relational databases and SQL, formal foundations and database design methodologies, and semistructured data.\u003c/p\u003e\n\u003cp\u003eAll of the courses are based around video lectures and demos. Many of them include quizzes between video segments to check understanding, in-depth standalone quizzes, and/or a variety of automatically-checked interactive exercises. Each course also includes an unmoderated discussion forum and pointers to readings and resources. The courses are described briefly below. Taught by Professor Jennifer Widom, the overall curriculum draws from Stanford's popular longstanding Databases course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Learn About Databases\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDatabases are incredibly prevalent -- they underlie technology used by most people every day if not every hour. Databases reside behind a huge number of websites; they're a crucial component of telecommunications systems, banking systems, video games, and just about any other software system or electronic device that maintains some amount of persistent information. In addition to persistence, database systems provide a number of other properties that make them exceptionally useful and convenient: reliability, efficiency, scalability, concurrency control, data abstractions, and high-level query languages. Databases are so ubiquitous and important that computer science graduates frequently cite their database class as the one most useful to them in their industry or graduate-school careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"132:T805,"])</script><script>self.__next_f.push([1,"\u003cp\u003eStanford's online offering in Databases is now available as a set of five self-paced courses:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Relational Databases and SQL\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to the relational model and concepts in relational databases and relational database management systems\u003c/li\u003e\n\u003cli\u003eComprehensive coverage of SQL, the long-accepted standard query language for relational database management systems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Advanced Topics in SQL (prerequisite: Relational Databases and SQL)\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCreating indexes for increased query performance\u003c/li\u003e\n\u003cli\u003eUsing transactions for concurrency control and failure recovery\u003c/li\u003e\n\u003cli\u003eDatabase constraints: key, referential integrity, and \"check\" constraints\u003c/li\u003e\n\u003cli\u003eDatabase triggers\u003c/li\u003e\n\u003cli\u003eHow views are created, used, and updated in relational databases\u003c/li\u003e\n\u003cli\u003eAuthorization in relational databases\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: OLAP and Recursion\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStar schemas, the data cube concept, and On-Line Analytical Processing (OLAP) features in relational databases including the Cube and Rollup operators\u003c/li\u003e\n\u003cli\u003eThe SQL standard for queries over recursively-defined relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Modeling and Theory\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRelational algebra – the algebraic query language that provides the formal foundations of SQL\u003c/li\u003e\n\u003cli\u003eDependency theory and normal forms in relational databases as the basis of schema design\u003c/li\u003e\n\u003cli\u003eThe data-modeling component of the Unified Modeling Language (UML), how UML diagrams are translated to relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Semistructured Data\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML model for semistructured and self-describing data, including DTDs and some features of XML Schema\u003c/li\u003e\n\u003cli\u003eThe JSON model for human-readable structured or semistructured data\u003c/li\u003e\n\u003cli\u003eThe XPath language for processing XML data, and many features of the more advanced XQuery language\u003c/li\u003e\n\u003cli\u003eAn introduction to the XSLT rule-based language for querying and transforming XML data\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"133:T8c0,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eAbout the Database Series of Courses\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\"Databases\" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced versions on a variety of platforms continuously since 2011. The material is now being offered as a set of five self-paced courses, which can be taken in a variety of ways to learn about different aspects of databases. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eRelational Databases and SQL\u003c/em\u003e is the most popular course in the Databases series. It is applicable to learners seeking to gain a strong understanding of relational databases, and to master SQL, the long-accepted standard query language for relational database systems. Additional courses focus on advanced concepts in relational databases and SQL, formal foundations and database design methodologies, and semistructured data.\u003c/p\u003e\n\u003cp\u003eAll of the courses are based around video lectures and demos. Many of them include quizzes between video segments to check understanding, in-depth standalone quizzes, and/or a variety of automatically-checked interactive exercises. Each course also includes an unmoderated discussion forum and pointers to readings and resources. The courses are described briefly below. Taught by Professor Jennifer Widom, the overall curriculum draws from Stanford's popular longstanding Databases course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Learn About Databases\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDatabases are incredibly prevalent -- they underlie technology used by most people every day if not every hour. Databases reside behind a huge number of websites; they're a crucial component of telecommunications systems, banking systems, video games, and just about any other software system or electronic device that maintains some amount of persistent information. In addition to persistence, database systems provide a number of other properties that make them exceptionally useful and convenient: reliability, efficiency, scalability, concurrency control, data abstractions, and high-level query languages. Databases are so ubiquitous and important that computer science graduates frequently cite their database class as the one most useful to them in their industry or graduate-school careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"134:T523,\u003cp\u003eThis course is one of five self-paced courses on the topic of Databases, originating as one of Stanford's three inaugural massive open online courses released in the fall of 2011. The original \"Databases\" courses are now all available on edx.org.\u003c/p\u003e\n\u003cp\u003eThis course is broad and practical, covering indexes, transactions, constraints, triggers, views, and authorization, all in the context of relational database systems and the SQL language. This course builds on concepts introduced in \u003cem\u003eDatabases: Relational Databases and SQL\u003c/em\u003e and is recommended for learners seeking to advance their understanding and use of relational databases.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe Indexes and Transactions section of this course covers two important features of database systems from the application-builder's perspective: indexing for increased performance, and transactions for concurrency control and failure recovery.\u003c/li\u003e\n\u003cli\u003eThe Constraints and Triggers section of this course explains key, referential integrity, and \"check\" constraints, followed by comprehensive coverage of database triggers.\u003c/li\u003e\n\u003cli\u003eThe Views and Authorization section of this course provides extensive coverage of how database views can be created, used, and updated, and introduces standard techniques for authorization in relational databases.\u003c/li\u003e\n\u003c/ul\u003e135:T805,"])</script><script>self.__next_f.push([1,"\u003cp\u003eStanford's online offering in Databases is now available as a set of five self-paced courses:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Relational Databases and SQL\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to the relational model and concepts in relational databases and relational database management systems\u003c/li\u003e\n\u003cli\u003eComprehensive coverage of SQL, the long-accepted standard query language for relational database management systems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Advanced Topics in SQL (prerequisite: Relational Databases and SQL)\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCreating indexes for increased query performance\u003c/li\u003e\n\u003cli\u003eUsing transactions for concurrency control and failure recovery\u003c/li\u003e\n\u003cli\u003eDatabase constraints: key, referential integrity, and \"check\" constraints\u003c/li\u003e\n\u003cli\u003eDatabase triggers\u003c/li\u003e\n\u003cli\u003eHow views are created, used, and updated in relational databases\u003c/li\u003e\n\u003cli\u003eAuthorization in relational databases\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: OLAP and Recursion\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStar schemas, the data cube concept, and On-Line Analytical Processing (OLAP) features in relational databases including the Cube and Rollup operators\u003c/li\u003e\n\u003cli\u003eThe SQL standard for queries over recursively-defined relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Modeling and Theory\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRelational algebra – the algebraic query language that provides the formal foundations of SQL\u003c/li\u003e\n\u003cli\u003eDependency theory and normal forms in relational databases as the basis of schema design\u003c/li\u003e\n\u003cli\u003eThe data-modeling component of the Unified Modeling Language (UML), how UML diagrams are translated to relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Semistructured Data\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML model for semistructured and self-describing data, including DTDs and some features of XML Schema\u003c/li\u003e\n\u003cli\u003eThe JSON model for human-readable structured or semistructured data\u003c/li\u003e\n\u003cli\u003eThe XPath language for processing XML data, and many features of the more advanced XQuery language\u003c/li\u003e\n\u003cli\u003eAn introduction to the XSLT rule-based language for querying and transforming XML data\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"136:T586,\u003cp\u003eThis course is part of the edX Professional Certificate program \u003ca href=\"https://www.edx.org/professional-certificate/certified-supply-chain-analyst-csca\"\u003eCertified Supply Chain Analyst (CSCA)\u003c/a\u003e, offered by ISCEA. This course prepares you for the ISCEA Certified Supply Chain Analyst (CSCA) Exam on edX and is a requirement for becoming ISCEA certified. To become an ISCEA Certified Supply Chain Analyst (CSCA), you must complete all three preparatory courses and successfully pass the CSCA Exam.\u003c/p\u003e\n\u003cp\u003eThe Procurement and Logistics Management course is designed to provide the foundational skills to manage the flow of materials and goods throughout the supply chain. From the procurement perspective, it explores the specifics of sourcing, supplier assessment, collaboration, contract management, purchase order management, EDI, and Flow Technology. It also addresses the issues, benefits and assessments of Materials Requirement Planning - MRP.\u003c/p\u003e\n\u003cp\u003eThe course provides instructional information on both manufacturing and logistics. The management of inventory and transportation will be discussed in detail; including, but not limited to, respective designs, technologies, modes, and performance. The course concludes with a focus on warehousing and distribution best practices.\u003c/p\u003e\n\u003cp\u003eThis course is part of the ISCEA CSCA - Certified Supply Chain Analyst - Internationally Recognized Certificate.\u003c/p\u003e137:T7b5,\u003cp\u003eModern systems today must be designed for agility in order to outpace the competition. Concepts like Agile, DevOps, and Data Science were once considered only for the technology-based companies. Today that means every company. Because there is no greater currency than timely information for optimizing operations and meeting the needs of customers.\u003c/p\u003e\n\u003cp\u003eModern product management requires that every development and operations value stream is identified and continuously improved. This means using Lean and DevOps principles to streamline handoffs and information flows across teams. It means reorienting towar"])</script><script>self.__next_f.push([1,"ds self-service and automation wherever possible. And to avoid incrementalism, it means a robust Agile development process to keep innovations important and aggressive enough to make noticeable improvements in value delivery.\u003c/p\u003e\n\u003cp\u003eAgile systems in a DevOps environment requires that products are built completely differently from a traditional designs. Modularity, open set architectures, and flexible data management paradigms are a starting point. The evolutionary nature of the product with so much change enables functionality, design, and technology to drive and influence each other simultaneously. And beneath it all is a data collection and feedback loop essential for anticipating and reacting to business needs both for operations and marketing.\u003c/p\u003e\n\u003cp\u003eData science and analytics are the lifeblood of any product organization, and enable product managers to tackle risks early. Luckily, new technologies allow us to collect and integrate data without extreme upfront constraints and onerous controls. This means all data is fair game, and when tagged and stored properly, can be made available at nearly any scale for preparation, visualization, analysis, and modeling.\u003c/p\u003e\n\u003cp\u003eWe’ll teach you the paradigms, processes, and introduce some key technologies that make the data-driven product organization the optimal competitor in the market.\u003c/p\u003e138:T8c0,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eAbout the Database Series of Courses\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\"Databases\" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced versions on a variety of platforms continuously since 2011. The material is now being offered as a set of five self-paced courses, which can be taken in a variety of ways to learn about different aspects of databases. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eRelational Databases and SQL\u003c/em\u003e is the most popular course in the Databases series. It is applicable to learners seeking to gain a strong understanding of relational databases, and to master SQL, the long-accepted standard query language for relational database systems. Additional courses focus on advanced concepts in relational databases and SQL, formal foundations and database design methodologies, and semistructured data.\u003c/p\u003e\n\u003cp\u003eAll of the courses are based around video lectures and demos. Many of them include quizzes between video segments to check understanding, in-depth standalone quizzes, and/or a variety of automatically-checked interactive exercises. Each course also includes an unmoderated discussion forum and pointers to readings and resources. The courses are described briefly below. Taught by Professor Jennifer Widom, the overall curriculum draws from Stanford's popular longstanding Databases course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Learn About Databases\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDatabases are incredibly prevalent -- they underlie technology used by most people every day if not every hour. Databases reside behind a huge number of websites; they're a crucial component of telecommunications systems, banking systems, video games, and just about any other software system or electronic device that maintains some amount of persistent information. In addition to persistence, database systems provide a number of other properties that make them exceptionally useful and convenient: reliability, efficiency, scalability, concurrency control, data abstractions, and high-level query languages. Databases are so ubiquitous and important that computer science graduates frequently cite their database class as the one most useful to them in their industry or graduate-school careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"139:T4f2,\u003cp\u003eThis course is one of five self-paced courses on the topic of Databases, originating as one of Stanford's three inaugural massive open online courses released in the fall of 2011. The original \"Databases\" courses are now all available on edx.org.\u003c/p\u003e\n\u003cp\u003eThis course covers underlying principles and design considerations related to databases; it can be taken either before or after taking other courses in the Databases series.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe Relational Algebra section of this course teaches the algebraic query language that provides the formal foundations of SQL.\u003c/li\u003e\n\u003cli\u003eThe Relational Design Theory section of the course provides comprehensive coverage of dependency theory and normal forms in relational databases, a well-accepted theoretical framework for developing good relational database schemas.\u003c/li\u003e\n\u003cli\u003eThe Unified Modeling Language section of this course introduces the data-modeling component of UML, and describes how UML diagrams are translated to relational database schemas.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe introductory videos in this course are the same as the introductory videos in \u003cem\u003eDatabases: Relational Databases and SQL\u003c/em\u003e ; they are included for the benefit of learners who have not taken \u003cem\u003eDatabases: Relational Databases and SQL\u003c/em\u003e.\u003c/p\u003e13a:T805,"])</script><script>self.__next_f.push([1,"\u003cp\u003eStanford's online offering in Databases is now available as a set of five self-paced courses:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Relational Databases and SQL\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to the relational model and concepts in relational databases and relational database management systems\u003c/li\u003e\n\u003cli\u003eComprehensive coverage of SQL, the long-accepted standard query language for relational database management systems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Advanced Topics in SQL (prerequisite: Relational Databases and SQL)\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCreating indexes for increased query performance\u003c/li\u003e\n\u003cli\u003eUsing transactions for concurrency control and failure recovery\u003c/li\u003e\n\u003cli\u003eDatabase constraints: key, referential integrity, and \"check\" constraints\u003c/li\u003e\n\u003cli\u003eDatabase triggers\u003c/li\u003e\n\u003cli\u003eHow views are created, used, and updated in relational databases\u003c/li\u003e\n\u003cli\u003eAuthorization in relational databases\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: OLAP and Recursion\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStar schemas, the data cube concept, and On-Line Analytical Processing (OLAP) features in relational databases including the Cube and Rollup operators\u003c/li\u003e\n\u003cli\u003eThe SQL standard for queries over recursively-defined relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Modeling and Theory\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRelational algebra – the algebraic query language that provides the formal foundations of SQL\u003c/li\u003e\n\u003cli\u003eDependency theory and normal forms in relational databases as the basis of schema design\u003c/li\u003e\n\u003cli\u003eThe data-modeling component of the Unified Modeling Language (UML), how UML diagrams are translated to relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Semistructured Data\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML model for semistructured and self-describing data, including DTDs and some features of XML Schema\u003c/li\u003e\n\u003cli\u003eThe JSON model for human-readable structured or semistructured data\u003c/li\u003e\n\u003cli\u003eThe XPath language for processing XML data, and many features of the more advanced XQuery language\u003c/li\u003e\n\u003cli\u003eAn introduction to the XSLT rule-based language for querying and transforming XML data\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"13b:T9dc,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThree innovations are driving the data revolution in medicine. \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eNext Generation Sequencing, and in particular, the ability to sequence individual genomes at diminishing costs.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eElectronic Medical Records, and our ability to mine, using machine learning techniques, huge datasets of medical records.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eWearable devices, the Web, social networks and crowdsourcing - exemplifying the surprising capacity to collect medical data using non-conventional resources.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eIn order to take advantage of these technologies and participate in the revolution, physicians need a new toolbox that is generally lacking in the medical school curriculum. \u003c/p\u003e\n\u003cp\u003eThis course is a product of a decade of a collaborative effort between researchers from the computational biology program at Bar-Ilan University, and clinicians from Sheba Medical Center to develop and deliver an extended curriculum in genomics and biomedical informatics. The program has been endorsed by the Israeli Medicine Association and Ministry of Health. Here, we present a condensed online course that includes selected topics chosen from the extended program. \u003c/p\u003e\n\u003cp\u003eThis GaBI course on edX presents clinicians and digital health enthusiasts with an overview of the data revolution in medicine, and how to take advantage of it for research and in the clinic. In the scope of this single course, you will not become a bioinformatician, but you will be able to familiarize yourself with the main concepts, tools, algorithms, and databases used in this field, and understand the types of problems that these analysis techniques can help address. \u003c/p\u003e\n\u003cp\u003eThe syllabus covers the main topics of this discipline in a logical order: \u003c/p\u003e\n\u003cp\u003e● Methods used to obtain medical data (genotypic and phenotypic) \u003c/p\u003e\n\u003cp\u003e● Analysis of biological molecules such as DNA, RNA, and proteins using various computational tools from the field of bioinformatics \u003c/p\u003e\n\u003cp\u003e● Use of machine learning and artificial intelligence tools to mine the huge databases of medical information accumulating in Electronic Medical Records (EMRs), the Web, and numerous data science projects in medicine \u003c/p\u003e\n\u003cp\u003e● Analysis of complex interaction networks between DNA, RNA and protein molecules to gain a more holistic and systematic view of biological systems and medical conditions \u003c/p\u003e\n\u003cp\u003e● Practical applications in the clinic and in personalized medicine research, and the use of cutting edge technology to improve health\u003c/p\u003e"])</script><script>self.__next_f.push([1,"13c:T69b,\u003cp\u003eEmbark on a transformative journey of self-discovery through the lens of the arts in this engaging course. Unlike traditional memorization-based courses, this immersive experience encourages you to delve into your unique perspective and personal experiences with the arts, exploring how they not only intersect with society but also have the power to shape it.\u003c/p\u003e\n\u003cp\u003eIn this dynamic learning environment, you won't just passively absorb information; you'll actively engage in learning by doing. This course challenges you to introspect, prompting you to dedicate time to contemplative thinking and view the world of arts through a reflective lens. Each unit is thoughtfully structured, offering three prompts to guide your exploration.\u003c/p\u003e\n\u003cp\u003eThe Prose Prompt invites you to articulate your thoughts on paper, sharing your personal experiences and observations related to art and music. The Ponder Prompt encourages you to envision how you currently intersect with the arts or how these intersections might evolve in the future. Finally, the Portray Prompt empowers you to uncover deeper meanings behind familiar art or music and seek out new experiences that resonate with societal issues important to you.\u003c/p\u003e\n\u003cp\u003eUnit 1 sets the stage for exploring the intersection of the arts with people, while Unit 2 delves into the dynamic relationship between the arts, time and technology. Unit 3 challenges you to navigate the ever-changing landscape of the arts, and Unit 4 focuses on the profound connection between the arts and the communication of ideas and emotions. In this course, your unique perspective will be valued and celebrated through self-exploration and artistic discovery.\u003c/p\u003e13d:T8c0,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eAbout the Database Series of Courses\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\"Databases\" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced versions on a variety of platforms continuously since 2011. The material is now being offered as a set of five self-paced courses, which can be taken in a variety of ways to learn about different aspects of databases. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eRelational Databases and SQL\u003c/em\u003e is the most popular course in the Databases series. It is applicable to learners seeking to gain a strong understanding of relational databases, and to master SQL, the long-accepted standard query language for relational database systems. Additional courses focus on advanced concepts in relational databases and SQL, formal foundations and database design methodologies, and semistructured data.\u003c/p\u003e\n\u003cp\u003eAll of the courses are based around video lectures and demos. Many of them include quizzes between video segments to check understanding, in-depth standalone quizzes, and/or a variety of automatically-checked interactive exercises. Each course also includes an unmoderated discussion forum and pointers to readings and resources. The courses are described briefly below. Taught by Professor Jennifer Widom, the overall curriculum draws from Stanford's popular longstanding Databases course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Learn About Databases\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDatabases are incredibly prevalent -- they underlie technology used by most people every day if not every hour. Databases reside behind a huge number of websites; they're a crucial component of telecommunications systems, banking systems, video games, and just about any other software system or electronic device that maintains some amount of persistent information. In addition to persistence, database systems provide a number of other properties that make them exceptionally useful and convenient: reliability, efficiency, scalability, concurrency control, data abstractions, and high-level query languages. Databases are so ubiquitous and important that computer science graduates frequently cite their database class as the one most useful to them in their industry or graduate-school careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"13e:T4a1,\u003cp\u003eThis course is one of five self-paced courses on the topic of Databases, originating as one of Stanford's three inaugural massive open online courses released in the fall of 2011. The original \"Databases\" courses are now all available on edx.org.\u003c/p\u003e\n\u003cp\u003ePart of the Databases series, this is a standalone course; learners seeking to develop an understanding of topics in this course do not need to take other Databases courses. This course covers the JSON and XML standards for semistructured data, along with query languages and schema declaration features for XML.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML Data section of this course introduces the XML model for semistructured and self-describing data, including DTDs and some features of XML Schema.\u003c/li\u003e\n\u003cli\u003eThe JSON Data section of this course introduces the JSON model for human-readable structured or semistructured data.\u003c/li\u003e\n\u003cli\u003eThe XPath and XQuery section of this course covers the XPath language for processing XML data, along with many features of the more advanced XQuery language.\u003c/li\u003e\n\u003cli\u003eThe XSLT section of this course provides a general introduction to the XSLT rule-based language for querying and transforming XML data.\u003c/li\u003e\n\u003c/ul\u003e13f:T805,"])</script><script>self.__next_f.push([1,"\u003cp\u003eStanford's online offering in Databases is now available as a set of five self-paced courses:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Relational Databases and SQL\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to the relational model and concepts in relational databases and relational database management systems\u003c/li\u003e\n\u003cli\u003eComprehensive coverage of SQL, the long-accepted standard query language for relational database management systems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Advanced Topics in SQL (prerequisite: Relational Databases and SQL)\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCreating indexes for increased query performance\u003c/li\u003e\n\u003cli\u003eUsing transactions for concurrency control and failure recovery\u003c/li\u003e\n\u003cli\u003eDatabase constraints: key, referential integrity, and \"check\" constraints\u003c/li\u003e\n\u003cli\u003eDatabase triggers\u003c/li\u003e\n\u003cli\u003eHow views are created, used, and updated in relational databases\u003c/li\u003e\n\u003cli\u003eAuthorization in relational databases\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: OLAP and Recursion\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStar schemas, the data cube concept, and On-Line Analytical Processing (OLAP) features in relational databases including the Cube and Rollup operators\u003c/li\u003e\n\u003cli\u003eThe SQL standard for queries over recursively-defined relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Modeling and Theory\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRelational algebra – the algebraic query language that provides the formal foundations of SQL\u003c/li\u003e\n\u003cli\u003eDependency theory and normal forms in relational databases as the basis of schema design\u003c/li\u003e\n\u003cli\u003eThe data-modeling component of the Unified Modeling Language (UML), how UML diagrams are translated to relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Semistructured Data\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML model for semistructured and self-describing data, including DTDs and some features of XML Schema\u003c/li\u003e\n\u003cli\u003eThe JSON model for human-readable structured or semistructured data\u003c/li\u003e\n\u003cli\u003eThe XPath language for processing XML data, and many features of the more advanced XQuery language\u003c/li\u003e\n\u003cli\u003eAn introduction to the XSLT rule-based language for querying and transforming XML data\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"140:T53c,\u003cp\u003eAI continues to contribute to progress against leading causes of disease and death whether through sharing data and information about clinical trials in real-time or using AI to develop new insights into the diagnosis and treatment of diseases. Specific applications include improving patient care through machine learning and data analysis, fast and accurate diagnosis, precision in treatment planning, medical imaging, and patient data analysis. \u003c/p\u003e\n\u003cp\u003eProfessionals who work in non-technical roles in healthcare also need foundational knowledge and practical insights to help them take advantage of AI. Objectives here range from the safe and ethical application of AI in clinical settings to AI applications in hospital management. This MOOC is a quick start to the applications of AI for this class of professionals, focusing entirely on deep learning, particularly on smart and AI-based automation in the healthcare sector. It aims to propagate ideas about how to proactively engage with AI in the healthcare domain.\u003c/p\u003e\n\u003cp\u003eThe course will help participants bridge the gap between healthcare and technology. Participants will possess the knowledge and confidence to engage with AI projects, advocate for responsible AI adoption, and identify opportunities to leverage AI for better patient outcomes and operational efficiency.\u003c/p\u003e141:T658,\u003cp\u003eIn today’s interconnected world, online education has exploded with engaging learning experiences infused with interactive digital tools, digital media, and collaborative projects designed to engage dispersed learners. These highly engaging and effective courses are not created by chance - they are created by instructional designers using a careful and systematic design process.\u003c/p\u003e\n\u003cp\u003eIn this course, you'll explore a rich array of instructional design models, each with its own unique strengths and applications. Throughout the eight weeks, you will learn about these models and discover how to identify the best model for your own online course. You will explore instructional de"])</script><script>self.__next_f.push([1,"sign models like ADDIE, Dick and Carey, Understanding by Design (UbD), Rapid Instructional Design, and the Successive Approximation Model (SAM). You will also venture into the world of crafting course learning outcomes, learning objectives, learning activities, and assessments. The journey culminates with your signature assignment, where you'll have the opportunity to apply your newfound knowledge to create the essential components of an Instructional Design Document (IDD).\u003c/p\u003e\n\u003cp\u003eBy the end of this course, you'll have the skills to architect powerful learning experiences.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Instructional Design and Technology MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Learning Design and Technology. See the MicroMasters program page for more information.\u003c/p\u003e142:T8cd,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThis is the first in a series of courses on financial technology, also called Fintech. The course provides an overview of the most recent technological advances that are radically changing the financial services industry. These technological breakthroughs offer new ways for people to save, invest, borrow, and transact.\u003c/p\u003e\n\u003cp\u003eThe course is structured in three modules. In the first module, we will discuss the characteristics and trends in finance and how emerging technologies are changing the financial industry. We will begin by looking at how efficient (or inefficient) the financial sector is. We will then learn how firms in the financial industry create value by reducing unit cost, increasing transparency, increasing competition, creating network effects, leveraging economies of scales, and lowering asymmetric information. And finally we will introduce three main technologies that are disrupting the financial sector: blockchain technology, machine learning, and Internet-of-Things.\u003c/p\u003e\n\u003cp\u003eIn the second module, we will learn about the regulatory landscape that financial and fintech firms face. We will begin with an overview of the regulatory framework of the financial sector the United States with the understanding that the approach to regulating the financial sector is for the most part similar around the world. We will then proceed to look at recent initiatives on how to regulate fintech firms. Finally, we will conclude the module by looking at recent regulatory changes in Europe with respect to Open Banking, and at the pros and cons of regulatory sandboxes.\u003c/p\u003e\n\u003cp\u003eIn the last module, we will complete our overview of the fintech sector by reading several articles and reports on the fintech industry, and discuss a business case on Ant Financial.\u003c/p\u003e\n\u003cp\u003eAfter you complete this course, you will have a broad understanding of the fintech landscape, and you will be ready to dive deep into the other courses of the fintech certificate.\u003c/p\u003e\n\u003cp\u003eFinancial professionals are often required or encouraged to continue their education to practice their profession. For some associations, this program may be used for Continuing Education Credits. Please check with your local or national organization if the program qualifies.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"143:T8c0,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eAbout the Database Series of Courses\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\"Databases\" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced versions on a variety of platforms continuously since 2011. The material is now being offered as a set of five self-paced courses, which can be taken in a variety of ways to learn about different aspects of databases. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eRelational Databases and SQL\u003c/em\u003e is the most popular course in the Databases series. It is applicable to learners seeking to gain a strong understanding of relational databases, and to master SQL, the long-accepted standard query language for relational database systems. Additional courses focus on advanced concepts in relational databases and SQL, formal foundations and database design methodologies, and semistructured data.\u003c/p\u003e\n\u003cp\u003eAll of the courses are based around video lectures and demos. Many of them include quizzes between video segments to check understanding, in-depth standalone quizzes, and/or a variety of automatically-checked interactive exercises. Each course also includes an unmoderated discussion forum and pointers to readings and resources. The courses are described briefly below. Taught by Professor Jennifer Widom, the overall curriculum draws from Stanford's popular longstanding Databases course.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhy Learn About Databases\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eDatabases are incredibly prevalent -- they underlie technology used by most people every day if not every hour. Databases reside behind a huge number of websites; they're a crucial component of telecommunications systems, banking systems, video games, and just about any other software system or electronic device that maintains some amount of persistent information. In addition to persistence, database systems provide a number of other properties that make them exceptionally useful and convenient: reliability, efficiency, scalability, concurrency control, data abstractions, and high-level query languages. Databases are so ubiquitous and important that computer science graduates frequently cite their database class as the one most useful to them in their industry or graduate-school careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"144:T805,"])</script><script>self.__next_f.push([1,"\u003cp\u003eStanford's online offering in Databases is now available as a set of five self-paced courses:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Relational Databases and SQL\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eIntroduction to the relational model and concepts in relational databases and relational database management systems\u003c/li\u003e\n\u003cli\u003eComprehensive coverage of SQL, the long-accepted standard query language for relational database management systems\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Advanced Topics in SQL (prerequisite: Relational Databases and SQL)\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCreating indexes for increased query performance\u003c/li\u003e\n\u003cli\u003eUsing transactions for concurrency control and failure recovery\u003c/li\u003e\n\u003cli\u003eDatabase constraints: key, referential integrity, and \"check\" constraints\u003c/li\u003e\n\u003cli\u003eDatabase triggers\u003c/li\u003e\n\u003cli\u003eHow views are created, used, and updated in relational databases\u003c/li\u003e\n\u003cli\u003eAuthorization in relational databases\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: OLAP and Recursion\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eStar schemas, the data cube concept, and On-Line Analytical Processing (OLAP) features in relational databases including the Cube and Rollup operators\u003c/li\u003e\n\u003cli\u003eThe SQL standard for queries over recursively-defined relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Modeling and Theory\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRelational algebra – the algebraic query language that provides the formal foundations of SQL\u003c/li\u003e\n\u003cli\u003eDependency theory and normal forms in relational databases as the basis of schema design\u003c/li\u003e\n\u003cli\u003eThe data-modeling component of the Unified Modeling Language (UML), how UML diagrams are translated to relations\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDatabases: Semistructured Data\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe XML model for semistructured and self-describing data, including DTDs and some features of XML Schema\u003c/li\u003e\n\u003cli\u003eThe JSON model for human-readable structured or semistructured data\u003c/li\u003e\n\u003cli\u003eThe XPath language for processing XML data, and many features of the more advanced XQuery language\u003c/li\u003e\n\u003cli\u003eAn introduction to the XSLT rule-based language for querying and transforming XML data\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"145:T45c,\u003cp\u003eOver the past few years, advancements in the Information and Communication Technologies (ICTs) have significantly challenged the traditionally stable landscape of urban infrastructure services. The result is an increasing interest in the transitioning of cities towards so-called “smart cities” – an interest expressed both by technology vendors and public authorities. Although such “smart technologies” can provide immense opportunities for citizens and for service providers alike, the ICTs often act as disruptive innovators of urban infrastructure service provision.\u003c/p\u003e\n\u003cp\u003eIn this MOOC, you will gain a thorough understanding of the challenges and opportunities associated with “smart urban infrastructures” as well as how these infrastructures can be managed in order to deliver desirable performance in cities. More precisely, throughout this 5-week MOOC you will learn about the most important principles for the management of smart urban infrastructures as well as about the application of these principles to two specific sectors, namely urban transportation and urban energy systems.\u003c/p\u003e146:Tb2f,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-NZ\"\u003eThis course focusses on your proficiency of field skills and contextual knowledge within earth and environmental sciences. Each section focuses on a specific skill set and represents a way of acknowledging achievements or skill acquisition at a granular level.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eKey field skills included in this course are navigation, field observations and note-taking, and field sketching.\u003c/p\u003e\n\u003cp\u003eField Observations and Note-taking\u003c/p\u003e\n\u003cp\u003eThis section introduces how to set yourself up to be an effective observer and recorder using the platform of a field notebook. A field notebook serves many potential purposes. It is a valuable record of what you have seen, heard, discussed, and thought about in the field. It may contain the data which will lead to an oral presentation, a report, thesis, or even a scientific journal article. It may be a graded portion of a course. Or it may be something you and your relatives will find interesting decades in the future.\u003c/p\u003e\n\u003cp\u003eThis section provides you with the knowledge, platforms, skills to guide you in taking quality and organised notes while in the field.\u003c/p\u003e\n\u003cp\u003eNavigation\u003c/p\u003e\n\u003cp\u003eThe purpose of this section is to learn the fundamentals behind navigation and to develop core navigation skills. Today’s technology allows more confidence and safety in outdoor activities, but there are still some fundamental knowledge and skills you need to have to effectively use these.\u003c/p\u003e\n\u003cp\u003eWhat would be the key skills needed to be able to successfully navigate your way out of a situation? You may be in a situation where technology fails you or services are unavailable. This section focusses on specific tools and skill development in particular compass, GPS, base maps, and yourself. Being able to interpret and navigate a landscape gives a much deeper understanding of the lay of the land, how to identify your location, and how to move through it.\u003c/p\u003e\n\u003cp\u003eField Sketching\u003c/p\u003e\n\u003cp\u003eThis section introduces the basics of sketching, developing your skills and confidence so that you can create field sketches that support your scientific observations and data collection.\u003c/p\u003e\n\u003cp\u003eData collection in the field is not just focussed on written notes, hard data, and measurements (quantitative data), it is also supported with sketches – drawings of nature, objects, flora, fauna, landscapes, architecture etc., which represent qualitative data. This section builds your ability to develop field sketches that provide a record of field observations \u0026amp; measurements, that give a summary of key features, that interprets photographs taken in the field, and provide useful memory aids.\u003c/p\u003e\n\u003cp\u003eThis section develops skills and confidence in creating field sketches that are not masterpieces, works of art or textbook-perfect sketches. But simple drawings or summary diagrams that capture information.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"147:T5c3,\u003cp\u003eFollowing historic human achievements in steam power, electricity, and digital information, Robotics is now considered by many to be the fourthindustrial revolution. This course explores robotics not simply as advanced technology, but as a new scientific discipline that can lead to a deeper understanding of human behavior.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThe course begins with an explanation of\u003c/strong\u003e \u003cstrong\u003ewhat it means to simulate humans and societies\u003c/strong\u003e , what potential advantages there may be, and the progress that has been madethus far.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThe course follows this general introduction with specific simulations that reproduce human behavioral development\u003c/strong\u003e ; \u003cstrong\u003eexploring the relationship between the cognitive, motivational, and emotional aspects of behavior\u003c/strong\u003e. These simulations also delve into the critical, nuanced concepts including: individual differences, language, thinking, social behavior, differences between men and women, the nature and role of family, possession and wealth, exchange of goods, the emergence of currency and organization for the production of goods, the economic and political role of the State, and historical phenomena.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eThe final part of the course investigates the social utility of simulations when they are translated into digital environments\u003c/strong\u003e. This section utilizes a user-friendly and motivating interface that enables anyone tobetter understand the world in whichwe live.\u003c/p\u003e148:T5dc,\u003cp\u003eAt multiple points in your professional life, a technology tool you are responsible for building will fail. There are a million reasons why these things happen, but failed systems aren’t failures. They are delayed successes. This final course will go through the process to help you digest what went wrong, and how to course correct. \u003c/p\u003e\n\u003cp\u003eWe will start with strategies to evaluate where things failed. You need to know how to react when users say everything is broken. The first response is usually frustration. Which while understandable, isn’t"])</script><script>self.__next_f.push([1," productive. You will learn strategies for user engagement and bringing them into the fold for the development process. \u003c/p\u003e\n\u003cp\u003eYou will learn how to engage with users. Listening is critical for success but how you show them you are listening is part of the art form. \u003c/p\u003e\n\u003cp\u003eOnce you have heard from your users, get them talking to each other. Facilitate a user community to get support for your platform rollout. This will ultimately lead to increased adoption.\u003c/p\u003e\n\u003cp\u003eAfter you have tried everything, we will show you how to determine if anything is salvageable, and decide how to move forward. That may mean a new Platform. We’ll show you how to get the most out of a bad situation. You’re not starting over, but you are starting again with more information and understanding of your business, your users, and your platform needs. Knowing how to close a failed platform implementation is an important Product Platform Managers skill.\u003c/p\u003e149:T593,\u003cp\u003eBuilding Information Modeling (BIM) has initiated a sea change in the way that engineers approach the design and construction of buildings. Autocad, and 2D-centric methods in general, have been pushed aside to make way for 3D-centric workflows and design processes rooted in parametric modeling, interoperability, visualization, Work-sharing, and automation that leverage the latest advancements in computing technology. Advanced 3D modeling programs (including Autodesk Revit and others), simulations, augmented reality, virtual reality, and other technologies have presented design professionals and project teams with new opportunities to maximize design the efficiency, functionality, and performance of buildings, to streamline and optimize design and construction operations, to study building lifecycles, and to help mitigate the impact of buildings on the environment. \u003c/p\u003e\n\u003cp\u003eHowever, as the AEC industry rapidly evolves by adopting BIM workflows, the educational system has been slow to respond. There is an ever-widening gap between the traditional engineering curriculum and the "])</script><script>self.__next_f.push([1,"skills that students need when they graduate. This course will fill that gap by not only broadly introducing students to Virtual Design and BIM, but will introduce students to Autodesk Revit with future courses developed specifically for Structural Engineers, MEP Engineers, Fire Protection Engineers, and Construction Engineers.\u003c/p\u003e14a:T466,\u003cp\u003eBuilding Information Modeling (BIM) has initiated a sea change in the way that buildings are designed and constructed. Old methods rooted in two-dimensional thinking have been pushed aside to make way for new three-dimensional approaches that leverage the latest advancements in computing technology. Advanced 3D modeling programs, augmented reality, virtual reality, and other technologies have presented design professionals with new opportunities to maximize the efficiency and performance of buildings, streamline and optimize construction operations, and to help mitigate the impact of buildings on the environment. \u003c/p\u003e\n\u003cp\u003eHowever, as the AEC industry continues to evolve, the educational system has been slow to respond. There is an ever-widening gap between the traditional engineering curriculum and the skills that students need when they graduate. This program will fill that gap by not only broadly introducing students to Virtual Design and Building Information Modeling, but providing specific VDC applications for Structural Engineers, MEP Engineers, Fire Protection Engineers, and Construction Engineers\u003c/p\u003e14b:T4ac,\u003cp\u003eThis the final capstone course in the Instructional Design and Technology MicroMasters program where we delve into evaluation of course design and develop your final capstone project. Evaluation models allow instructional designers to engage in continuous improvement of course design to optimize the student learning environment. During this course we will explore evaluations models, learning management system’s data analytics, and Kirkpatrick’s Levels of evaluation. Finally, you will design, build and publish your capstone project, which is an online learnin"])</script><script>self.__next_f.push([1,"g module.\u003c/p\u003e\n\u003cp\u003eThis is the final course in the Instructional Design and Technology MicroMasters and content builds on the first three courses in the program. It is highly recommended that learners complete the three pre-requisite courses prior to enrolling in LDT400x.\u003c/p\u003e\n\u003cp\u003eThis course is part of the Instructional Design and Technology MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Learning Design and Technology. See the MicroMasters program page for more information.\u003c/p\u003e14c:T8f7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEnhance Patient Care with the Stanford Presence 5 Model. Modern technology has transformed healthcare, but it has also created barriers to meaningful patient connections. Strong communication and humanism in medicine are essential for delivering high-quality, patient-centered care. \u003c/p\u003e\n\u003cp\u003eThis online CME/CE course introduces the Stanford Presence 5 model, a proven framework for enhancing clinician-patient interactions. Through practical strategies and real-world applications, you’ll learn how to build trust, improve patient outcomes, and foster deeper connections in your daily practice.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWho Should Take This Course\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ePhysicians, nurses, and healthcare professionals seeking to strengthen patient relationships\u003c/li\u003e\n\u003cli\u003eClinicians looking to improve communication skills and bedside manner\u003c/li\u003e\n\u003cli\u003eProviders aiming to integrate humanism into modern medical practice\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho is Eligible for CME/CE Credits and Certificates\u003c/strong\u003e\u003ca href=\"https://med.stanford.edu/cme.html\"\u003e\u003c/p\u003e\n\u003cp\u003eStanford Center for Continuing Medical Education\u003c/a\u003e offers accredited continuing education for interprofessional healthcare team members, especially clinicians (i.e., physicians, nurses, physician assistants, etc.). Be sure to check the accreditation and credit designation stated on the activity page to view the credit type and amount awarded for your profession.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAccreditation\u003c/strong\u003e\u003cbr /\u003e\nIn support of improving patient care, Stanford Medicine is jointly accredited by the Accreditation Council for Continuing Medical Education (ACCME), the Accreditation Council for Pharmacy Education (ACPE), and the American Nurses Credentialing Center (ANCC), to provide continuing education for the healthcare team. \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCredit Designation\u003cbr /\u003e\nAmerican Medical Association (AMA)\u003c/strong\u003e\u003cbr /\u003e\nStanford Medicine designates this Enduring Material for a maximum of 0.25 \u003cem\u003eAMA PRA Category 1 Credits TM\u003c/em\u003e. Physicians should claim only the credit commensurate with the extent of their participation in the activity. \u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://stanford.cloud-cme.com/course/courseoverview?P=0\u0026EID=52841\" rel=\"noopener\" target=\"_blank\" title=\"(opens in a new window)\"\u003eClick here\u003c/a\u003e for more CME/CE credit information.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"14d:T8b7,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAs healthcare systems rapidly scale up telemedicine to reduce infection risks during the pandemic, many outpatient visits are now conducted virtually. While this technology provides safety, it can also create a digital barrier to the human connection that is central to effective patient care.\u003c/p\u003e\n\u003cp\u003eThis CME/CE course covers strategies to maintain humanism and foster meaningful connection during virtual visits, guided by the Presence 5 model. Learn how to enhance patient engagement, build trust, and ensure compassionate care in a digital setting.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWho Should Take This Course\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003ePhysicians, nurse practitioners, and physician assistants using telemedicine in outpatient care\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eHealthcare providers looking to improve their virtual patient interactions\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eClinicians seeking to maintain compassionate care in a telehealth environment\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eWho is Eligible for CME/CE Credits and Certificates\u003c/strong\u003e\u003ca href=\"https://med.stanford.edu/cme.html\"\u003e\u003c/p\u003e\n\u003cp\u003eStanford Center for Continuing Medical Education\u003c/a\u003e offers accredited continuing education for interprofessional healthcare team members, especially clinicians (i.e., physicians, nurses, physician assistants, etc.). Be sure to check the accreditation and credit designation stated on the activity page to view the credit type and amount awarded for your profession.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAccreditation\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eIn support of improving patient care, Stanford Medicine is jointly accredited by the Accreditation Council for Continuing Medical Education (ACCME), the Accreditation Council for Pharmacy Education (ACPE), and the American Nurses Credentialing Center (ANCC), to provide continuing education for the healthcare team.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCredit Designation\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAmerican Medical Association (AMA)\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eStanford Medicine designates this Enduring Material for a maximum of 0.25 AMA PRA Category 1 CreditsTM. Physicians should claim only the credit commensurate with the extent of their participation in the activity.\u003ca href=\"https://stanford.cloud-cme.com/course/courseoverview?P=0\u0026EID=52837\"\u003e\u003c/p\u003e\n\u003cp\u003eClick here\u003c/a\u003e for more CME/CNE Information.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"14e:T59b,\u003cp\u003eThe diagnoses of mental health conditions are increasing worldwide. While a significant amount of work is being done to integrate mental health into primary healthcare, there are various issues inhibiting our ability to secure the necessary resources and policies for implementing effective strategies to address the state of mental health. Having accurate information regarding the signs, symptoms, and available management options is a crucial requirement for understanding, managing, and destigmatising mental health conditions.\u003c/p\u003e\n\u003cp\u003eGain the knowledge and tools to promote both your own mental health and the well-being of those around you on this course from UCT. You’ll explore the key facts of mental health conditions, including depressive disorder, anxiety disorders, bipolar disorder, psychotic disorders, and substance use disorders, and learn how to approach individuals at risk of suicide. You’ll also engage in practical exercises that promote greater self-awareness and enhanced compassion for yourself and others. Guided by A/Prof Goodman Sibeko, Director of the International technology Transfer Centre - South Africa at UCT, and clinical psychologist Nurain Tisaker, you’ll discover how to become a ‘guide on the side’ to support others experiencing mental health challenges, and develop a personalized mental health toolkit to amplify the impact you can have on your community and broader context.\u003c/p\u003e14f:Tacb,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eThis course explains why science communication is important and what it looks like in practice. It also teaches you the basic concepts and fundamental skills you need to master science communication yourself. The course explores research-based, practical ideas and inspiring stories from the field based on conversations with over fifty expert interviewees \u003c/span\u003e\u003cspan lang=\"HE\"\u003eworldwide\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e, including best-selling popular science authors and leading science communication researchers. Our list of over 50 distinguished experts includes:\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Prof. Neil Shubin, paleontologist, evolutionary biologist\u003c/span\u003e\u003cspan lang=\"HE\"\u003e,\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e and author of \u003cem\u003eYour Inner Fish\u003c/em\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Dr. Simon Singh, physicist\u003c/span\u003e\u003cspan lang=\"HE\"\u003e,\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e and author of \u003cem\u003eFermat's Last Theorem\u003c/em\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Clare Matterson, Former Director of Engagement at the Natural History Museum, London\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Prof. Bruce Lewenstein, an early member of the science communication scholarly community and former editor of \u003cem\u003ePublic Understanding of Science\u003c/em\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Prof. Baruch Fischhoff, a world-renowned authority on risk communication and member of the U.S. National Academy of Sciences, and\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e Dr. Keren Landsman, physician-epidemiologist and author of fantasy novel \u003cem\u003eThe Heart of the Circle\u003c/em\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eWho would benefit from this course?\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e scientists, STEM professionals, and graduate students in STEM and science communication; \u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e teachers and informal science educators; \u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e science communicators, including journalists, public information officers, museum curators, and other content producers;\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e anyone seeking to develop their science communication skillset to advance their career; and\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"EN-US\"\u003e anyone interested in the relationship between science and society in the 21st century.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAfter completing the readings, watching over 20 hours of video, and working on your assignments – including your very own interview with a scientist – you will be well on your way to becoming an effective science communicator. If you are interested in advancing your career, you'll have a portfolio to showcase your skills in science communication upon completing the course.\u003c/p\u003e\n\u003cp\u003eThe online learning modules were developed following a course taught for over a decade at the Technion – Israel Institute of Technology by Professor Ayelet Baram-Tsabari.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"150:Ta57,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCheck Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Introduction\u003c/p\u003e\n\u003cp\u003e2. Installation\u003c/p\u003e\n\u003cp\u003e3. WebUI Overview\u003c/p\u003e\n\u003cp\u003e4. Out-of-the-Box State\u003c/p\u003e\n\u003cp\u003e5. Policy Customization\u003c/p\u003e\n\u003cp\u003e6. Smart Accel\u003c/p\u003e\n\u003cp\u003e7. VoIP Wizard\u003c/p\u003e\n\u003cp\u003e8. Local Management\u003c/p\u003e\n\u003cp\u003e9. Centrally Managed\u003c/p\u003e\n\u003cp\u003e10. SMP\u003c/p\u003e\n\u003cp\u003e11. Active Directory Sync\u003c/p\u003e\n\u003cp\u003e12. Threat Prevention\u003c/p\u003e\n\u003cp\u003e13. SSL Inspection\u003c/p\u003e\n\u003cp\u003e14. Configure Interface\u003c/p\u003e\n\u003cp\u003e15. Configure Wireless Networks\u003c/p\u003e\n\u003cp\u003e16. Enable cellular\u003c/p\u003e\n\u003cp\u003e17. Reach My Device\u003c/p\u003e\n\u003cp\u003e18. Reuse Token\u003c/p\u003e\n\u003cp\u003e19. Configure Watchtower\u003c/p\u003e\n\u003cp\u003e20. Automatic and Manual Upgrade\u003c/p\u003e\n\u003cp\u003e21. Site-to-Site VPN\u003c/p\u003e\n\u003cp\u003e22. Remote Access VPN\u003c/p\u003e\n\u003cp\u003e23. Monitoring\u003c/p\u003e\n\u003cp\u003e24. Troubleshooting Overview\u003c/p\u003e\n\u003cp\u003e25. Backup and Restore\u003c/p\u003e\n\u003cp\u003e26. Configure OSPF\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCheck Point Company Overview\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one-point-of-control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e\n\u003cp\u003eWith Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile, and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.\u003c/p\u003e\n\u003cp\u003eWith over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to allow better experiences in a safer digital world.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"151:T4d1,\u003cp\u003eCheck Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Introduction\u003c/p\u003e\n\u003cp\u003e2. Installation\u003c/p\u003e\n\u003cp\u003e3. WebUI Overview\u003c/p\u003e\n\u003cp\u003e4. Out-of-the-Box State\u003c/p\u003e\n\u003cp\u003e5. Policy Customization\u003c/p\u003e\n\u003cp\u003e6. Smart Accel\u003c/p\u003e\n\u003cp\u003e7. VoIP Wizard\u003c/p\u003e\n\u003cp\u003e8. Local Management\u003c/p\u003e\n\u003cp\u003e9. Centrally Managed\u003c/p\u003e\n\u003cp\u003e10. SMP\u003c/p\u003e\n\u003cp\u003e11. Active Directory Sync\u003c/p\u003e\n\u003cp\u003e12. Threat Prevention\u003c/p\u003e\n\u003cp\u003e13. SSL Inspection\u003c/p\u003e\n\u003cp\u003e14. Configure Interface\u003c/p\u003e\n\u003cp\u003e15. Configure Wireless Networks\u003c/p\u003e\n\u003cp\u003e16. Enable cellular\u003c/p\u003e\n\u003cp\u003e17. Reach My Device\u003c/p\u003e\n\u003cp\u003e18. Reuse Token\u003c/p\u003e\n\u003cp\u003e19. Configure Watchtower\u003c/p\u003e\n\u003cp\u003e20. Automatic and Manual Upgrade\u003c/p\u003e\n\u003cp\u003e21. Site-to-Site VPN\u003c/p\u003e\n\u003cp\u003e22. Remote Access VPN\u003c/p\u003e\n\u003cp\u003e23. Monitoring\u003c/p\u003e\n\u003cp\u003e24. Troubleshooting Overview\u003c/p\u003e\n\u003cp\u003e25. Backup and Restore\u003c/p\u003e\n\u003cp\u003e26. Configure OSPF\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e152:T591,\u003cp\u003eDid you know your best opportunities for growth may not lie solely in developing new \u0026ldquo;blockbuster\u0026rdquo; products or services? They may instead be found by focusing on your existing best customers \u0026mdash; and finding new customers with similar behavioral tendencies. Created by Professor Peter Fader, a world-renowned thought leader on marketing analytics and co-founder of Zodiac, a predictive analytics solution built on the breakthrough consumer behavior models developed by Professor Fader, this marketing course is designed to help you identify your most valuable customers and maximize their strategic value.\u003c/p\u003e\r\n\u003cp\u003eYou might have the data and the technology to track your best customers, but how can you meaningfully differentiate them from the rest? How do you align your operati"])</script><script>self.__next_f.push([1,"ons around them? And how do you create and sustain competitive advantages from such practices? In this course, you\u0026rsquo;ll radically rethink how you develop and implement customer-centric strategies that you can apply to your existing customers today. You\u0026rsquo;ll also gain valuable insights into how to apply performance metrics and rethink product development processes in order to meet the needs of your most valuable customers.\u003c/p\u003e\r\n\u003cp\u003e\u003cem\u003eThis course is part of Wharton's Digital Marketing Professional Certificate. For more information, \u003ca href=\"https://www.edx.org/digital-marketing-professional\"\u003esee here\u003c/a\u003e.\u003c/em\u003e\u003c/p\u003e153:T926,"])</script><script>self.__next_f.push([1,"\u003cp\u003eI sondaggi sono diventati un elemento centrale della cassetta degli attrezzi degli attori della politica e dell'informazione. Questo corso offre un viaggio all'interno del mondo dei sondaggi, nel modo in cui sono stati usati nel tempo, per riscoprire il loro valore principale di strumento della democrazia e per eliminare i rischi di un utilizzo distorto dei sondaggi. Gli insuccessi incassati negli ultimi anni dagli exit polls hanno contribuito a rilanciare il dibattito sull’attendibilità e l’utilità dello strumento sondaggistico. \u003c/p\u003e\n\u003cp\u003eIl corso si propone di mettere ordine nella discussione, chiarendo, in particolare: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ecosa è un sondaggio e cosa non lo è;\u003c/li\u003e\n\u003cli\u003equali sono le modalità di realizzazione dei sondaggi e le problematiche ad esse connesse;\u003c/li\u003e\n\u003cli\u003equali sfide sono messe in campo dalla diffusione delle nuove tecnologie dell'informazione;\u003c/li\u003e\n\u003cli\u003ein che misura i cambiamenti in atto nel quadro politico e nella composizione dell'elettorato condizionano il lavoro dell'analista dell'opinione pubblica;\u003c/li\u003e\n\u003cli\u003ein che modo si può ragionare sull'uso pubblico dei sondaggi d'opinione;\u003c/li\u003e\n\u003cli\u003equali sono i rischi reali della sondocrazia e quali le potenzialità legate all'uso governativo dei sondaggi.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eThe power of opinion polls\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eOpinion polls play a central role in politics and information. This course explores the world of opinion polls and how they are used, to discover their value as tools for democracy and to reduce the risk of survey results being wrongly used. Failure on the part of exit polls in recent elections has contributed to renewed debate on their reliability and usefulness. \u003c/p\u003e\n\u003cp\u003eThis course aims to shed light on this debate, explaining, in particular: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ewhat a poll is, and what it is not\u003c/li\u003e\n\u003cli\u003ehow opinion polls are carried out\u003c/li\u003e\n\u003cli\u003ewhat the related problems and issues are\u003c/li\u003e\n\u003cli\u003ewhat are the main challenges posed by new information technologies\u003c/li\u003e\n\u003cli\u003eto what extent do current changes in the political environment and in the composition of the electorate affect the work of public opinion analysts\u003c/li\u003e\n\u003cli\u003ewhat are the main issues surrounding the use of opinion polls\u003c/li\u003e\n\u003cli\u003ewhat are the real risks and potential benefits related to the use of opinion polls at the level of government\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"154:T6fd,\u003cp\u003eThis course is part 2 of the series of Quantum computing courses, which covers aspects from fundamentals to present-day hardware platforms to quantum software and programming.\u003c/p\u003e\n\u003cp\u003eThe goal of part 2 is to provide the essential understanding of how the fundamental quantum phenomena discussed in part 1 can be realized in various material platforms and the underlying challenges faced by each platform. To this end, we will focus on how quantum bits (qubits, the building block of quantum information processing) can be defined in each platform, how such qubits are manipulated and interconnected to form larger systems, and the sources of errors in each platform.\u003c/p\u003e\n\u003cp\u003eWith an emphasis on present-day leading candidates, we will discuss following specific quantum material platforms:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eSuperconductor-based\u003c/li\u003e\n\u003cli\u003eAtom/ion traps-based\u003c/li\u003e\n\u003cli\u003eSpin-based\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe material will appeal to engineering students, natural sciences students, and professionals whose interests are in using and developing quantum information processing technologies.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAttention:\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003eQuantum Computing 1: Fundamentals\u003c/em\u003e is an essential prerequisite to \u003cem\u003eQuantum Computing 2: Hardware\u003c/em\u003e \u003cstrong\u003eand\u003c/strong\u003e \u003cem\u003eQuantum Computing 3: Algorithm and Software\u003c/em\u003e. Learners should plan to complete Fundamentals (1) before enrolling in the Hardware (2) or the Algorithm and Software (3) courses.\u003c/p\u003e\n\u003cp\u003eAlternatively, learners can enroll in courses 2 or 3 if they have solid experience with or knowledge of quantum computing fundamentals, including the following: 1) postulates of quantum mechanics; 2) gate-based quantum computing; 3) quantum errors and error correction; 3) adiabatic quantum computing; and 5) quantum applications and NISQ-era.\u003c/p\u003e155:T5cc,\u003cp\u003eDigital Agricultural Technologies (DATs) are innovations that enable farmers and agribusiness entrepreneurs to leapfrog to increase their productivity, efficiency, and competitiveness, facilitate access to markets, improve nutritional out"])</script><script>self.__next_f.push([1,"comes and enhance resilience to climate change. These technologies range from mobile apps to digital identities for farmers to solar applications for agriculture to portable agriculture devices. DATs are increasingly becoming indispensable in the global food and agriculture sector, from fast and convenient information delivery to providing virtual marketplaces. Considering the fact that digital technologies can accelerate agro-food outcomes is juxtaposed with low adoption rates of the same, the World Bank’s operations are increasingly incorporating digital agriculture as a critical element in its operations. Thus, it is important to study digital agriculture technologies in further detail.\u003c/p\u003e\n\u003cp\u003eThis five-week course will provide a high-level overview of DAT concepts, potential impact, range of technologies available, used cases as well as forward-looking technologies. The course will introduce the participants to different agriculture data platforms already available and will encourage them to discover the scope and utility of the open data platforms for analytics and intelligence in agriculture. Participants will be required to engage in discussion forums with their peers and complete quizzes throughout the course.\u003c/p\u003e156:T774,\u003cp\u003eIl corso ha come obiettivo la presentazione delle basi logico/matematiche della elaborazione automatica dell’Informazione e la presentazione delle tecnologie dell’Informatica e delle Telecomunicazioni. La teoria dell’informazione, elaborata da Shannon, è esaminata in tutti i suoi aspetti. Si approfondiranno i concetti di base relativi al Sistema Operativo con riferimento a Windows e alle Graphical User Interfaces. Sono illustrate poi attività di programmazione procedurale e la programmazione Object Oriented in relazione al Coding. Si introducono poi, le reti di calcolatori e gli impianti di trasmissione con attenzione per le reti telematiche nelle forme di Reti Locali, Geografiche e rete Internet. Il World Wide Web è descritto con l’introduzione del protocollo HTTP e dell"])</script><script>self.__next_f.push([1,"a sua applicazione con i servizi web: HTML e CSS. Si descrivono poi in dettaglio Content Management Systems come Wiki e Wordpress. Il corso si conclude con le Reti Sociali e una panoramica sul futuro di internet.\u003c/p\u003e\n\u003cp\u003eThe aim of this course is to present the mathematical/logic basis underpinning automatic elaboration of Information and to introduce computing and telecommunications technologies. Shannon’s Information theory is first introduced as well as the basic concepts behind computer systems organisation, operating systems and Graphical User Interfaces. Learners then explore procedural programming and Object Oriented programming as major approaches to coding. Computer networks and transmission systems are then presented, focusing on telematic networks at the local, geographic and Internet level. The World Wide Web is described with the introduction of the HTTP protocol and its application in web services: HTML and CSS. Content Management Systems like Wiki and Wordpress are described in detail and the course concludes with Social Networks and an overview of the future of the Internet.\u003c/p\u003e157:T8b6,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAgri-Food systems are at the heart of at least 12 of the 17 United Nations’ 2030 Sustainable Development Goals (SDG). The wide scope of the SDGs call for holistic approaches that integrate previously “siloed” food sustainability assessments. It recognizes that these systems cut across ethical, social, economic, political, environmental, and ecological issues that cannot be addressed independently. \u003c/p\u003e\n\u003cp\u003eFood systems have evolved into highly complex supply chains, where changes due to new policies, products, or technologies can have diverse and unanticipated repercussions. To be effective, learners will understand the need of a country-level collaboration among different ministries—finance, commerce, agriculture, health, environment, etcetera—and across countries affected by common problems. Learners will consider in an agri-food systems analysis the current or future sustainability status, detecting trade-offs across different economic, environmental, and social elements, and considering serious realities while offering a tractable way forward for policy and decision makers. \u003c/p\u003e\n\u003cp\u003eLearners will recognize the food system as a supply chain that is managed by diverse actors with competing interests and goals. Along the way, the management of the food system is shaped by changes in natural resources, markets, policies, technologies, organizations, and information. \u003c/p\u003e\n\u003cp\u003eLearners will investigate the ecosystem and biodiversity impacts of food systems that include other drivers that come from outside the food system, such as lifestyle changes, health care policies, energy policies, cross-border atmospheric deposition of nitrogen, or nonfood employment opportunities. Learners explore economically invisible impacts, together with their impacts on human health, global climate change, and community livelihoods to provide economic and social importance so that policymakers and business leaders recognize and respond appropriately. The global society is accustomed to managing what gets analyzed, measured, and valued. Analysis and valuation is a must, because without it, human responses are either muted or missing, be they policy responses, business responses, or citizens responses.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"158:T41f,\u003cp\u003eBy the end of this course, successful students will be able to \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eExplain the need for a country-level collaboration among various agencies in finance, commerce, agriculture, health, and environmental protection.\u003c/li\u003e\n\u003cli\u003eDiscuss the complexity and impact of changes in policies, business practices, and technologies have on global food systems and food supply chains.\u003c/li\u003e\n\u003cli\u003eEvaluate how global food system and supply chains are affected by diverse participants with conflicting interests.\u003c/li\u003e\n\u003cli\u003eAnalyze how individual’s lifestyles, international business operations, policies of health care, energy, and food, environmental changes, and so on impact global food systems’ biodiversity and ecosystem.\u003c/li\u003e\n\u003cli\u003eExplore not only economic but also social and environmental impacts from global business practices on individuals, communities, and society. \u003c/li\u003e\n\u003cli\u003eAssess how the sustainability of agriculture and food systems are evaluated and measured, and explore solutions to economic, social, and environmental problems.\u003c/li\u003e\n\u003c/ul\u003e159:T5c6,\u003cp\u003eInformation Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back.\u003c/p\u003e\n\u003cp\u003eIn this course, which is the second part of the \u003ca href=\"https://www.edx.org/professional-certificate/israelx-unlocking-information-security\"\u003eUnlocking Information Security program\u003c/a\u003e, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.\u003c/p\u003e\n\u003cp\u003eWith all this in mind, you will take a deep survey of the world wide web; understa"])</script><script>self.__next_f.push([1,"nd the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry.\u003c/p\u003e\n\u003cp\u003eThis course was produced at \u003ca href=\"https://english.tau.ac.il/\"\u003eTel Aviv University\u003c/a\u003e by \u003ca href=\"https://en-tauonline.tau.ac.il/\"\u003eTAU Online\u003c/a\u003e - learning innovation center.\u003c/p\u003e15a:T7a3,\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003cbr /\u003e\n1. Intro\u003cbr /\u003e\n2. Installing Gaia\u003cbr /\u003e\n3. Running the First Time Wizard.\u003cbr /\u003e\n4. Installing SmartConsole\u003cbr /\u003e\n5. Establish SIC\u003cbr /\u003e\n6. Create \u0026amp; installing Policy\u003cbr /\u003e\n7. Enable application control blade\u003cbr /\u003e\n8. Enable IDA blade\u003cbr /\u003e\n9. Enable HTTPS Inspection\u003cbr /\u003e\n10. Enable Autonomous Threat Prevention\u003cbr /\u003e\n11. Adding License\u003cbr /\u003e\n12. CPUSE SmartConsole\u003cbr /\u003e\n13. Gathering cpinfo\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT, and remote users.\u003c/p\u003e\n\u003cp\u003eCheck Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN, and IOT security to protect you against the most sophisticated cyber-attacks.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware"])</script><script>self.__next_f.push([1,", ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e15b:T7a3,\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003cbr /\u003e\n1. Intro\u003cbr /\u003e\n2. Installing Gaia\u003cbr /\u003e\n3. Running the First Time Wizard.\u003cbr /\u003e\n4. Installing SmartConsole\u003cbr /\u003e\n5. Establish SIC\u003cbr /\u003e\n6. Create \u0026amp; installing Policy\u003cbr /\u003e\n7. Enable application control blade\u003cbr /\u003e\n8. Enable IDA blade\u003cbr /\u003e\n9. Enable HTTPS Inspection\u003cbr /\u003e\n10. Enable Autonomous Threat Prevention\u003cbr /\u003e\n11. Adding License\u003cbr /\u003e\n12. CPUSE SmartConsole\u003cbr /\u003e\n13. Gathering cpinfo\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT, and remote users.\u003c/p\u003e\n\u003cp\u003eCheck Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN, and IOT security to protect you against the most sophisticated cyber-attacks.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security arc"])</script><script>self.__next_f.push([1,"hitecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e15c:T8b1,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"15d:T60f,\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e15e:T8b1,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Mobile is the first mobile threat solution among the industry's top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile-related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. Harmony Mobile leverages Check Point's ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.\u003c/p\u003e\n\u003cp\u003eThis course includes these modules:\u003c/p\u003e\n\u003cp\u003e1. Course Introduction\u003c/p\u003e\n\u003cp\u003e2. Introduction to Harmony Mobile\u003c/p\u003e\n\u003cp\u003e3. Harmony Mobile architecture\u003c/p\u003e\n\u003cp\u003e4. Harmony Mobile deployment - with UEM (part1)\u003c/p\u003e\n\u003cp\u003e5. Harmony Mobile deployment - with UEM (part2)\u003c/p\u003e\n\u003cp\u003e6. Harmony Mobile direct deployment\u003c/p\u003e\n\u003cp\u003e7. Harmony Mobile Security Policy configuration\u003c/p\u003e\n\u003cp\u003e8. Harmony Mobile dashboard and forensics\u003c/p\u003e\n\u003cp\u003e9. Adding HM into Mobile Intune\u003c/p\u003e\n\u003cp\u003e10. Configure HM in Intune for IOS\u003c/p\u003e\n\u003cp\u003e11. Configure HM in Intune for Android\u003c/p\u003e\n\u003cp\u003e12. Adding compliance policies for the groups\u003c/p\u003e\n\u003cp\u003e13. Creating Groups for HM\u003c/p\u003e\n\u003cp\u003e14. Zero-touch deployment for Android devices\u003c/p\u003e\n\u003cp\u003e15. Zero-touch deployment for IOS devices\u003c/p\u003e\n\u003cp\u003e16. Adding HM certification into Intune\u003c/p\u003e\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"15f:T708,\u003cp\u003eLos automóviles eléctricos son más que un medio novedoso de movilidad. Han sido reconocidos como un elemento esencial de la transición energética. Cumplir su promesa implicará un cambio significativo en las dimensiones técnicas, digitales y sociales de la infraestructura de transporte y energía. Si desea explorar las oportunidades comerciales que ofrece este nuevo mercado, éste es el curso para usted.\u003c/p\u003e\n\u003cp\u003eEste curso explica cómo la movilidad eléctrica puede funcionar para varias empresas, incluyendo la administración de flotas, la fabricación de automóviles y la provisión de infraestructura de carga. Los expertos de TU Delft, junto con otros institutos de conocimiento y compañías en los Países Bajos, proporcionarán información y ejemplos de cómo las innovaciones han afectado los negocios convencionales y creado negocios completamente nuevos. Esto se explicará a través de varios conceptos y modelos, incluidos los modelos de costo total de propiedad, lean mass production (producción esbelta en masa), value chain thinking (pensamiento en la cadena de valor) e integración de negocios.\u003c/p\u003e\n\u003cp\u003eLuego de completar este curso, podrá crear modelos comerciales de movilidad eléctrica y desarrollar una nueva estrategia para su empresa que incluya la transición a o la incorporación de la movilidad eléctrica.\u003c/p\u003e\n\u003cp\u003eEl curso incluye video conferencias, presentaciones y ejercicios, todos ilustrados con estudios de casos reales, de proyectos que se implementaron en los Países Bajos.\u003c/p\u003e\n\u003cp\u003eEste curso fue desarrollado conjuntamente con el Centro Holandés de Innovación para el Transporte Eléctrico por Carretera (Dutch-INCERT) y es impartido por expertos tanto de la industria como del mundo académico, que comparten sus conocimientos y opiniones.\u003c/p\u003e160:T806,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHarmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.\u003c/p\u003e\n\u003cp\u003eWith remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.\u003c/p\u003e\n\u003cp\u003eCheck Point Harmony is the industry’s first unified security solution for users' devices and access.\u003cbr /\u003e\nIt protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.\u003c/p\u003e\n\u003cp\u003eThe course modules are:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eIntroduction\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-the Flow\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-Accessing the Endpoint Server\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Windows\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Linux\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Visibility\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Change Policy\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Upgrade\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Remove a client\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCommunication\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eCommunication-Port, Services, and URLs\u003c/li\u003e\n\u003cli\u003eExclusions\u003c/li\u003e\n\u003cli\u003eSummary\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eCheck Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"161:T564,\u003cp\u003eHarmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.\u003c/p\u003e\n\u003cp\u003eWith remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding.\u003c/p\u003e\n\u003cp\u003eCheck Point Harmony is the industry’s first unified security solution for users' devices and access.\u003cbr /\u003e\nIt protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications.\u003c/p\u003e\n\u003cp\u003eThe course modules are:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eIntroduction\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-the Flow\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eArchitecture-Accessing the Endpoint Server\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Windows\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Installing the Client on Linux\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Visibility\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Change Policy\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Upgrade\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDeployment-Remove a client\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCommunication\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eCommunication-Port, Services, and URLs\u003c/li\u003e\n\u003cli\u003eExclusions\u003c/li\u003e\n\u003cli\u003eSummary\u003c/li\u003e\n\u003c/ol\u003e\n\u003c/li\u003e\n\u003c/ol\u003e162:T79a,\u003cp\u003eWe have witnessed the power of mechanization in the early nineteen century, automation in the seventies, information and the internet in the last decades. But now, the adaptation of connected intelligence into the business and social fabrics is advancing at an astonishing speed, which will completely change the way we conduct business. \u003c/p\u003e\n\u003cp\u003eIn this course,we will discuss changes/predictions we forsee in the future, such as: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eThe credit card business will fade out gradually\u003c/li\u003e\n\u003cli\u003eAll currency will be bitcoin\u003c/li\u003e\n\u003cli\u003eWhereas traditional internet gives rise to digital divide, the mobile internet will narrow the wealth gap\u003c"])</script><script>self.__next_f.push([1,"/li\u003e\n\u003cli\u003eMost e-business models will become obsolete, leaving customer to factory (C2F)\u003c/li\u003e\n\u003cli\u003eNo more talents to hide except partners\u003c/li\u003e\n\u003cli\u003eMobile phones will be outdated and replaced by augmented virtual reality (AVR)\u003c/li\u003e\n\u003cli\u003eBig corporates will transform to big platforms\u003c/li\u003e\n\u003cli\u003eThe birth of real Internet economics\u003c/li\u003e\n\u003cli\u003eThe death of global manufacturing to networked and dispersed manufacturing\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course will explain how these changes will be brought about by the extensive use of digital intelligence, which will be available on mobile, internet, and pervasive computing as homes, offices and factories become a well knitted cyber-physical system. \u003c/p\u003e\n\u003cp\u003eEnabling tools such as Cloud Computing, Big Data, Internet of Things and Cyber Physical Systems are introduced. Automation, intelligence and collaborations are also discussed with particular reference to smart manufacturing, smart products/services and smart cities, and their opportunities and challenges. \u003c/p\u003e\n\u003cp\u003eThis is not a technical course; instead part of the focus is on organizational readiness, skills gaps and competencies for knowledge workers to fully leverage the power of Industry 4.0. \u003c/p\u003e\n\u003cp\u003eSuitable for learners from all disciplines and interested in the mega changes to our society.\u003c/p\u003e163:T514,\u003cp\u003eDigital Shield: Cybersecurity for Data and Systems Protection\" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems.\u003c/p\u003e\n\u003cp\u003eThis MOOC was created in collaboration with CYBERPRO Global, a leading international provider of cyber education programs with over a decade of experience in training security personnel and delivering large-scale technological projects. Its aim is to educate participants on the fundamental concepts of information security and cybersecurity, including techniques and tactics necessary to protect information and computer systems from potential threats.\u003c/p\u003e\n\u003cp\u003eParticipants will gain the ability to understand the basi"])</script><script>self.__next_f.push([1,"cs of information security, including identifying vulnerabilities and threats, preventing cyber attacks, and implementing security measures and controls. They will also learn the primary techniques used by cybersecurity professionals to protect computer systems.\u003c/p\u003e\n\u003cp\u003e\"Digital Shield: Cybersecurity for Data and Systems Protection\" provides the key concepts, skills, and knowledge necessary to effectively protect computer systems against cyber threats and ensures a strong foundational level to enhance education in the field of information security.\u003c/p\u003e164:T527,\u003cp\u003eI sistemi di database sono diventati fondamentali nei sistemi di gestione delle informazioni, contribuendo allo sviluppo di una società sempre più basata sulla conoscenza. Tutte le moderne applicazioni IT sfruttano un database per la memorizzazione, l'elaborazione e il recupero delle informazioni. Viene quindi presentato il linguaggio SQL per l'interazione con un database relazionale e vengono introdotti i problemi di progettazione dei sistemi che interagiscono con i database. Infine, le tecnologie dei moderni sistemi di database sono descritte utilizzando il DBMS Oracle.\u003c/p\u003e\n\u003cp\u003eDatabase Systems have become fundamental in information management systems, contributing to the development of an increasingly knowledge-based society. All modern IT applications now exploit a database for storing, processing and retrieving information. The course illustrates the basic concepts for understanding not only database models and their evolution, but also the principles of their conceptual, logical and physical design within so-called information systems. The SQL language for interaction with a relational database is then presented and the problems of designing systems that interact with databases are introduced. Finally, the technologies of modern database systems are described by using the Oracle DBMS.\u003c/p\u003e165:T4fe,\u0026ldquo;\u003cem\u003eWhere does geographical data come from?\u003c/em\u003e\u0026rdquo;\u003cbr /\u003e\u0026ldquo;\u003cem\u003eHow do we monitor our environment?\u003c/em\u003e\u0026rdquo;\u003cbr /\u003e\u0026ldquo;\u003cem\u003eHow do we na"])</script><script>self.__next_f.push([1,"vigate with our phones?\u003c/em\u003e\u0026rdquo;\u003cbr /\u003e\u0026ldquo;\u003cem\u003eWhat is happening beneath our feet?\u003c/em\u003e\u0026rdquo;\u003cbr /\u003e\u003cbr /\u003eThese are just some of the questions that crop up every so often as we wander around the streets of our urban metropolises. Many of the technologies we used, many of the decisions we made are based on spatial data, most of which are acquired from Geospatial Technologies. This data and the interpretation of the data is known as \u0026ldquo;Geo-Informatics\u0026rdquo;.\u003cbr /\u003e\u003cbr /\u003eIn this course, you will explore various technologies involved in Geo-Informatics, how the technologies help us to retrieve spatial data, and more importantly how the geographical data becomes the information used in decision making.\u003cbr /\u003e\u0026nbsp;\u003cbr /\u003eYou will explore the fields of Remote Sensing, Geographic Information Systems (GIS), Global Navigation Satellite Systems (GNSS) such as GPS, and Underground Mapping. Additionally, the concept of Smart City and the Urban Environment will be introduced to you. From this, you will gain an understanding of how these technologies help us to shape and understand the world that we are living in.166:T788,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eMapping\u003c/span\u003e and geotechnologies are an exciting way for you to put your interest and passion for all things about the Earth and the Environment into action in ways that are in demand in the workplace by nonprofit organizations, government agencies, academia, and private industry and incredibly relevant to our 21st Century world! \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAll 21st Century issues—water quality, inequalities, human health, habitat loss, energy, climate, natural hazards, invasive species, and many more—take place \u003cspan lang=\"EN-US\"\u003esomewhere\u003c/span\u003e. \u003cspan lang=\"EN-US\"\u003eThese issues, \u003c/span\u003eincluding the United Nations Sustainable Development Goals (SDGs) are global issues that increasingly affect our everyday lives, our society, and our environment. These issues often exhibit spatial patterns that can be mapped and analyzed and require the analysis of data in the form of"])</script><script>self.__next_f.push([1," 2D and 3D maps, aircraft and satellite imagery, real time data feeds from the Internet of Things, and much more. We have a dynamic planet with natural forces shaping what is on, under, and above the surface, along with 8 billion humans as change agents, and thus key to understanding our world as it was, is, and should be in the future is mapping and analyzing change over space and time!\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIn this course, through a series of readings, videos, and hands-on exercises covering a variety of social and environmental themes, issues, and scales, you will learn the fundamentals of exciting and dynamic mapping tools, including projections, symbology, classification, and analysis. You will build your own web mapping applications such as dashboards and multimedia story maps. You will collect and map your own field data. You will gain skills and confidence to empower you to be able to use maps as analytical tools to build a brighter, more sustainable, more resilient tomorrow!\u003c/p\u003e167:T6c8,\u003cp\u003eThis comprehensive course offers an in-depth exploration of geotechnologies and their role in addressing social and ecological challenges. Geotechnologies encompass a wide array of tools and techniques, including Geographic Information Systems (GIS), remote sensing through imagery from drones, aircraft, and satellites, and precise positioning using GPS or Global Navigation Satellite Systems.\u003c/p\u003e\n\u003cp\u003eStructured around a rich blend of academic readings, instructional videos, and practical exercises, the curriculum delves into various social and environmental topics across multiple scales. Participants will acquire a thorough understanding of cutting-edge mapping tools and techniques. This includes learning about map projections, the art and science of map symbology, the principles of classification, and sophisticated spatial analysis methods.\u003c/p\u003e\n\u003cp\u003eA significant focus of the course is on experiential learning. You will have the opportunity to develop your web mapping applications, including interactive dashboa"])</script><script>self.__next_f.push([1,"rds and multimedia story maps. Moreover, the program emphasizes fieldwork, allowing you to gather and integrate your field data into mapping projects.\u003c/p\u003e\n\u003cp\u003eBy the end of the course, you will have honed your skills in utilizing maps as powerful analytical instruments. This expertise will not only enhance your ability to interpret and present data effectively but also empower you to contribute to creating a brighter, more sustainable, and resilient future. The course is designed to instill confidence and proficiency in using geotechnologies, equipping you with the knowledge and tools to make informed decisions and to advocate for meaningful change in addressing the pressing challenges of our time.\u003c/p\u003e168:T53b,\u003col\u003e\n\u003cli\u003e\n\u003cp\u003eArticulate the relationship between maps and geotechnologies, what geotechnologies are, and why they are relevant to 21st-century issues and decision-making. \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eExplain and illustrate how maps are not simply reference documents but are analytical tools.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eExplain how maps help us to understand how things are \u003cstrong\u003eand\u003c/strong\u003e plan how things ought to be in the future (that is, for planning a more resilient, equitable, sustainable future).\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDescribe the main types of maps, understand map scale, map projections, and selected map elements (legends, orientation, source).\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eDescribe the major societal implications of geographic information and why they matter; that is, how society influences mapping and how mapping influences society.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCreate maps from spreadsheets and existing geographic information.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eSymbolize point, line, area, and image information on maps and classify information using various methods.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eFilter, generalize, and select geographic information on maps.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eCreate a web map from a field survey.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eUnderstand the major types of web mapping applications and communication methods: Dashboards, infographics, instant apps, and story maps.\u003c/p\u003e\n\u003c"])</script><script>self.__next_f.push([1,"/li\u003e\n\u003c/ol\u003e169:T6ea,\u003cp\u003eThis 2nd part of the Digital Earth series continues the journey of an in-depth exploration of geotechnologies and their role in addressing social and ecological challenges. Geotechnologies encompass a wide array of tools and techniques, including Geographic Information Systems (GIS), remote sensing through imagery from drones, aircraft, and satellites, and precise positioning using GPS or Global Navigation Satellite Systems.\u003c/p\u003e\n\u003cp\u003eStructured around a rich blend of academic readings, instructional videos, and practical exercises, the curriculum delves into various social and environmental topics across multiple scales. Participants will acquire a thorough understanding of cutting-edge mapping tools and techniques. This includes learning about map projections, the art and science of map symbology, the principles of classification, and sophisticated spatial analysis methods.\u003c/p\u003e\n\u003cp\u003eA significant focus of the course is on experiential learning. You will have the opportunity to develop your web mapping applications, including interactive dashboards and multimedia story maps. Moreover, the program emphasizes fieldwork, allowing you to gather and integrate your field data into mapping projects.\u003c/p\u003e\n\u003cp\u003eBy the end of the course, you will have honed your skills in utilizing maps as powerful analytical instruments. This expertise will not only enhance your ability to interpret and present data effectively but also empower you to contribute to creating a brighter, more sustainable, and resilient future. The course is designed to instill confidence and proficiency in using geotechnologies, equipping you with the knowledge and tools to make informed decisions and to advocate for meaningful change in addressing the pressing challenges of our time.\u003c/p\u003e16a:T6c8,\u003cp\u003eThis comprehensive course offers an in-depth exploration of geotechnologies and their role in addressing social and ecological challenges. Geotechnologies encompass a wide array of tools and techniques, including Geographic Information Systems (GI"])</script><script>self.__next_f.push([1,"S), remote sensing through imagery from drones, aircraft, and satellites, and precise positioning using GPS or Global Navigation Satellite Systems.\u003c/p\u003e\n\u003cp\u003eStructured around a rich blend of academic readings, instructional videos, and practical exercises, the curriculum delves into various social and environmental topics across multiple scales. Participants will acquire a thorough understanding of cutting-edge mapping tools and techniques. This includes learning about map projections, the art and science of map symbology, the principles of classification, and sophisticated spatial analysis methods.\u003c/p\u003e\n\u003cp\u003eA significant focus of the course is on experiential learning. You will have the opportunity to develop your web mapping applications, including interactive dashboards and multimedia story maps. Moreover, the program emphasizes fieldwork, allowing you to gather and integrate your field data into mapping projects.\u003c/p\u003e\n\u003cp\u003eBy the end of the course, you will have honed your skills in utilizing maps as powerful analytical instruments. This expertise will not only enhance your ability to interpret and present data effectively but also empower you to contribute to creating a brighter, more sustainable, and resilient future. The course is designed to instill confidence and proficiency in using geotechnologies, equipping you with the knowledge and tools to make informed decisions and to advocate for meaningful change in addressing the pressing challenges of our time.\u003c/p\u003e16b:Te6b,"])</script><script>self.__next_f.push([1,"\u003cp\u003eDo you love printed paper and wonder how much longer it will survive in the age of ebooks? Are you curious about how the mass-produced modern book emerged in the first place? Come behind the scenes in Harvard’s libraries to explore the look, feel and even smell of nineteenth-century British and American books in this module of \u003cem\u003eThe Book: Histories Across Time and Space.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eIn 19th-century Britain and America, schooling expanded, paper cheapened, and new technologies allowed print to reach wider audiences than ever before. After the rare and beautiful manuscripts and books showcased by earlier modules, the mass-produced, disposable objects that survive from the nineteenth century bear witness to the rise of the reading public.\u003c/p\u003e\n\u003cp\u003eThis module investigates what scholars know about nineteenth-century reading, as well as how they know it.\u003c/p\u003e\n\u003cp\u003eThis module’s six sections guide you through underlined, inscribed, defaced and repaired books in Harvard’s collections:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e1. Name That Book\u003c/strong\u003e\u003cbr /\u003e\nFind out what you can tell about a book when you’re blindfolded.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e2. Handheld Books and Mobile Readers\u003c/strong\u003e\u003cbr /\u003e\nWhat book did one soldier carry to Civil War battlefields in his pocket? (Hint: it’s not what you think.)\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e3. The Pen and the Needle\u003c/strong\u003e\u003cbr /\u003e\nDid 19th-century girls have to choose between sewing and reading? The holes pricked in one book suggest they did both at once.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e4. Leaving your Mark\u003c/strong\u003e\u003cbr /\u003e\nLuckily for future historians, these children didn’t listen when people told them not to write in their books.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e5. Detective Work\u003c/strong\u003e\u003cbr /\u003e\nTry out some tools that build on what you’ve learned about books at Harvard to discover the stories hidden in your local library.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e6. Over to You\u003c/strong\u003e\u003cbr /\u003e\nYour chance to share what you have found in the books around you.\u003c/p\u003e\n\u003cp\u003eJoin us, and discover how people in the first information age read, underlined, and repaired the pages that they treasured. \u003c/p\u003e\n\u003chr /\u003e\n\u003cp\u003eHarvardX requires individuals who enroll in its courses on edX to abide by the terms of the edX honor code. HarvardX will take appropriate corrective action in response to violations of the \u003ca href=\"https://www.edx.org/edx-terms-service\" title=\"Follow link\"\u003eedX honor code\u003c/a\u003e, which may include dismissal from the HarvardX course; revocation of any certificates received for the HarvardX course; or other remedies as circumstances warrant. No refunds will be issued in the case of corrective action for such violations. Enrollees who are taking HarvardX courses as part of another program will also be governed by the academic policies of those programs.\u003c/p\u003e\n\u003cp\u003eHarvardX pursues the science of learning. By registering as an online learner in an HX course, you will also participate in research about learning. Read our \u003ca href=\"http://harvardx.harvard.edu/research-statement\" title=\"Follow link\"\u003eresearch statement \u003c/a\u003eto learn more.\u003c/p\u003e\n\u003cp\u003eHarvard University and HarvardX are committed to maintaining a safe and healthy educational and work environment in which no member of the community is excluded from participation in, denied the benefits of, or subjected to discrimination or harassment in our program. All members of the HarvardX community are expected to abide by Harvard policies on nondiscrimination, including sexual harassment, and the edX Terms of Service. If you have any questions or concerns, please contact \u003ca href=\"mailto:harvardx@harvard.edu\"\u003eharvardx@harvard.edu\u003c/a\u003e and/or \u003ca href=\"https://www.edx.org/contact-us\" title=\"Follow link\"\u003ereport your experience through the edX contact form\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"16c:T582,\u003cp\u003e\u003cstrong\u003eThis course will be retired.\u003c/strong\u003e\u003c/p\u003e\r\n\u003cp\u003eHigh-quality information is the key to successful management of businesses. Despite the large quantity of data that is collected by organizations, managers struggle to obtain information that helps them make decisions. While \u003cem\u003eoperational processing\u003c/em\u003e systems help capture, store, and manipulate data to support day-to-day operations of organizations, \u003cem\u003ereconciled systems\u003c/em\u003e -- sometimes referred to as data warehouses or business intelligence (BI) systems -- support the analysis of data, thus, enabling decision making.\u003c/p\u003e\r\n\u003cp\u003eWith the advent of big data systems, organizations have turned to enterprise data management frameworks to manage and gain insights from the vast amount of data collected. While storage costs themselves are relatively affordable, the bigger challenge has been finding an appropriate mechanism to manage the data as many technologies (e.g., relational databases, data warehouses) have limitations on the amount of data that can be stored.\u003c/p\u003e\r\n\u003cp\u003eThis course focuses on realizing the business advantage and business potential of operational, reconciled, and big data systems as well as data assets in supporting enterprise data management strategies and enterprise data analytics.\u003c/p\u003e\r\n\u003cp\u003eVerified Learners will need to purchase a textbook in order to successfully complete the course. See the FAQ for details.\u003c/p\u003e16d:T693,\u003cp\u003eThe demand for software engineers doubled according to the “State of Software Engineers” report by the tech specialist Hired. Nearly every industry uses software to accelerate its growth, providing a vast number of opportunities. With the importance of software engineers and the technical skillset required, it isn’t surprising that according to Indeed.com, “The good starting software engineer salary in the US is considered to be $113,211 per year. Competitive starting salaries will vary depending on location and cost of living.”\u003c/p\u003e\n\u003cp\u003eThis course is suitable for anyone wanting to start in a software"])</script><script>self.__next_f.push([1," development related role, including those aspiring to be Software Engineers, IT Product and Project Managers, Scrum Masters, Information Developers, UI/UX Designers, QA Engineers, as well as Sales Executives, and Marketing Managers in the Tech industry. No prior programming experience or degree is required.\u003c/p\u003e\n\u003cp\u003eThis course teaches you about the power of the Software Development Lifecycle (SDLC) and software development methodologies such as Agile. You will explore fundamental programming principles and foundations of design, architecture, and deployment, investigate skills that a software engineer needs and identify job opportunities with hands-on projects. You will also learn about programming basics and software development tools and stacks.\u003c/p\u003e\n\u003cp\u003eThroughout this course, you’ll hear first-hand experiences from expert software engineers to geta feel for the job and their perspectives. After completing this introductory course, you will be familiar with the software engineering tools, technologies, terminology, processes, and practices.\u003c/p\u003e16e:T782,\u003cp\u003e\u003cspan lang=\"EN\"\u003eInformation security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eInformation security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEthical Hacking Essentials (EHE) is a security program coveri"])</script><script>self.__next_f.push([1,"ng the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eWhy is EHE Important?\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN\"\u003eIt facilitates your entry into the world of information security\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN\"\u003eIt provides a professional understanding of the concepts of information security\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN\"\u003eIt provides best practices to improve organizational security posture\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003eIt enhances your skills as a Security Specialist and increases your employability\u003c/li\u003e\n\u003c/ul\u003e16f:T449,\u003cp\u003eStudents going through EHE training will learn:\u003c/p\u003e\n\u003cp\u003e§ Key issues plaguing the information security world and information security laws and standards\u003c/p\u003e\n\u003cp\u003e§ Fundamentals of ethical hacking\u003c/p\u003e\n\u003cp\u003e§ Information security threats and vulnerabilities\u003c/p\u003e\n\u003cp\u003e§ Different types of malware\u003c/p\u003e\n\u003cp\u003e§ Different types of password-cracking techniques and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Social engineering techniques, insider threats, identity theft, and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Network-level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Application level attacks (webserver attacks, web application attacks, and SQL injection) and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Wireless encryption, wireless threats, and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools\u003c/p\u003e\n\u003cp\u003e§ IoT and OT concepts, attacks, and countermeasures\u003c/p\u003e\n\u003cp\u003e§ Cloud computing technologies, cloud computing threats, attacks, and security techniques \u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§ Fundamentals of pen testing"])</script><script>self.__next_f.push([1,"\u003c/p\u003e170:T8a4,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN\"\u003eThe rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eComputer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eDigital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis program will give a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics.\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eWhy is DFE Important?\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e It facilitates your entry into the world of computer forensics\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e It provides a professional understanding of the concepts of computer forensics\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e It enhances your skills as a Computer Forensics Specialist and increases your employability\u003c/span\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"171:T541,\u003cp\u003e\u003cspan lang=\"EN\"\u003eStudents going through DFE training will learn:\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Key issues plaguing the computer forensics\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Different types of digital evidence\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Computer forensic investigation process and its phases\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Different types of disk drives and file systems\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Data acquisition methods and data acquisition methodology\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Anti-forensics techniques and countermeasures\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Volatile and non-volatile information gathering from Windows, Linux, and Mac Systems\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Network forensics fundamentals, event correlation, and network traffic investigation\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Web server logs and web applications forensics\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Dark web forensics\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§\u003cspan lang=\"EN\"\u003e Email crime investigation\u003c/span\u003e\u003cspan lang=\"EN\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e§ Malware forensics fundamentals and different types of malware analysis\u003c/p\u003e172:T1129,"])</script><script>self.__next_f.push([1,"\u003cp\u003eWe begin with an introduction to the relevant biology, explaining what we measure and why. Then we focus on the two main measurement technologies: next generation sequencing and microarrays. We then move on to describing how raw data and experimental information are imported into R and how we use Bioconductor classes to organize these data, whether generated locally, or harvested from public repositories or institutional archives. Genomic features are generally identified using intervals in genomic coordinates, and highly efficient algorithms for computing with genomic intervals will be examined in detail. Statistical methods for testing gene-centric or pathway-centric hypotheses with genome-scale data are found in packages such as limma, some of these techniques will be illustrated in lectures and labs.\u003c/p\u003e\n\u003cp\u003eGiven the diversity in educational background of our students we have divided the series into seven parts. You can take the entire series or individual courses that interest you. If you are a statistician you should consider skipping the first two or three courses, similarly, if you are biologists you should consider skipping some of the introductory biology lectures. Note that the statistics and programming aspects of the class ramp up in difficulty relatively quickly across the first three courses. By the third course will be teaching advanced statistical concepts such as hierarchical models and by the fourth advanced software engineering skills, such as parallel computing and reproducible research concepts.\u003c/p\u003e\n\u003cp\u003eThese courses make up two Professional Certificates and are self-paced:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eData Analysis for Life Sciences:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/statistics-and-r\"\u003ePH525.1x: Statistics and R for the Life Sciences\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/introduction-to-linear-models-and-matrix-algebra\"\u003ePH525.2x: Introduction to Linear Models and Matrix Algebra\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/statistical-inference-and-modeling-for-high-throug\"\u003ePH525.3x: Statistical Inference and Modeling for High-throughput Experiments\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/high-dimensional-data-analysis\"\u003ePH525.4x: High-Dimensional Data Analysis\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003eGenomics Data Analysis:\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/introduction-to-bioconductor-annotation-and-analys\"\u003ePH525.5x: Introduction to Bioconductor\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/case-studies-in-functional-genomics\"\u003ePH525.6x: Case Studies in Functional Genomics\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/advanced-bioconductor\"\u003ePH525.7x: Advanced Bioconductor\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis class was supported in part by NIH grant R25GM114818.\u003c/p\u003e\n\u003cp\u003eHarvardX requires individuals who enroll in its courses on edX to abide by the terms of the edX honor code. HarvardX will take appropriate corrective action in response to violations of the \u003ca href=\"https://www.edx.org/edx-terms-service\" title=\"Follow link\"\u003eedX honor code\u003c/a\u003e, which may include dismissal from the HarvardX course; revocation of any certificates received for the HarvardX course; or other remedies as circumstances warrant. No refunds will be issued in the case of corrective action for such violations. Enrollees who are taking HarvardX courses as part of another program will also be governed by the academic policies of those programs.\u003c/p\u003e\n\u003cp\u003eHarvardX pursues the science of learning. By registering as an online learner in an HX course, you will also participate in research about learning. Read our \u003ca href=\"http://harvardx.harvard.edu/research-statement\" title=\"Follow link\"\u003eresearch statement \u003c/a\u003eto learn more.\u003c/p\u003e\n\u003cp\u003eHarvard University and HarvardX are committed to maintaining a safe and healthy educational and work environment in which no member of the community is excluded from participation in, denied the benefits of, or subjected to discrimination or harassment in our program. All members of the HarvardX community are expected to abide by Harvard policies on nondiscrimination, including sexual harassment, and the edX Terms of Service. If you have any questions or concerns, please contact \u003ca href=\"mailto:harvardx@harvard.edu\"\u003eharvardx@harvard.edu\u003c/a\u003e and/or \u003ca href=\"https://www.edx.org/contact-us\" title=\"Follow link\"\u003ereport your experience through the edX contact form\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"173:Tcc1,"])</script><script>self.__next_f.push([1,"\u003cp dir=\"ltr\"\u003eThis course provides research-based and on-the-ground tools for students, community planners, decision-makers, energy professionals, and interested citizens to improve and implement stronger and more resilient renewable energy systems in Arctic communities. Through a framework combining renewable energy in microgrids, and Food, Energy, and Water (FEW) security and infrastructure, this course synthesizes concepts into a holistic approach to community planning, improvement, and resiliency.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eLearn about existing and emerging types of renewable energy and clean energy sources and technologies and explore examples from Alaska, including solar energy, wind energy, geothermal, biomass, and hydropower facilities. Explore sustainable energy and alternative energy concepts.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eExamine underlying causes of food, energy, and water insecurity in Arctic, subarctic, and northern rural communities as it relates to energy use.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eGain insights into Arctic and subarctic lifestyles, including the roles and impacts of wild harvests, plant-based foods, and health disparities.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eLearn about food, energy, and water security and analyze the interactions among food, energy, and water usage, including for example: energy and water use in the production, transportation, and storage of food; energy usage in treating drinking water and wastewater for human health; water demands and fuel costs for electricity generation; appropriate food systems, sources of energy, and water resource usage and allocation; climate change impacts, fossil fuels and environmental impacts.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eGain specialized expertise on a variety of Arctic energy generation issues affecting its residents and Indigenous peoples, from engineering to social science to traditional community knowledge.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cp dir=\"ltr\"\u003eLearn the key concepts with practical, Alaska-focused examples.\u003c/p\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cp dir=\"ltr\"\u003eUse real wind speed data from wind turbines and photovoltaic data from solar panels with various analysis tools to make community energy assessments related to energy production.\u003c/p\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eApply a Food-Energy-Water (FEW) nexus approach to guide decisions about renewable power and selection of an energy mix from hydroelectric power to solar power and wind power.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eGain skills that enable a move toward a new energy future that minimizes greenhouse gas emissions such as carbon dioxide and carbon emissions through a focus on renewable energy sources that maximize energy efficiency and clean electricity production.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eLearn from National Science Foundation-funded researchers and staff from a variety of disciplines at the University of Alaska Fairbanks, the University of Alaska Anchorage, the University of Calgary, Stanford, and the private sector. Connections with United Nations Sustainable Development Goals. \u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nThis project is funded by the National Science Foundation, Award #1740075 INFEWS/T3: Coupling infrastructure improvements to food-energy-water system dynamics in small cold region communities: MicroFEWs.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"174:T4bf,\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eExplore current states of food, energy, and water systems in rural Alaska, with broader applications to the Arctic.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eCompare mature and emerging renewable energy technologies such as hydro, photovoltaics, and geothermal energy, with examples from Alaska.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eDefine how food, energy, and water impacts community well-being in the Arctic and beyond.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eAnalyze the feedback between renewable energy power generation and the local drivers of food, energy, and water security. \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eExplore and discuss scientific and social issues that arise when utilizing food, energy, and water resources. \u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eOrganize and quantify food and water security data.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eUse renewable energy resource data to create energy assessments.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eLearn how modular food and water applications can optimize renewable energy inputs in the Arctic and beyond.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eApply decision making methodologies to develop community level recommendations based on resource energy assessments combined with food and water security information.\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e175:T964,"])</script><script>self.__next_f.push([1,"\u003cp\u003ePlease note: The capstone project is only accessible for ID-verified MicroMasters Program learners who successfully obtained verified certificate in all MicroMasters Program courses.\u003c/p\u003e\n\u003cp\u003eIn the first three courses of the MicroMasters Program, you will learn about all the different steps in a biobased process and the economics and policy aspects you should consider before choosing a certain process. In this capstone project, you will combine the knowledge of the technological section with the economics and policies sections to develop a sustainable biobased practice. The focus is on linking the various aspects into an integral research, based on literature research and applied to a practical case.\u003c/p\u003e\n\u003cp\u003eThe final product in this capstone project is a written report. From an economic perspective, you will write an advice for an audience of your choice, for example the executive board of a company, an investor or a governmental agency. You are free to choose the subjects you want to address in this advice. This means you get the opportunity to work on a case of your choice and receive feedback from experts in the field.\u003c/p\u003e\n\u003cp\u003eIn order to find the information and publications you need, you will get tips and advice on how to do proper literature research. Along the way, you will get feedback on your proposal, draft and final report. The final report should reflect the academic research capabilities on a master's level, i.e. defining a research proposal, proper literature research, methodology, data, results and conclusions and discussion.\u003c/p\u003e\n\u003cp\u003eYou can only start the capstone project after completing all other courses in the \u003ca href=\"https://www.edx.org/micromasters/wageningenx-economics-and-policies-for-a-circular-bio-economy?index=product\u0026queryID=55ef569b79b085227a9436445076850c\u0026position=1\"\u003eMicroMasters Program Economics and Policies for a Circular Economy\u003c/a\u003e, with a verified certificate for every course:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/circular-economy-an-interdisciplinary-approach\"\u003eCircular Economy: An Interdisciplinary Approach\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/economics-and-policies-in-a-biobased-economy\"\u003eEconomics and Policies in a Biobased Economy\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/from-fossil-resources-to-biomass-a-chemistry-persp\"\u003eFrom Fossil Resources to Biomass: a Chemistry Perspective\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"176:T518,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eKubernetes, maintained by the Cloud Native Computing Foundation , is a leading open source system for containerized workloads. Companies worldwide use Kubernetes to automate deployment, management, and scaling of container-based applications\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e. \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eWith companies continuing to adopt containerization, Kubernetes skills are highly in demand.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis project is ideal for new and seasoned application developers and DevOps professionals. By the end of this hands-on guided project, you will have gained practical Kubernetes experience that employers value. You’ll know how to create and deploy a container pod, be able to describe Kubernetes container management, and will have learned how Kubernetes handles load balancing. You will have developed a foundation in Database-as-a-Service (DBaaS) management and be familiar with common Kubernetes features and tools, such as the kubectl command line interface and imperative object configuration.\u003c/p\u003e\n\u003cp\u003eTo complete the project, you will be provided with a Cloud-based IDE that already has many technologies, such as Kubernetes and Docker, preinstalled. Also, note that this platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.\u003c/p\u003e177:T1034,"])</script><script>self.__next_f.push([1,"\u003cp\u003ePerhaps no story is as essential to get right as the history of capitalism. Nearly all of our theories about promoting progress come from how we interpret the economic changes of the last 500 years. This past decade’s crises continue to remind us just how much capitalism changes, even as its basic features—wage labor, financial markets, private property, entrepreneurs—endure. While capitalism has a global history, the United States plays a special role in that story. This course will help you to understand how the United States became the world’s leading economic power, revealing essential lessons about what has been and what will be possible in capitalism’s on-going revolution.\u003c/p\u003e\n\u003chr /\u003e\n\u003ch4\u003eFAQ\u003c/h4\u003e\n\u003cp\u003e\u003cstrong\u003eDo I need to have taken economics before?\u003c/strong\u003e\u003cbr /\u003e\nNo. Though there will be discussion of economic ideas, professors will assume no prior economic training.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eI am not familiar with American history, but I am interested in how capitalism works. Can I take this course?\u003c/strong\u003e\u003cbr /\u003e\nYes. We will have relevant links to helpful background material for each section that should make it possible for those with no knowledge of U.S. history to take the class.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eIs this class about economic thought like Smith, Marx, Ricardo, Hayek, etc.?\u003c/strong\u003e\u003cbr /\u003e\nThis class is primarily about what actually happened rather than theories of what happened. While we will touch on important economic thinkers, this class will focus more on the people and institutions that developed capitalism in the United States. If you want to know how capitalism works and came about, this is the class for you.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWill certificates be awarded?\u003c/strong\u003e\u003cbr /\u003e\nYes. If you complete the work and achieve a passing grade in the course, you can earn a Honor Code Certificate, which indicates that you have completed the course successfully. Certificates will be issued by edX under the name of CornellX, designating the institution from which the course originated.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat will help me complete this course?\u003c/strong\u003e\u003cbr /\u003e\nWe have found that the best help you can get is other people in the real world. Enlist friends, co-workers, family, and other people to take the class with you. Ask your friends on Facebook or Twitter. Arrange a time during a lunch break or an evening to discuss the week’s videos and readings. Think of this “MOOC club” like a book club! You will get more out of the material and be much more likely to finish.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eI want to read more about American Capitalism!\u003c/strong\u003e\u003cbr /\u003e\nProfessors Baptist and Hyman just wrote a course reader expressly for this MOOC (though it is also being taught at Cornell University).\u003c/p\u003e\n\u003cp\u003eContaining every reading from the MOOC, as well as additional readings from leading scholars (that could not be had for free!), this course reader provides the student with more background for every topic.\u003c/p\u003e\n\u003cp\u003eEach reading is introduced and discussed by the professors. Each reading, as well, has additional questions for the student to discuss with their friends.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eAre there prerequisites?\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThis course is designed to be accessible for people without a strong background in U.S. history. Nevertheless, we make reference to many people, locations, events, or developments that may be unfamiliar to some students. Below are sources for additional information.\u003c/p\u003e\n\u003cp\u003eWikipedia is a very helpful source for a quick definition or description of most of the material in this course. It can help you answer most factual questions you might have.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"http://www.digitalhistory.uh.edu\"\u003eDigital History\u003c/a\u003e is a website that can serve as an online text book if you need a stronger grounding in U.S. history.\u003c/p\u003e\n\u003cp\u003eFor more difficult questions, you can post a question on the discussion board where your fellow students may be able to help you.\u003c/p\u003e\n\u003cp\u003eAn e-book has been designed for this class, containing all the readings and some additional essays by leading scholars in the history of capitalism, including the professors. American Capitalism: A Reader [Kindle Edition] Amazon.com.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"178:T917,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eWe are living in the era of eCommerce. All of us are connected to eCommerce some way or the other. Whether we are booking tickets for travel or purchasing groceries or making payment for essential services like electricity and water, we\u003c/span\u003e access the website of an online merchant to avail these goods and/ or services and make the corresponding payments online. We may be using debit or credit cards, wallets or the net banking facility of the banks for effecting the payments. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis eCommerce process involves connection between the merchant website and the various payment processing applications- card payment schemes, bank websites etc. Payment gateways enable this connection in a secure manner. Thus, they facilitate collection of sales proceeds by the online merchant.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThere are several models of Payment Gateways based on how the payment information flows. The gateway may be self-hosted by the merchant or involve a redirection to a third-party service provider. There are benefits and drawbacks in both models. We have tried to explore these in detail in the relevant chapters of this course.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eOne of the main areas of concern in online commerce is that of security of payments. This affects all the stakeholders- the online merchant, the buyer and the payment gateway. There are standards such as PCIDSS that aim to ensure the security of card holder data in online payments. Another important factor in security is the Secure Socket Layer (SSL) certification. We have provided insights into these factors that affect the security of online payments. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eRelated to the security of payments is the detection and prevention of frauds. This is of vital importance to an online merchant as it will affect the profits and reputation. This aspect has been dealt with in the module on Preventing Frauds in payment transactions.\u003c/p\u003e\n\u003cp\u003ePayment Gateways have brought about the eCommerce revolution today. Without them we would not be able to buy or sell online. But then what is the outlook for the future? This has been addressed in the last module on Future Trends in Payment Gateways.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"179:Ta17,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eIntro \u0026amp; Welcome\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eInstructor Introduction\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eOverview of course\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eContent\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eStructure and Navigation\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eModule 1: Nature of Computation\u003c/span\u003e\u003c/strong\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCore Idea: Throughout history humans have utilized various physical phenomena to perform computations\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eThe history and evolution of computers\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eLooking at past inventions and investigating the underlying physical phenomena which allows them to function\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eEx:, Abacus, Sundial, Thermostat, Slide Rule\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eModule 2: Classical Computing\u003c/span\u003e\u003c/strong\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCore Idea: Classical computers utilize electricity and bits to perform digital math and logic calculations in a general-purpose way\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eRepresenting information as digital bits\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eUtilizing electricity and digital circuits to perform computation\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eTypes of problems and time differences needed to solve them\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eModule 3: Quantum Phenomena\u003c/span\u003e\u003c/strong\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCore Idea: Identifying the features of quantum systems\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eEvolution of the atomic model\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eUnderstanding wavefunctions, interference, superposition and entanglement in quantum systems\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"EN-US\"\u003eModule 4: Quantum Computers\u003c/span\u003e\u003c/strong\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCore Idea: Quantum phenomena can be utilized for the purposes of computation\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eHow quantum computers utilize quantum physics to solve problems\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eBloch Sphere\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eQuantum problems\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eWhat types of problems can quantum computers solve\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eQuantum Logic\u003c/span\u003e\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eHow quantum gates are formed, and how this can be used to solve computational problems\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"17a:T566,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eKubernetes, maintained by the Cloud Native Computing Foundation , is a leading open source system for containerized workloads. Companies worldwide use Kubernetes to automate deployment, management, and scaling of container-based applications\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e. \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003eWith companies continuing to adopt containerization, Kubernetes skills are highly in demand.\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis project is ideal for new and seasoned application developers and DevOps professionals. By the end of this hands-on guided project, you will have gained practical Kubernetes experience that employers value. You’ll know how to create and deploy a container pod, be able to describe Kubernetes container management, and will have learned how Kubernetes handles load balancing. You will have developed a foundation in Database-as-a-Service (DBaaS) management and be familiar with common Kubernetes features and tools, such as the kubectl command line interface and imperative object configuration.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eTo complete the project, you will be provided with a Cloud-based IDE that already has many technologies, such as Kubernetes and Docker, preinstalled. Also, note that this platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.\u003c/p\u003e17b:T5bd,\u003cp\u003eIn this marketing course, you will gain an understanding of the foundations, scope, and challenges of global marketing, as well as the cultural environments of global markets.\u003c/p\u003e\n\u003cp\u003eOrganizations and businesses are always facing new challenges including slow domestic market growth, international competition, deregulation of formerly protected industries, short product life cycles, and emergence of global brands. This course will equip you with skills to understand and handle current and developing challenges in global marketing and how to create and implement successful strategies.\u003c/p\u003e\n\u003cp\u003eThis course will help you understand the strateg"])</script><script>self.__next_f.push([1,"ic implications of segmentation, targeting, and positioning and how they are developed within the context of customer, competitor, and context analysis. Particular emphasis will be placed on the role of disruptive positioning strategies and how firms can utilize such strategies to their advantage.\u003c/p\u003e\n\u003cp\u003eYou will develop integrated marketing strategies taking into consideration the problems and perspectives of marketing across national boundaries and within foreign countries. You’ll learn to evaluate and prioritize information that influences marketing decisions and deal with ambiguous information when engaged in business globally. You will also gain understanding of the strategic implications of the Country of Origin Effect and how this influences customer’s information processing of firms and brands.\u003c/p\u003e17c:T73a,\u003cp\u003eIn this business and management certificate course focused on the foundations of digital marketing, you will gain an understanding of how the digital economy works and develop the critical insights necessary to succeed in e-commerce and digital and social media marketing.\u003c/p\u003e\n\u003cp\u003eThe fixed and mobile Internet and related technologies exert a profound influence on how business and social institutions evolve, how they are challenged—and sometimes, even displaced. Companies that were non-existent a few short years ago, including Facebook, LinkedIn, and Uber, have dramatically changed how we interact, communicate and navigate our world. Even Amazon and Google are relatively “young” by any measure. If you’re an entrepreneur, investor, manager, or student, you need thoughtful approaches to navigate and win in this new, evolving environment.\u003c/p\u003e\n\u003cp\u003eThis online course is organized around four broad themes and leverages relevant theory and analysis, as well as numerous practical examples to develop key learning points and accelerate your knowledge of digital marketing.\u003c/p\u003e\n\u003cp\u003eThe themes are:\u003c/p\u003e\n\u003cp\u003e● Behavioral foundations for understanding and navigating the new online-offline landscape\u003c/p\u003e\n\u003cp\u003e"])</script><script>self.__next_f.push([1,"● New forms of interaction, including formation of networks and reputation building\u003c/p\u003e\n\u003cp\u003e● Tools and principles of digital marketing action including online advertising on fixed and mobile devices\u003c/p\u003e\n\u003cp\u003e● New media platforms and emergence of various marketing channels and mixed marketing models\u003c/p\u003e\n\u003cp\u003eThis course is beneficial to marketing professionals, analysts, entrepreneurs, small business owners, investors, and consumers.\u003c/p\u003e\n\u003cp\u003eThis course is part of Maryland Smith’s Digital Marketing Professional Certificate. For more information, \u003ca href=\"https://www.edx.org/digital-marketing-professional\"\u003esee here\u003c/a\u003e.\u003c/p\u003e17d:T8b8,"])</script><script>self.__next_f.push([1,"\u003cp\u003eFrom the printing press to the typewriter, there is a long history of scholars adapting to new technologies. In the last forty or fifty years, the most significant advance has been the digitization of books. We now have whole libraries—centuries of history, literature, and philosophy—available instantaneously. This new access is a wonderful benefit, but it can also be overwhelming. If you have hundreds of thousands of books available to you in an instant, where do you even start? With a bit of elementary code, you can study all of these books at once, and derive new sorts of insights.\u003c/p\u003e\n\u003cp\u003eComputation is changing the very nature of how we do research in the humanities. Tools from data science can help you to explore the record of human culture in ways that just wouldn’t have been possible before. You’re more likely to reach out to others, to work across disciplines, and to assemble teams. Whether you're a student wanting to expand your skillset, a librarian supporting new modes of research, or a journalist who has just received a massive cache of leaked e-mails, this course will show you how to draw insights from thousands of documents at once. You will learn how, with a few simple lines of code, to make use of the metadata—the information about our objects of study—to zero in on what matters most, and visualize your results so that you can understand them at a glance.\u003c/p\u003e\n\u003cp\u003eIn this course, you’ll work on building parts of a search engine, one tailor-made to the needs of academic research. Along the way, you'll learn the fundamentals of text analysis: a set of techniques for manipulating the written word that stand at the core of the digital humanities.\u003c/p\u003e\n\u003cp\u003eBy the end of the course, you will be able to apply what you learn to what interests you most, be it contemporary speeches, journalism, caselaw, and even art objects. This course will analyze pieces of 18th-century literature, showing you how these methods can be applied to philosophical works, religious texts, political and historical records – material from across the spectrum of humanistic inquiry.\u003c/p\u003e\n\u003cp\u003eCombine your traditional research skills with data science to find answers you never might have expected.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"17e:T61d,\u003cp\u003eDo you want to understand more about the environmental problems we currently face? Do you want to learn ways we can reduce the negative effects of these problems, and keep our environment more sustainable? If so, this course is for you.\u003c/p\u003e\n\u003cp\u003eIn this multi-disciplinary course, we will discuss major challenges facing environmental protection efforts. In doing so, we'll bring together various aspects from three themes: Biological, Physical, and Human.\u003c/p\u003e\n\u003cp\u003eThe Biological theme focuses on the importance of biodiversity and the actions we can take to conserve basic ecosystem functions. For example: reintroducing locally extinct key species and protecting agroecosystems.\u003c/p\u003e\n\u003cp\u003eClean air and water resources, as elements of the Physical theme, are crucial to maintaining biodiversity and our basic life-support systems. We will explore methods for minimizing air and water pollution and their negative impacts.\u003c/p\u003e\n\u003cp\u003eThe Human theme investigates how human development can be sustainable under the current pressures at local, regional, and global scales. Examples include water reuse, green building, and environmentally friendly technologies.\u003c/p\u003e\n\u003cp\u003eThe course is designed and presented by six scientists, each of whom specializes in a different environmental aspect. The course uses video presentations, movies, exercises, assignments, and many additional sources to provide information and enrichment.\u003c/p\u003e\n\u003cp\u003eNo previous knowledge on environmental issues is needed. Join us for a diverse and unique course and become a protector of the environment.\u003c/p\u003e17f:T9ea,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cem\u003e\u003cstrong\u003eCan building structures be sustainable?\u003c/strong\u003e\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eThis course aims to answer that question. It covers sustainable construction management project elements from conception to completion. We discuss the important contributions facility managers and property managers make to sustainable construction projects by acting as the owner’s representatives. And we show how the construction contract and project delivery method greatly influences how the project will be performed sustainably. \u003c/p\u003e\n\u003cp\u003eSustainable construction methods and processes are highlighted, along with newer construction document production systems such as building information modeling (BIM), laser scanning, and drones. This course also gives an example of a scheduling method known as the critical path method (CPM). \u003c/p\u003e\n\u003cp\u003eWe discuss methods, materials, and the equipment used to mitigate damage to buildings due to environmental conditions, and the different types of building systems. Current technologies and green innovations also reviewed include exterior wall systems, green roofs, elevators, HVAC systems, and new methods of sustainable building choices for green construction best practices.\u003c/p\u003e\n\u003cp\u003eOther topics include sustainable maintenance operations, energy management, green building certifications, renewable energy, sustainability construction trends and the use of best practices in sustainable planning, design, and construction, including the steps needed to develop a high-performance project.\u003c/p\u003e\n\u003cp\u003eCore concepts include:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eFrameworks for implementing a sustainable green project or a high-performance project. \u003c/li\u003e\n\u003cli\u003eRole of the facility manager.\u003c/li\u003e\n\u003cli\u003eSustainable building design, construction, remodeling, and building improvements.\u003c/li\u003e\n\u003cli\u003eDisaster management procedures.\u003c/li\u003e\n\u003cli\u003eSustainable Infrastructure.\u003c/li\u003e\n\u003cli\u003eDecision making techniques in sustainable project development\u003c/li\u003e\n\u003cli\u003eHow to reduce emissions during construction\u003c/li\u003e\n\u003cli\u003eHow to control energy consumption and maximize sustainable efficiency\u003c/li\u003e\n\u003cli\u003eClimate control.\u003c/li\u003e\n\u003cli\u003eGreenhouse gas emissions.\u003c/li\u003e\n\u003cli\u003eStormwater management controls.\u003c/li\u003e\n\u003cli\u003eSediment and erosion controls.\u003c/li\u003e\n\u003cli\u003eRenewable energy use\u003c/li\u003e\n\u003cli\u003eInvolvement of stakeholders in the planning, design, and construction process.\u003c/li\u003e\n\u003cli\u003eGreen building certifications, such as LEED and Green Globes.\u003c/li\u003e\n\u003cli\u003eLatest trends and future in sustainable construction management.\u003c/li\u003e\n\u003cli\u003eThe best sustainable practices in design and construction.\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"180:T468,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eRepresentation State Transfer or REST is considered the standard for web APIs. Express.js is a popular and powerful Node.js web application framework for developing RESTful APIs that simplifies the development process by abstracting away much of the technical and tedious details of building an API.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis guided project is an excellent resource if you are interested in enhancing your server-side web and mobile development expertise.\u003c/p\u003e\n\u003cp\u003eIn about an hour, you’ll develop practical JavaScript skills using Express to create an interesting REST API that allows clients to handle information about chilies. Completing this project will provide you with back-end development experience.\u003c/p\u003e\n\u003cp\u003eAs part of this hands-on project, you will be provided with a browser-accessible development environment that already has many technologies and libraries preinstalled, including the IDE, Node.js runtime, and Express, saving you the time and hassle of setting everything up. Also, note that this platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.\u003c/p\u003e181:T615,\u003cp\u003eThis course provides a comprehensive introduction to transmission electron microscopy (TEM) in the field of materials science. For an instrument operated by a single user, modern TEM provides an analytical platform with unsurpassed versatility, giving access to structural and chemical information from the micrometer to the sub-angstrom scale. In a thin, electron-transparent sample one can measure the crystallinity, grain structure, size, and defects, and the chemical composition. The crystal lattice can be imaged with atomic resolution, allowing observation of grain boundaries and interfaces. It is the only direct structural analysis method for studying nanoparticles.\u003c/p\u003e\n\u003cp\u003eWith this course you will gain a deep understanding of modern TEM and the connection between: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ethe optics and operation of the instrument; \u003c/li\u003e\n\u003cli\u003ethe physics of electron-matter interactions; \u003c/li\u003e\n\u003cl"])</script><script>self.__next_f.push([1,"i\u003einsights into the materials properties of the sample. \u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis gives the background to: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eidentify TEM techniques suitable to solving specific scientific problems; \u003c/li\u003e\n\u003cli\u003einterpret TEM data presented in articles; appreciate the impact of technological advances that have, for instance, led to sub-angstrom resolution by aberration correction. \u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eIt can also be the basis for subsequent practical training on this remarkable instrument, and a stepping stone towards learning very advanced techniques with magical names like “dark field holography” or “angular resolved electron energy-loss spectroscopy”.\u003c/p\u003e182:Tdff,"])</script><script>self.__next_f.push([1,"\u003cp\u003eAdvancing towards \u003cstrong\u003eUniversal Health Coverage (UHC)\u003c/strong\u003e - or in other words, achieving access to health services for the entire population without causing financial hardship - is in everyone's interest and one of the great Sustainable Development Goals (SDGs) for 2030, set out by the United Nations (UN) and signed by many countries.\u003c/p\u003e\n\u003cp\u003eHowever, to achieve this, countries face an enormous challenge: which services and health technologies should be financed for the population, and how can UHC be achieved with the available public resources? All this taking into account that in all nations, whether rich or poor, resources are insufficient to cover all the needs of the people.\u003c/p\u003e\n\u003cp\u003eFor this reason, the \u003cstrong\u003eInter-American Development Bank (IDB)\u003c/strong\u003e through its \u003cstrong\u003eCriteria Network\u003c/strong\u003e , in alliance with the \u003cstrong\u003eCenter for Global Development (CGD)\u003c/strong\u003e , are pleased to present you the course “\u003cstrong\u003eWhat to Finance in Health and at What Price?\u003c/strong\u003e ”, which discusses the two key strategies to help countries move towards UHC and improve the efficiency of public health spending: explicit priority setting in health and instruments to achieve more affordable prices for medicines.\u003c/p\u003e\n\u003cp\u003eAs we navigate the course, we will learn more about the challenges countries face and the strategies and tools available to support them \u003cstrong\u003eby some of the best international experts in this area\u003c/strong\u003e.\u003c/p\u003e\n\u003cp\u003eResources are scarce and spending smartly is essential to achieve more health for the population per dollar invested. \u003cstrong\u003eAre you going to miss out on this opportunity?\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eSign up now and… join us!\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWho is this course intended for?\u003c/strong\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDecision-makers and public officials who work in the areas of health policies and financing of services.\u003c/li\u003e\n\u003cli\u003eSpecialists in economics, medicine, and the right to health.\u003c/li\u003e\n\u003cli\u003eAcademics (researchers, teachers, students).\u003c/li\u003e\n\u003cli\u003eOpinion leaders.\u003c/li\u003e\n\u003cli\u003eCitizens interested in learning about the decision processes and the available policies to improve the effectiveness, quality, and coverage of health services.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThis course is \"self-paced\" so you can enroll at any time, even if the course has been open for a while. You can take it at the time that is most suitable for you inside the enrolment period of the course.\u003c/p\u003e\n\u003cp\u003eIf you opt for the \u003cstrong\u003eAudit track,\u003c/strong\u003e you will have unlimited access to the course content, but you won't be able to complete the assessed activities or receive the certificate.\u003c/p\u003e\n\u003cp\u003eIf you opt for the \u003cstrong\u003eVerified track\u003c/strong\u003e , you can access the course unlimitedly and complete the qualified evaluations until the closing date, after making a payment of $25.\u003cem\u003eIf you pass, in addition to the verified certificate, you will obtain a\u003c/em\u003e \u003cstrong\u003e\u003ca href=\"https://cursos.iadb.org/en/indes/digital-badges\"\u003edigital badge\u003c/a\u003e\u003c/strong\u003e \u003cem\u003e****\u003c/em\u003e that allows you to change the way you share your academic and professional achievements, for example, on social media.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e*Did you know there is financial aid to opt for the verified certificate?\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eEdX offers financial assistance for learners who want to earn Verified Certificates but who may not be able to pay the Verified Certificate fee. Subscribe to the course and \u003cstrong\u003e\u003ca href=\"https://courses.edx.org/financial-assistance/apply/\"\u003eapply for financial assistance\u003c/a\u003e.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eSee more information in the Frequently Asked Questions section below.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"183:T4c1,\u003cp\u003eTechnologies are always being defeated.\u003c/p\u003e\n\u003cp\u003eIf you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency.\u003c/p\u003e\n\u003cp\u003eCybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day.\u003c/p\u003e\n\u003cp\u003eThe purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving.\u003c/p\u003e\n\u003cp\u003eStudents will learn from thought leaders from both the academic and practitioner communities.\u003c/p\u003e184:T565,\u003cp\u003eWelcome to the course on Microrobotics!\u003c/p\u003e\n\u003cp\u003eMicrorobotics refer to robots of milimeter or micrometer scale. These robots function mostly in fluidic environment, concerning a great range of disciplines including engineering, physics, chemistry, biology, medicine, living sicence, etc. They are playing an important role on a wide range of interdisciplinary applications, e.g., remote drug delivery, minimal invasive surgery, human health monitoring, plant science investigations, and so much more. With the advancement of technologies, we are excited to come to an era in which we believe microrobotics could accomplish great work that are unimaginable before.\u003c/p\u003e\n\u003cp\u003eIn this course, we will introduce you the basic concept of microrobotics and their applications. You will learn what a microrobot is, how it"])</script><script>self.__next_f.push([1," functions, and in which way you could build and control a microrobot. You will also learn the state-of-the-art research topics and applications of microrobots and challenges in building them. We hope you could learn a lot in this course, and become interested in this field. Look forward to seeing you!\u003c/p\u003e\n\u003cp\u003eFor more information, you could visit our website: https://msrl.ethz.ch/, subscribe to our YouTube channel: https://www.youtube.com/channel/UCv-ks5XkUEnb2WTO6UsOQcw, or follow our LinkedIn page: https://www.linkedin.com/company/multi-scale-robotics-lab.\u003c/p\u003e185:T506,\u003cp\u003e\u003cspan lang=\"EN-US\"\u003eRepresentation State Transfer or REST is considered the standard for web APIs. Express.js is a popular and powerful Node.js web application framework for developing RESTful APIs that simplifies the development process by abstracting away much of the technical and tedious details of building an API. \u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eThis guided project is an excellent resource if you are interested in enhancing your server-side web and mobile development expertise.\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIn about an hour, you’ll develop practical JavaScript skills using Express to create an interesting REST API that allows clients to handle information about chilies. Completing this project will provide you with back-end development experience. \u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAs part of this hands-on project, you will be provided with a browser-accessible development environment that already has many technologies and libraries preinstalled, including the IDE, Node.js runtime, and Express, saving you the time and hassle of setting everything up. Also, note that this platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.\u003c/p\u003e186:T924,"])</script><script>self.__next_f.push([1,"\u003cp\u003eMarketing excellence is a prerequisite for success in any business, from startups to the world\u0026rsquo;s most established enterprises, yet the art and science of marketing is constantly evolving. Arm yourself with the essential principles and practices of marketing in the digital economy by making this course, taught by Internet consumer shopping expert and Wharton professor David Bell, an indispensable part of your knowledge base.\u003c/p\u003e\r\n\u003cp\u003eIn this business and management course, you will gain an understanding of how the digital economy works and develop the critical insights necessary to succeed in e-commerce and digital and social media marketing.\u003c/p\u003e\r\n\u003cp\u003eThe fixed and mobile Internet and related technologies exert a profound influence on how business and social institutions evolve, how they are challenged\u0026mdash;and sometimes, even displaced. Companies that were non-existent a few short years ago, including Facebook, LinkedIn, and Uber, have dramatically changed how we interact, communicate and get from point A to B. Even Amazon and Google are relatively \u0026ldquo;young\u0026rdquo; by any measure. If you\u0026rsquo;re an entrepreneur, investor, manager, or student, you need thoughtful approaches to navigate and win in this new environment.\u003c/p\u003e\r\n\u003cp\u003eThis course is organized around four broad themes and we will use relevant theory and analysis, as well as numerous practical examples to develop our key learning points.\u003c/p\u003e\r\n\u003cp\u003eThe themes are:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eBehavioral foundations for understanding and navigating the new online-offline landscape\u003c/li\u003e\r\n\u003cli\u003eNew forms of interaction, including formation of networks and reputation building\u003c/li\u003e\r\n\u003cli\u003eTools and principles of digital marketing action including online advertising on fixed and mobile devices\u003c/li\u003e\r\n\u003cli\u003eNew media platforms and emergence of \u0026ldquo;organic\u0026rdquo; celebrities and communities\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eThis course is beneficial to marketing professionals, analysts, entrepreneurs, small business owners, investors, and consumers This course evolved from the University of Pennsylvania\u0026rsquo;s Wharton School\u0026rsquo;s very first course on digital marketing and e-commerce.\u003c/p\u003e\r\n\u003cp\u003e\u003cem\u003eThis course is part of Wharton's Digital Marketing Professional Certificate. For more information, \u003ca href=\"https://www.edx.org/digital-marketing-professional\"\u003esee here\u003c/a\u003e.\u003c/em\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"187:T50f,\u003cp\u003eProficient technologists working on the Industrial IoT vertical use lots of technologies and methods to control, manage and get information from the IoT devices. So, there are assembly lines and industrial aspects that needs to take into consideration when talking about IoT when used in an industrial scale.\u003c/p\u003e\n\u003cp\u003eThe story we are going to tell is about an individual who is new to that industry and got hired by a company who is planning to adopt to Industry 4.0 standards in next 3 years, the company is already familiar with some AWS services and already uses it for some other projects, such as their website and other workloads, so it makes sense for them to explore IIoT capabilities on AWS as well.\u003c/p\u003e\n\u003cp\u003eThe company got into a multi-year partnership with AWS to help them transform and innovate, the company is also hiring lots of people with IoT and Cloud background, preferably with industrial exposure. As today, the company hired Engineers and Architects, but they have limited industrial experience. The company plans to up-skill their existing workforce of industrial engineers with Cloud knowledge to expand their resource pool over time, and due to this workforce, there is a clear knowledge gap on how to build an edge to cloud continuum from factories to cloud today.\u003c/p\u003e188:T8f7,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eComing Soon February 2021.\u003c/strong\u003e Technological innovations have revolutionized the way we view and interact with the world around us. Editing a photo, re-mixing a song, automatically measuring and adjusting chemical concentrations in a tank: each of these tasks requires real-world data to be captured by a computer and then manipulated digitally to extract the salient information. Ever wonder how signals from the physical world are sampled, stored, and processed without losing the information required to make predictions and extract meaning from the data?\u003c/p\u003e\r\n\u003cp\u003eStudents will find out in this rigorous mathematical introduction to the engineering field of signal processing: the study of signals and systems that extract information from the world around us. This course will teach students to analyze discrete-time signals and systems in both the time and frequency domains. Students will learn convolution, discrete Fourier transforms, the z-transform, and digital filtering. Students will apply these concepts in interactive MATLAB programming exercises (all done in browser, no download required).\u003c/p\u003e\r\n\u003cp\u003eLearners should have strong problem solving skills, the ability to understand mathematical representations of physical systems, and advanced mathematical background (one-dimensional integration, matrices, vectors, basic linear algebra, imaginary numbers, and sum and series notation). This course is an excerpt from an advanced undergraduate class at Rice University taught to all electrical and computer engineering majors.\u003c/p\u003e\r\n\r\n\u003cp\u003e\u003cb\u003e\u003ca href=\"https://support.edx.org/hc/en-us/articles/360060426873-MicroBachelors-Coaching-FAQs\"\u003eCoaching\u003c/a\u003e\u003c/b\u003e\u003cbr\u003e\r\nIf you are enrolled in the verified track (paid track) in any course that is a part of a MicroBachelors program, including this course, you are eligible for \u003ci\u003ecoaching at no additional cost. Please note that coaching is only available via SMS to U.S. phone lines.\u003c/i\u003e\u003c/p\u003e\r\n\r\n\u003cp\u003eOur coaches (real humans) are ready to help you with career exploration, navigating resources, staying motivated, and solving problems along the way to your goals.\u003c/p\u003e\r\n\r\n\u003cp\u003eLearn more about the \u003ca href=\"https://www.youtube.com/watch?v=14QVCTJvHQo\u0026feature=youtu.be\"\u003evalue of coaching\u003c/a\u003e directly from one of our coaches, Erin.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"189:T4b2,\u003cp\u003eIn this project course, the final course in the \u003ca href=\"https://www.edx.org/micromasters/ubcx-software-development\"\u003eSoftware Development MicroMasters program\u003c/a\u003e, you will learn how to input, manipulate, and return data with a modern web development stack. Using TypeScript and Node, you will manipulate large amounts of information using a domain-specific querying language. Backend, REST, and front-end technologies will be required to successfully complete the project.\u003c/p\u003e\n\u003cp\u003eIn teams, students will work through the project in several sprints. In each sprint, students will produce a deliverable that is evaluated using an automated test suite. The feedback you will receive from this suite will be limited. To succeed at the project you will need to create your own private test suite to further validate each deliverable.\u003c/p\u003e\n\u003cp\u003eBy working through such a large-scale development project, you will learn technical development skills, and gain experience with how teams develop software in the industry.\u003c/p\u003e\n\u003cp\u003eThis is the largest project in the Software Development MicroMasters program. Verified learners will have access to greatly increased staff coaching to help complete the project.\u003c/p\u003e18a:T5c0,\u003cp\u003eThis course is part of the Certified Lifestyle Medicine Executive MicroMasters program which consists of 9 courses and a capstone exam. After completing the program, you can also apply to Doane University to complete your MBA online for approximately $10,500 (learn more about the program \u003ca href=\"https://www.doane.edu/lp/certified-lifestyle-medicine-executive.html?r_source=Web%20-%20CLME\" title=\"Doane University MBA\"\u003ehere\u003c/a\u003e). \u003c/p\u003e\n\u003cp\u003eHealth informatics technology (HIT) is the field of study that focuses on acquiring, storing, and retrieving healthcare data. In order to address the challenges of safety, quality, effectiveness, and efficiency in healthcare systems for population health, HIT is essential. Electronic healthcare records and data are dynamic and at a population level, HIT enables the use of aggregate "])</script><script>self.__next_f.push([1,"data to refine and enhance our understanding of what interventions are most clinically and cost effective for subsets of patients within a population. \u003c/p\u003e\n\u003cp\u003eWhile most health informatics texts take a hospital-centric approach, this course focuses on how to operationalize informatics solutions to address important public health challenges impacting individuals, families, communities, and the environment in which they live. \u003c/p\u003e\n\u003cp\u003eThis course is part of the Certified Lifestyle Medicine Executive MicroMasters program. For an introduction to lifestyle medicine, see the Lifestyle Medicine Competencies Professional Certificate program.\u003c/p\u003e18b:T4fd,\u003cp\u003eHealth Informatics Technology (HIT) deals with the acquisition, storage and retrieval of data and is central in addressing the challenges of safety, quality, effectiveness and efficiency in a healthcare system. Proper management of dynamic data, such as electronic healthcare records, can enable a new approach for clinical workflow, evidence-based decision making and team-based care to improve overall public health. Gain an understanding of how healthcare informatics is deployed in diverse healthcare systems around the world.\u003c/p\u003e\n\u003cp\u003eIn addition, leaders and administrators in the healthcare industry must have a basic understanding of healthcare finance, risk, legal and regulatory issues in order to navigate and change the system. Managing risk is one of the primary responsibilities of a leader. This requires a basic understanding of the financial health and regulatory constraints one operates within to anticipate and address changing dynamics.\u003c/p\u003e\n\u003cp\u003eThis course will focus on a combination of technology management and and finance to help you articulate innovative approaches to managing costs and improving access, quality and safety. In the end, you will learn how to assess the fiscal status of a healthcare organization through sophisticated technology.\u003c/p\u003e18c:T4fc,\u003cp\u003eMany companies disappear due to mismanagement of their resources, others miss the potential they have by n"])</script><script>self.__next_f.push([1,"ot planning strategically. Accounting gives us the opportunity to understand how the company performs and relates to its environment. Additionally, finance provides us with tools that allow us to analyze the accounting results of the company and the economic factors of the environment to make timely decisions that allow managers to anticipate the different risks posed by the market.\u003c/p\u003e\n\u003cp\u003eIn this course you will learn how the accounting information of a company is integrated in order to read the financial statements and evaluate its financial health. This information will allow you to make decisions about: the financial health of the company, the levels of debt required by the business, the possibilities for investment and growth, the viability of future projects, the best performance indicators and the convenience of buying or renting a active.\u003c/p\u003e\n\u003cp\u003eThrough finance you will learn to identify the best funding alternatives, select the best from among different projects, and manage the company's cash.\u003c/p\u003e\n\u003cp\u003eThe concepts learned are applicable to the company as a whole, to individual projects and even to the management of our personal finances.\u003c/p\u003e18d:T42f,\u003cp\u003eCurious about entrepreneurship, but not sure where to start? Becoming an Entrepreneur is designed in partnership with MIT to guide people of all ages and backgrounds through the process of founding a company. With enrollment in the hundreds of thousands, this course is as engaging and accessible as it is informative.\u003c/p\u003e\n\u003cp\u003eBecoming an Entrepreneur will provide you with inspiration to explore an entrepreneurial path and tools to overcome the initial challenges of building a business.\u003c/p\u003e\n\u003cp\u003eFrom developing new business ideas and doing market research to designing and testing your offering and pitching, this course follows LaunchX’s successful approach to entrepreneurship that leverages MIT’s Disciplined Entrepreneurship, lean methodologies, and design thinking. There will be a combination of short videos and activities that will challenge you to get you"])</script><script>self.__next_f.push([1," away from your computer screen and into the community to make a real impact.\u003c/p\u003e\n\u003cp\u003eNo previous business or entrepreneurship experience needed. Join us to embark on your entrepreneurial journey.\u003c/p\u003e18e:T689,\u003cp\u003eWhile big data infiltrates all walks of life, most firms have not changed sufficiently to meet the challenges that come with it. In this course, you will learn how to develop a big data strategy, transform your business model and your organization. \u003c/p\u003e\n\u003cp\u003eThis course will enable professionals to take their organization and their own career to the next level, regardless of their background and position. \u003c/p\u003e\n\u003cp\u003eProfessionals will learn how to be in charge of big data instead of being subject to it. In particular, they will become familiar with tools to: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eassess their current situation regarding potential big data-induced changes of a disruptive nature,\u003c/li\u003e\n\u003cli\u003eidentify their options for successfully integrating big data in their strategy, business model and organization, or if not possible, how to exit quickly with as little loss as possible, and\u003c/li\u003e\n\u003cli\u003estrengthen their own position and that of their organization in our digitalized knowledge economy\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe course will build on the concepts of product life cycles, the business model canvas, organizational theory and digitalized management jobs (such as Chief Digital Officer or Chief Informatics Officer) to help you find the best way to deal with and benefit from big data induced changes. \u003c/p\u003e\n\u003cp\u003eDuring the course, your most pressing questions will be answered in our feedback videos with the lecturer. In the assignments of the course, you will choose a sector and a stakeholder. For this, you will develop your own strategy and business model. This will help you identify the appropriate organizational structure and potential contributions and positions for yourself.\u003c/p\u003e18f:T838,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e[EN] \u003cbr /\u003e\r\nIn this course, you will get to know Porto better in the company of a fun group of students and learn to communicate in Portuguese in basic everyday situations, based on the presentation of language contents and guided practice.\u003c/span\u003e\u003c/p\u003e\r\n\u003cp\u003eAt the end of this course, you will be able to: introduce yourself and others; ask questions and give answers about personal details (nationality, place where you live, languages spoken, profession); establish social contacts using appropriate forms of greeting, presentation and farewell; communicate in a simple way to satisfy basic communicative needs in everyday life (including going to a café and a restaurant, buying tickets, shopping, asking for information, moving around the city...); pronounce, in an isolated way, most of the sounds of the Portuguese language, and, in context, to say words, sentences and small texts; learn a basic repertoire of vocabulary related to everyday life; use elementary language structures.\u003c/p\u003e\r\n\u003cp\u003e[PT] \u003cbr /\u003e\r\nNeste curso, propomos uma viagem ao Porto, uma das mais bonitas e características cidades de Portugal, para que possa conhecer a língua portuguesa e uma parte dessa riqueza cultural, com uma equipa de professores muito empenhados e com grande experiência no ensino do português.\u003c/p\u003e\r\n\u003cp\u003eNo final do curso, será capaz de: apresentar-se e apresentar os outros; fazer perguntas e dar respostas sobre informações pessoais (nacionalidade, lugar onde vive, línguas faladas, profissão); estabelecer contactos sociais usando adequadamente formas de saudação, apresentação e despedida; comunicar de forma simples para satisfazer necessidades comunicativas básicas no quotidiano (nomeadamente ir ao café e ao restaurante, comprar bilhetes, fazer compras, pedir informações, deslocar-se na cidade…); pronunciar, de forma isolada, a maior parte dos sons da língua portuguesa, e, em contexto, dizer palavras, frases e pequenos textos; usar um repertório básico de vocabulário relacionado com a vida quotidiana; utilizar estruturas linguísticas elementares.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"190:T7e2,\u003cp\u003eDove si apprende? E come si apprende? Quali sono i luoghi maggiormente preposti per l'apprendimento? Questo corso affronterà queste tematiche rivolgendosi a psicologi, pedagogisti, formatori, insegnanti e a sviluppatori di programmi informatici impegnati nel settore dell'educazione. \u003c/p\u003e\n\u003cp\u003eVerrai accompagnato nello studio di alcuni consolidati modelli dei processi dell'apprendimento e delle principali teorie dello sviluppo cognitivo, trattando sia i primi che le seconde nel contesto delle attuali prospettive della ricerca in discipline affini alla Psicologia, come ad esempio le Neuroscienze, le Scienze Cognitive e l'Intelligenza Artificiale. Si descriveranno anche alcuni disturbi specifici dei processi di apprendimento in età evolutiva (come per esempio la disgrafia, i problemi dell'attenzione, la discalculia e la dislessia). \u003c/p\u003e\n\u003cp\u003eInfine, una parte dell'insegnamento presenterà l'approccio del Technology Enhanced Learning al sostegno e al potenziamento dei processi di apprendimento lungo l'intero arco di vita degli individui ed in vari contesti educativi (scuole, aziende, centri di riabilitazione cognitiva). \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003ePsychology of learning\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eWhere do we learn? And how do we learn? What are the best environments for learning? This course is designed to help psychologists, educationalists, teacher trainers, teachers and educational software developers better understand the psychology behind learning. \u003c/p\u003e\n\u003cp\u003eYou will be introduced to consolidated models of learning processes and the main cognitive development theories in the context of current perspectives in Psychology-related research, like Neuroscience, Cognitive Sciences and Artificial Intelligence. Specific childhood learning difficulties will be described (like dysgraphia, attention deficit disorder, dyscalculia and dyslexia). \u003c/p\u003e\n\u003cp\u003eWe will also focus on Technology Enhanced Learning to support lifelong learning processes and learning in different contexts (school, work, rehabilitation centers).\u003c/p\u003e191:T6fd,\u003cp\u003eLos omnip"])</script><script>self.__next_f.push([1,"resentes Sistemas de Información Gerencial (SIG) o Management Information Systems (MIS) juegan un papel crítico en el actual panorama profesional. Desde los sistemas de gestión de las relaciones con los clientes, que gestionan las interacciones diarias con los clientes actuales y potenciales, hasta los sistemas gerenciales y financieros que emiten y pagan facturas, el día a día de la vida laboral está cada vez más controlado por estos sistemas de gestión, que dictan qué hacer y cómo hacerlo. \u003c/p\u003e\n\u003cp\u003eEste curso en línea sobre MIS cubrirá las infraestructuras tecnológicas de soporte (Cloud, Bases de Datos, Big Data), el proceso de desarrollo/adquisición de los MIS, los principales sistemas integrados, ERPs, tales como SAP®, Oracle® o Microsoft Dynamics Navision® y su relación con el rediseño de procesos de negocio, así como, para apoyar la toma de decisiones, los sistemas de inteligencia de negocios (Business Intelligence). \u003c/p\u003e\n\u003cp\u003eEste curso de Sistemas de Información se centrará en qué son los MIS, cómo influyen en nuestros trabajos actuales o futuros, por qué imponen ciertas formas de hacer las cosas - que a veces pueden parecer absurdas -, y cómo puedes sacarle partido a estos conocimientos en tu vida profesional o personal. \u003c/p\u003e\n\u003cp\u003eComprender los conceptos clave de los Sistemas de Información no tiene por qué resultar complejo, y ciertamente no requiere que seas experto en desarrollo software. Usaremos ejemplos del mundo real para ilustrar conceptos clave y nos esforzaremos por lograr un equilibrio adecuado entre claridad / amenidad y solidez conceptual. ¡Acompáñanos en este estimulante viaje, que además te permitirá comprender mejor y desempeñar con más soltura tu trabajo actual (u optar a otro mejor...)!\u003c/p\u003e192:T857,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCiò che nel linguaggio comune intendiamo per circuito elettrico rappresenta, al tempo stesso, un fondamento ed un componente essenziale della tecnologia contemporanea. È facile convincersi che senza lo sviluppo delle scienze elettriche, e del modello circuitale, vivremmo in un mondo completamente diverso da quello che conosciamo. Infatti, la conversione dell’energia e la sua trasmissione, la meccanizzazione e l’automazione, le telecomunicazioni e l’informatica sono tutte fortemente dipendenti dalla capacità di analizzare, progettare e realizzare circuiti elettrici.\u003cbr /\u003e\nIl corso introduce ed illustra i fondamenti della teoria dei circuiti elettrici, a partire dalla descrizione delle grandezze elettriche di riferimento e delle condizioni che permettono di definire il circuito con le sue leggi, trattando in generale l’analisi di circuiti lineari in condizioni di funzionamento stazionario, sinusoidale e dinamico. Contemporaneamente vengono approfondite le proprietà generali del modello, le principali formulazioni ad esso associate, alcune peculiari tecniche di analisi, introducendo infine gli studenti alla simulazione circuitale. \u003c/p\u003e\n\u003cp\u003eWhat is commonly meant by the term “electric circuit” is at the same time the basis and essential component of contemporary technology. It is easy to accept that without the development of electrical science and the circuit model, the world as we know it would be totally different. Energy conversion and transmission, mechanization and automation, telecommunications and informatics are all inherently dependent on our ability to analyze, design and build electric circuits. The course introduces and illustrates the basics of electric circuit theory, starting with a definition of the relevant electric strength, and the conditions and laws that define a circuit; then in-depth analysis of linear circuits follows, in steady-state, sinusoidal and dynamic conditions. The main properties of the model are also described, discussing the major model formulations, and the most common techniques of analysis. Learners are then introduced to circuit simulation.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"193:T60e,\u003cp\u003eSegún estimaciones de la OMS, durante el 2021 el cáncer afectó a más de 20 millones de personas en el mundo y 10 millones más murieron por esta causa. Sin un control eficaz de la enfermedad, estas cifras seguirán su ascenso y los entornos de países de medianos y bajos ingresos, sufrirán más fuertemente los estragos. Hoy día se cuenta con suficiente información y tecnología para prevenir y atenuar los efectos del cáncer. Este curso está orientado a profesionales de la salud del nivel primario de atención ya que tienen un alto nivel de responsabilidad en la prevención del cáncer, y en la satisfacción de necesidades de pacientes en proceso de diagnóstico, tratamiento o recuperación, lo\u003c/p\u003e\n\u003cp\u003eque plantea múltiples retos para la gestión clínica. Por ello, en este MOOC se abordarán primeramente los conceptos clave sobre el cáncer de estómago, su epidemiología (a nivel regional y mundial), el impacto que tiene, así como la prevención y la identificación oportuna de factores de riesgo. En segundo lugar, el curso está orientado a la identificación de manera adecuada de los signos, síntomas y estadios clínicos del cáncer de estómago para garantizar un adecuado diagnóstico. También se reconocerán diferentes modelos de atención, rutas clínicas y los retos que tiene el profesional actual para el adecuado manejo del cáncer de estómago en el sistema de salud; aspectos que le permitirán al profesional en salud realizar un abordaje integral de la patología en el marco de rutas de atención\u003c/p\u003e194:T9b8,"])</script><script>self.__next_f.push([1,"\u003cp\u003e¡Descubre el curso de Gestión inteligente de los destinos turísticos y despierta tu pasión por la innovación en el mundo del turismo! Este emocionante curso se centra en el uso estratégico de las tecnologías de la información y la comunicación, para impulsar la competitividad, sostenibilidad y eficiencia de los destinos turísticos.\u003c/p\u003e\n\u003cp\u003e¿Te gustaría aplicar tus conocimientos teóricos en la gestión efectiva de destinos turísticos? ¡Este curso te brindará las herramientas necesarias para lograrlo! Nuestro objetivo general es motivarte a adquirir habilidades prácticas y conocimientos sólidos en la gestión inteligente de destinos turísticos.\u003c/p\u003e\n\u003cp\u003eDurante el curso, aprenderás a identificar y evaluar oportunidades de innovación en la gestión de destinos turísticos. Exploraremos temas apasionantes, desde la gestión de la experiencia del turista hasta la aplicación de la inteligencia artificial en el turismo. Además, te sumergirás en el emocionante mundo del análisis de datos para la toma de decisiones estratégicas y descubrirás cómo implementar herramientas digitales para promover destinos turísticos de manera efectiva.\u003c/p\u003e\n\u003cp\u003eNuestro enfoque práctico se basa en estudios de casos reales, que te mostrarán experiencias exitosas de aplicación en destinos turísticos. A lo largo del curso, desarrollarás habilidades clave en gestión eficiente, toma de decisiones y resolución de problemas en el sector turismo. Un plus es que, al final del curso, podrás aproximarte a un ejercicio práctico de análisis de tendencias del sector turismo y la guía para elaborar informes, que posteriormente podrían convertirse en proyectos innovadores.\u003c/p\u003e\n\u003cp\u003e¿Sabías que este curso también te brinda la oportunidad de mejorar la competitividad y sostenibilidad de los destinos turísticos? Adquirirás habilidades relevantes para una carrera en la industria turística en constante evolución. Además, podrás acceder a las mejores prácticas en gestión de destinos turísticos en diferentes contextos y geografías, ya que nuestro programa está diseñado para adaptarse a una audiencia mundial.\u003c/p\u003e\n\u003cp\u003e¡No pierdas la oportunidad de destacarte en un mercado laboral cada vez más competitivo! Únete a nosotros y descubre las herramientas digitales y estrategias innovadoras que transformarán tu visión de los destinos turísticos.\u003c/p\u003e\n\u003cp\u003e¡Te esperamos para inspirarte y guiarte en la gestión inteligente de destinos turísticos!\u003c/p\u003e"])</script><script>self.__next_f.push([1,"195:T9a9,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa eficiencia del Sistema de Siembra Directa en Argentina fue acompañada por el desarrollo de un selecto parque de maquinaria, dentro del cual las sembradoras fueron especialmente diseñadas y cuya principal virtud es la de sembrar sobre la cobertura de rastrojos del suelo y colocar la semilla en las mejores condiciones para su germinación y emergencia. Se busca mejorar permanente cada maquinaria para adaptarla a cada ambiente.\u003c/p\u003e\n\u003cp\u003eEsto obliga a la industria a acompañar el proceso de exigencia, logrando una gran experiencia en el diseño de las máquinas con una permanente innovación, que le permite adaptarse a\u003c/p\u003e\n\u003cp\u003ediferentes situaciones agroecológicas del mundo y así poder responder a esas\u003c/p\u003e\n\u003cp\u003edemandas. \u003c/p\u003e\n\u003cp\u003eEn Argentina, al tener regiones ecológicamente tan diferentes a todo lo largo del país, los\u003c/p\u003e\n\u003cp\u003efabricantes deben producir máquinas específicas para cuatro ecorregiones, con\u003c/p\u003e\n\u003cp\u003emucha diversidad de cultivos y de suelos. Por esto, los equipos argentinos se\u003c/p\u003e\n\u003cp\u003eadaptan a las diversas situaciones, siendo una fortaleza para su\u003c/p\u003e\n\u003cp\u003eexportación a diferentes países.\u003c/p\u003e\n\u003cp\u003eLa agricultura es propia de cada lugar, pero los principios fundamentales de la misma funcionan en todo el mundo. Por lo tanto, el concepto clave es adaptar la tecnología al suelo y\u003c/p\u003e\n\u003cp\u003eno el suelo a la tecnología.\u003c/p\u003e\n\u003cp\u003eLa estrategia se fundamentó en exportar no solo maquinaria de última generación, sino también se le agregó todo el conocimiento para un correcto uso de la tecnología.\u003c/p\u003e\n\u003cp\u003eSe busca mejorar permanente cada maquinaria para adaptarla a cada ambiente.\u003c/p\u003e\n\u003cp\u003eEsto obliga a la industria a acompañar el proceso de exigencia, logrando una gran experiencia en el diseño de las máquinas con una permanente innovación, que le permite adaptarse a diferentes situaciones agroecológicas del mundo y así poder responder a esas demandas. \u003c/p\u003e\n\u003cp\u003eEn Argentina, al tener regiones ecológicamente tan diferentes a todo lo largo del país, los fabricantes deben producir máquinas específicas para cuatro ecorregiones, con mucha diversidad de cultivos y de suelos. Por esto, los equipos argentinos se adaptan a las diversas situaciones, siendo una fortaleza para su exportación a diferentes países.\u003c/p\u003e\n\u003cp\u003eLa agricultura es propia de cada lugar, pero los principios fundamentales de la misma funcionan en todo el mundo. Por lo tanto el concepto clave es adaptar la tecnología al suelo y no el suelo a la tecnología.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"196:T972,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa agricultura de precisión consiste en la utilización de una serie de herramientas tecnológicas que ayudan a tomar decisiones para ser eficientes en el uso de los insumos. Hoy es una tecnología ya adoptada en Argentina y donde todavía queda mucho camino por recorrer para su óptima aplicación.\u003c/p\u003e\n\u003cp\u003eLa agricultura de precisión dejó de ser una tecnología de información de alta complejidad, para transformarse en una tecnología de simple adopción y constante capacitación, es una herramienta que permite hacer una producción agropecuaria sustentable, disminuyendo los niveles de contaminación.\u003c/p\u003e\n\u003cp\u003eArgentina es el país en Latinoamérica de mayor desarrollo y adopción de Agricultura de Precisión y manejo de insumos según ambiente. Se están desarrollando dispositivos de censado de las aplicaciones de la maquinaria que permiten lograr trazabilidades en tiempo real, como son la medición del contenido de proteína de grano en trigo y cebada además de la medición de contenido de aceite y proteína en girasol y soja, lo que a futuro serán poderosas herramientas para aumentar eficiencias en los trabajos de campo. \u003c/p\u003e\n\u003cp\u003eEn pulverizadoras existen máquinas equipadas con piloto automático y aplicación con cortes por sección del barral de origen nacional, evitando la sobre aplicación de insumos en el lote. En siembra existen tractores y pulverizadoras equipadas con pilotos automáticos de altísima precisión y sembradoras inteligentes, que a través de prescripciones aplican distinta cantidad de insumos, según lo recomendado para cada sitio o ambiente del lote.\u003c/p\u003e\n\u003cp\u003eEn este curso podrás conocer diferentes maquinarias para siembra directa, indagaremos en conceptos de agricultura de precisión aplicados a la SD.\u003c/p\u003e\n\u003cp\u003eExploraremos en los diferentes aspectos básicos de maquinaria a utilizar; Pulverizaciones en la Siembra Directa momentos y dosis, de acuerdo a la fecha de siembra.\u003c/p\u003e\n\u003cp\u003eTrazabilidad de la pulverización. Pulverizaciones selectivas, cuidados ambientales y de la salud. Abordaremos como mejorar los cultivos mediante la fertilización en la siembra, momentos y dosis.\u003c/p\u003e\n\u003cp\u003ePor último y como final del proceso nos adentraremos en la cosechadora involucrada en el Sistema de Siembra directa, su evolución tecnológica y el desarrollo de maquinarias \u003c/p\u003e\n\u003cp\u003eEquipos de cosecha. Cuidados con el suelo y su compactación al elegir los rodados.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"197:T5e3,\u003cp\u003eCuando se trata de herramientas para el análisis de datos, siempre tenemos las siguientes preguntas: ¿Cuál es la diferencia entre tantas herramientas que existen?¿Cuál es la mejor?¿Cuál deberia aprender?\u003c/p\u003e\n\u003cp\u003eLas funciones que realizan los científicos de datos incluyen la identificación de preguntas relevantes, la recopilación de datos de diferentes fuentes de datos, la organización de datos, la transformación de datos a la solución y la comunicación de estos hallazgos para tomar mejores decisiones comerciales.\u003c/p\u003e\n\u003cp\u003eLas herramientas de ciencia de datos o Data Science pueden ser de dos tipos:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUno para aquellos que tienen conocimientos de programación.\u003c/li\u003e\n\u003cli\u003eOtro para los usuarios comerciales.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLas herramientas para el primer tipo, tienen que ver con el área de las tecnologías de información en donde se busca que la persona tenga conocimientos de algún lenguaje de programación como R o Python y comunmente a estas personas se les denomina científicos de datos.\u003c/p\u003e\n\u003cp\u003eLas herramientas que son para los usuarios comerciales se enfocan en automatizar el análisis de datos; en este tipo, los usuarios tienen conocimientos básicos de un lenguaje de programación, pero un fuerte conocimiento del área de dominio; por lo que se han empezado a llamar ciudadanos científicos de datos.\u003c/p\u003e\n\u003cp\u003eEstas herramientas te permitirán tomar las mejores decisiones basadas en el análisis de datos (también conocido como inteligencia de negocios).\u003c/p\u003e198:T8ae,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa relevancia política del género y la sexualidad en el mundo contemporáneo se evidencia en la influencia que han adquirido los activismos antigénero en la política electoral de Europa y América Latina. De la mano de partidos de derecha y ultraderecha, el también denominado antigenerismo ha contribuido a la revitalización y reinvención de nacionalismos antiinmigrantes, contrarios a los derechos sexuales y los derechos reproductivos de personas en capacidad de gestar, así como al reconocimiento legal e implementación de protocolos de cuidado en salud para personas trans y personas no binarias.\u003c/p\u003e\n\u003cp\u003eA su vez, las tecnologías de información y comunicación se han convertido en vehículo de los órdenes conservadores de género y sexualidad. Y contribuyen a la rápida expansión de ideales de belleza normativos que, desde la blanquitud, la delgadez y el consumo, definen cuerpos otros, que deben ser ‘normalizados’ a través de dietas, ejercicio y otra serie de prácticas que prometen felicidad, pese a que afectan gravemente la salud de las personas.\u003c/p\u003e\n\u003cp\u003ePor su parte, las masculinidades son discutidas en ámbitos que promueven su incorporación en la lucha por la equidad de género. Pasando de una enunciación en singular, “la masculinidad”, al plural “masculinidades”, se reconoce cada vez más que la masculinidad hegemónica es solo una entre otras posibilidades, pues personas racializadas, disidentes de género y sexualidad, etc., ponen en escena otras formas de masculinidad que no se benefician de órdenes patriarcales, sino que, por el contrario, están subordinadas a ellos.\u003c/p\u003e\n\u003cp\u003eEn este complejo panorama, activismos feministas, trans y LGBTIQ+ luchan por construir otras formas de habitar el mundo que no validen ni reproduzcan las violencias en las que se cimentan los órdenes de género y sexualidad. Se proponen construir modos de existir y de relacionarse que respeten la vida y la dignidad de todas las personas.\u003c/p\u003e\n\u003cp\u003eEn este curso consideramos que más que debates complejos, estamos ante cuestiones que tocan de cerca nuestra vida cotidiana y por ello es importante conocerlos, pues allí también se juegan prácticas de libertad y de opresión.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"199:Ta90,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa complejidad de los problemas emanados de una rápida globalización de la economía así como los grandes avances en la tecnología de la información (TI) han acelerado la aparición de sucesivas crisis económicas y sociales en las que tanto gobiernos de muchos países como empresas encuentran dificultades para adaptarse a esta nueva situación y cambiar con agilidad sus modelos de gobierno y gestión. \u003c/p\u003e\n\u003cp\u003ePor otro lado la agresión al medio ambiente y el cambio climático y la necesidad de atender los requerimientos de agentes económicos y sociales reclaman su derecho a desempeñar el rol que les corresponde. Emergen tendencias como la Responsabilidad Social Corporativa, vinculada a procesos de reporte estandarizado, como el que marca Global Reporting Initiative (GRI) y a mejoras en los esquemas de Gobernanza Corporativa, necesarias para armonizar los distintos ecosistemas tanto sociales como empresariales y ambientales garantizando la legítima participación de todas las partes interesadas y equiparando la información generada a la financiera a la hora de tomar decisiones. \u003c/p\u003e\n\u003cp\u003eEn este escenario, los activos utilizados tanto por gobiernos como empresas para desarrollar deben ser administrados de manera eficaz y eficiente para incrementar el valor de las organizaciones de manera incremental y continua garantizando principalmente la sostenibilidad económico financiera de esas organizaciones. Dentro de esos activos, la información y la TI adquieren valor importantísimo para facilitar las necesidades de transformación de las organizaciones y, especialmente gobernar y gestionar el uso adecuado de la TI tal como señala la norma ISO/IECE 38500. \u003c/p\u003e\n\u003cp\u003eEn cualquier caso, la implantación de éstas tecnologías requiere un cambio profundo en la cultura de las organizaciones, públicas y privadas y la adopción de principios y políticas internas que impidan posibles perjuicios a todas las partes interesadas en el éxito de dichas organizaciones. \u003c/p\u003e\n\u003cp\u003eLa aplicación de las distintas normas mencionadas así como renovación del concepto de Gobernanza Corporativa aplicada a los distintos activos y especialmente a la TI (dirección y control en el uso y gestión de los mismos) es uno de los grandes retos a los que se enfrenta hoy el mundo económico financiero así como la generación de conocimiento e inteligencia para resolver los graves problemas de nuestros días y en el futuro. Esta nueva forma de trabajar hará que las empresas sean más responsables, comprometidas, humanas, productivas, y más eficaces y eficientes en el liderazgo, formación y aptitud personal así como un uso adecuado de la TI por parte de la organización.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"19a:T6c6,\u003cp\u003e¿Has oído hablar de los ataques que reciben las grandes compañías o los bancos a través de sus sistemas informáticos? ¿Sabes detectar un archivo infectado por un virus? O ¿conoces medidas de seguridad para proteger un equipo o una red de ciber-ataques?\u003c/p\u003e\n\u003cp\u003eDe acuerdo con una investigación de Cybersecurity Workforce Study (2018), existe un déficit de más de cien mil profesionales con competencias para proteger los sistemas informáticos de instituciones públicas y privadas en América Latina y el Caribe, y se tiene previsto que este siga en aumento.\u003c/p\u003e\n\u003cp\u003eEste curso ofrecido por la Universidad Carlos III de Madrid y el Banco Interamericano de Desarrollo (BID), presenta una introducción a la ciberseguridad desde diferentes aspectos de esta disciplina.\u003c/p\u003e\n\u003cp\u003eAprenderás cuáles son las principales amenazas de seguridad cibernética existentes y cómo protegerte contra ellas desde un enfoque práctico, en el que se proporciona el material necesario para comprender mejor los ataques y establecer contramedidas apropiadas.\u003c/p\u003e\n\u003cp\u003eImpartido por instructores con años de experiencia en el campo de la seguridad informática, este curso allanará el camino hacia el área de seguridad de las profesiones relacionadas con tecnologías de la información (TI).\u003c/p\u003e\n\u003cp\u003eLos estudiantes que obtengan el certificado en este curso también recibirán una insignia digital. Las insignias digitales te permiten compartir fácilmente, y de forma más confiable, las habilidades o el conocimiento adquirido.\u003c/p\u003e\n\u003cp\u003ePara más informaciones sobre las insignias digitales, visitar el sitio \u003ca href=\"https://cursos.iadb.org/es/indes/credenciales-digitales\"\u003ehttps://cursos.iadb.org/es/indes/credenciales-digitales\u003c/a\u003e.\u003c/p\u003e19b:T57b,\u003cp\u003eEste curso está destinado a estudiantes universitarios de la rama de las Tecnologías de la Información y las Comunicaciones que quieran conocer los mecanismos fundamentales de las comunicaciones por fibra óptica. También es adecuado para profesionales relacionados con las instalaciones d"])</script><script>self.__next_f.push([1,"e fibra óptica que deseen comprender aspectos fundamentales sobre la generación, propagación y detección de la señal óptica. \u003c/p\u003e\n\u003cp\u003eEn él aprenderás los conceptos básicos relacionados con las comunicaciones ópticas. Tras comprender la importancia de las redes ópticas en la actualidad atendiendo a la evolución de la demanda y los servicios, se explicarán los fundamentos del guiado de la luz en la fibra óptica, así como las características de los modos propagados por fibras multimodo y monomodo. A continuación se estudiarán la atenuación y la dispersión, como efectos fundamentales de propagación en la fibra óptica, así como las limitaciones que éstos suponen en alcance y capacidad máxima. También se explicará la generación de señal óptica en LEDs y láseres, así como la detección y recuperación de la información transmitida por la fibra. Finalmente, el último capítulo permitirá al alumno realizar los cálculos necesarios para diseñar un sistema de comunicaciones ópticas, con la posibilidad de emplear técnicas multicanal WDM o SCM en estos sistemas.\u003c/p\u003e19c:T6bb,\u003cp\u003eCon el nuevo ecosistema digital se otorga a las imágenes un nuevo valor, su circulación e impacto se ha potencializado, dando apertura al surgimiento de investigaciones que problematizan estos nuevos procesos comunicativos. Es por ello que, en este curso, a partir de un estudio de las figuras de metáfora conceptual y estereotipia, se busca realizar un análisis y propuesta de enfoque de los modos de funcionamiento de la hegemonía discursiva, a partir de diferentes teorías de los discursos sociales, en especial estudios sobre la hipermediación y de teorías de la imagen en la cultura visual contemporánea, buscando aportar a la comprensión de los diversos vínculos entre discursos visuales y representación en temas de género. Este programa académico propone cubrir no solo el aprender y enseñar a través de las Tecnologías de la Información y Comunicación (TIC), sino que expone la necesidad e importancia"])</script><script>self.__next_f.push([1," de estudiar a estas como agentes capaces de impactar en las dinámicas sociales, y la responsabilidad que\u003c/p\u003e\n\u003cp\u003etienen las personas sobre la información que publican a través de ellas. Por lo cual, se espera que quienes participen adquieran las siguientes habilidades digitales:\u003c/p\u003e\n\u003cp\u003e• Buscar y curar información en el entorno digital: investigación a partir de análisis de caso en redes sociales de colectivos que propenden por la equidad de género.\u003c/p\u003e\n\u003cp\u003e• Gestionar la información: aplicación de teorías y aprendizajes de los análisis de casos estudiados. Resultado: propuesta de marcos diferenciales para la creación de piezas digitales.\u003c/p\u003e\n\u003cp\u003e• Crear recursos digitales: diseño y estrategias de comunicación enfocadas en los marcos diferenciales propuestos.\u003c/p\u003e19d:T54c,\u003cp\u003eEste curso está dirigido a profesionales, técnicos y emprendedores del sector agroindustrial interesados en profundizar en el uso de tecnologías avanzadas para optimizar sus operaciones y mejorar su competitividad. Los participantes descubrirán cómo estas innovaciones están transformando todos los aspectos de la agroindustria, desde la producción hasta la comercialización, con herramientas prácticas para su implementación.\u003c/p\u003e\n\u003cp\u003eSe explorarán tecnologías como la agricultura de precisión, drones, sensores avanzados y automatización, que permiten optimizar insumos, reducir costos operativos y mejorar la sostenibilidad. También se abordará el proceso de planificación, implementación y gestión de estas tecnologías en las empresas, incluyendo estudios de casos exitosos.\u003c/p\u003e\n\u003cp\u003eUn enfoque importante será el análisis de tecnologías de la información aplicadas a la gestión y comercialización en el sector. Se destacará Sumercé.tienda, una plataforma innovadora que conecta a productores con mercados globales, optimizando el acceso a clientes y mejorando la competitividad.\u003c/p\u003e\n\u003cp\u003eEste curso combina teoría y práctica, preparando a los participantes para implementar tecnologías avanzadas que transform"])</script><script>self.__next_f.push([1,"an sus operaciones, aumentan la eficiencia y les permiten enfrentar desafíos en un entorno competitivo.\u003c/p\u003e19e:T725,\u003cp\u003eLa era digital ha cambiado la forma en que las personas interactúan con la información y el conocimiento. \u003c/p\u003e\n\u003cp\u003eCada vez es más común tener fácil acceso a los grandes bancos de información, lo que ha aumentado la demanda de herramientas y tecnologías que permitan una búsqueda y acceso más eficiente a la información. \u003c/p\u003e\n\u003cp\u003eEn este contexto, el conocimiento básico sobre ChatGPT se ha vuelto fundamental para muchas personas, ya que se trata de una tecnología avanzada de lenguaje que permite a los usuarios interactuar con la información de manera más natural y eficiente.\u003c/p\u003e\n\u003cp\u003eChatGPT es un modelo de lenguaje desarrollado por OpenAI que ha sido entrenado con millones de documentos y páginas web para responder preguntas y brindar información en tiempo real. Esta tecnología permite a los usuarios obtener información y conocimiento de manera más rápida y precisa que la búsqueda manual en línea. Además, ChatGPT también puede ser utilizado para realizar tareas como la generación de texto, la traducción de idiomas, el análisis de textos propios y en general la resolución de problemas.\u003c/p\u003e\n\u003cp\u003eTener conocimientos básicos sobre ChatGPT es es crucial en la era digital, ya que permite a los usuarios interactuar de manera más eficiente con la información en general. Esto es especialmente importante para aquellos que dependen de volúmenes importantes de información para su trabajo o para tomar decisiones importantes en su vida diaria. \u003c/p\u003e\n\u003cp\u003ePor lo tanto, es importante que aprendas a utilizar esta herramienta y sacarle el máximo provecho para mejorar la productividad empresarial y este curso te ofrece lo necesario para poder tener los conocimientos necesarios para poder mejorar la eficiencia y efectividad en varios procesos en la vida laboral diaria gracias al ChatGPT.\u003c/p\u003e19f:T9ee,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cstrong\u003eComprender los datos digitales mejora la estrategia de comunicación\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eLa comunicación estratégica en un contexto digital sigue una perspectiva integral que implica considerar actividades enfocadas a la construcción de contenidos a partir de mecanismos de análisis, organización y estructuración de los flujos de información proporcionados por los públicos objetivos e implementar herramientas digitales que favorezcan la construcción. de sitios web basados en estrategias de interactividad multiplataforma que favorezcan la experiencia del usuario y la comunicación entre el sitio y las audiencias.\u003c/p\u003e\n\u003cp\u003eEn este sentido, en el curso de Arquitectura de la Información y Datos Digitales aprenderás a diseñar planes de contenidos sociodigitales a partir de considerar la integración del posicionamiento SEO que te permitirá escribir estratégicamente con fines de posicionamiento orgánico además de considerar interfaces lógicas que brinden a las audiencias navegación intuitiva, así como una experiencia de reconocimiento de información general simple y funcional.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eLa creatividad mejora la usabilidad y la experiencia del usuario\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAsimismo, conocerá las metodologías creativas utilizadas para la implementación de conceptos digitales que incluyen la construcción de diagramas de usabilidad, sistemas de etiquetado, redacción basada en objetivos y tipos de búsqueda, posicionamiento pago basado en SEM así como la estructuración de la arquitectura de la información y interfaz a través de la elección estratégica de contenidos multimedia (texto, imagen, vídeos y audio). Impactando positivamente en la estrategia de comunicación eligiendo un sistema de gestión de contenidos, una infraestructura propia o un modelo híbrido.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eUna base de datos promueve la comprensión de la información y los datos digitales\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eAl finalizar el curso podrás organizar planes de comunicación y marketing digital, estructurando proyectos integrales que contemplen transversalmente ventas, posicionamiento y construcción de una base de datos relevante para la sistematización de objetivos de toma de decisiones futuras. Esto impactará positivamente la usabilidad del sitio y la construcción de una constelación digital diseñada para sistemas de información interactivos y no interactivos, desde las necesidades del usuario y los objetivos del sitio hasta el diseño visual, así como los requisitos de la información misma.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1a0:T5a5,\u003cp\u003en un escenario de posibilidades tecnológicas y de acceso a la información casi ilimitados, la diferencia no la hace lo que sabemos hacer hoy, sino lo que podemos imaginar. El pensamiento creativo y su constante práctica son, como nunca antes, los medios más relevantes y seguros para liberar el potencial del hacer, del solucionar y del innovar, que cualquier persona puede desarrollar y entrenar.\u003c/p\u003e\n\u003cp\u003eLas temáticas que abordarás en este curso van desde el significado y el impacto de un estilo de vida que permita el pensamiento creativo, al uso de buenas prácticas y herramientas que faciliten el aprovechamiento de las competencias y de la unicidad individual, al interior de equipos interdisciplinarios y grupos de trabajo.\u003c/p\u003e\n\u003cp\u003eTrabajarás sobre el desarrollo de las competencias del observar profundamente, del ver de una forma diferente y ver lo que los demás normalmente no ven. Además, desarrollarás la capacidad de generar pautas de conexión entre elementos sólo aparentemente no relacionados.\u003c/p\u003e\n\u003cp\u003eLa estrategia pedagógica se basará en aprender jugando: a través de juegos somos capaces de hacer, ver e identificar nuestros límites actuales. La aplicación de ejercicios, buenas prácticas y herramientas comprobadas te permitirán derribar estos límites identificados a nivel personal y liberar el caudal de alternativas originales, únicas y creativas que cada individuo tiene el potencial de generar.\u003c/p\u003e1a1:T49e,\u003cp\u003eEl impacto generado por el COVID-19 ha golpeado drásticamente la economía mundial y la red de valor de muchas empresas. Estas dificultades se deben principalmente al comportamiento de los consumidores y el aumento de las restricciones sanitarias, afectando notablemente sus procesos y procedimientos y generando cambios en los patrones de compra y entrega.\u003c/p\u003e\n\u003cp\u003ePor ello, la colaboración juega un papel elemental para enfrentar este tipo de disrupciones y lograr empresas resilientes, debido a que es un modelo en dónde los socios de negocio alinean sus objetivos, procesos y "])</script><script>self.__next_f.push([1,"herramientas tecnológicas para incrementar el flujo de información a través de su red de valor, permitiendo reaccionar ágilmente a las tendencias de consumo y beneficiando a cada uno de los actores.\u003c/p\u003e\n\u003cp\u003eSí bien, la resiliencia desarrolla la capacidad adaptativa de una red de valor ante eventos inesperados; la colaboración genera relaciones transaccionales, acuerdos de cooperación, mecanismos de coordinación, alianzas estratégicas, integración vertical, entre otras, que fortalecerán a las redes de valor para recuperarse, retornando a su estado inicial o a uno más deseable.\u003c/p\u003e1a2:T590,\u003cp\u003eMuchas empresas desaparecen por mala administración de sus recursos, otras desaprovechan el potencial que tienen por no planear de manera estratégica. La contabilidad, al ser el lenguaje de los negocios, nos da la oportunidad de entender cómo la empresa se desempeña y relaciona con su entorno. Adicionalmente, las finanzas nos brindan herramientas que nos permiten analizar los resultados contables de la empresa y los factores económicos del entorno para tomar decisiones oportunas que les permitan a los administradores anticiparse a los diferentes riesgos que supone el mercado.\u003c/p\u003e\n\u003cp\u003eEn este curso aprenderás cómo se integra la información contable de una empresa para poder leer los estados financieros y evaluar su salud financiera. Dicha información te permitirá tomar decisiones sobre: la salud financiera de la empresa, los niveles de deuda requeridos por el negocio, las posibilidades de inversión y crecimiento, la viabilidad de futuros proyectos, los mejores indicadores de desempeño y la conveniencia de comprar o rentar un activo.\u003c/p\u003e\n\u003cp\u003eA través de las finanzas aprenderás a identificar las mejores alternativas de fondeo, seleccionar el mejor de entre distintos proyectos, administrar el efectivo de la empresa.\u003c/p\u003e\n\u003cp\u003eLos conceptos aprendidos en curso son aplicables a la empresa en su conjunto, a proyectos individuales e incluso a la administración de nuestras finanzas personales.\u003c/p\u003e1a3:T5ca,\u003cp\u003eEl cur"])</script><script>self.__next_f.push([1,"so de producción musical comenzará con algo de información sobre la naturaleza del sonido y la forma en la que lo percibimos. Estudiaremos los componentes necesarios para grabar audio en la computadora, con el fin de comprender los dispositivos que el sonido debe atravesar durante el proceso de producción musical.\u003c/p\u003e\n\u003cp\u003eEn este curso de música nos centraremos en las herramientas de edición, esenciales para la producción de música contemporánea, que todas las estaciones de trabajo de audio digital (EAD) proveen.\u003c/p\u003e\n\u003cp\u003eEstudiaremos las funciones básicas del hardware y el software para crear música de las consolas y mezcladoras de sonido, incluidos volumen, panorámicas, mute, buses, inserciones, envíos y submezclas.\u003c/p\u003e\n\u003cp\u003eEn este curso enfocado en las herramientas de la ingeniería de sonido nos centraremos en:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLas herramientas que se pueden utilizar para dar efectos musicales a la dinámica de las pistas y en cómo usarlas en un contexto musical\u003c/li\u003e\n\u003cli\u003eVeremos la ecualización y el delay, y estudiaremos los diversos efectos de sonido que se derivan de estos dispositivos\u003c/li\u003e\n\u003cli\u003eEstudiaremos el sintetizador, una herramienta muy importante dentro de la producción de música contemporánea\u003c/li\u003e\n\u003cli\u003eAprenderemos cómo funciona el sintetizador, el cual te dará un lenguaje para describir el sonido. La música es una forma de arte colaborativa, por lo tanto, no hay nada más poderoso que una comunicación efectiva\u003c/li\u003e\n\u003c/ul\u003e1a4:T500,\u003cp\u003eLas competencias digitales son esenciales para asegurar una participación activa del sujeto en la sociedad global cada vez más digital. Son competencias clave para el aprendizaje permanente, el incremento del capital científico, la gestión de información y la disminución de la brecha digital. Asimismo, son herramientas fundamentales para la enseñanza y, en el contexto actual, constituyen un elemento ineludible en el perfil docente, ampliamente requerido y valorado por las organizaciones educativas. \u003c/p\u003e\n\u003cp\u003ePor tanto, para comprender mejor sus dimensi"])</script><script>self.__next_f.push([1,"ones, niveles y ámbitos de aplicación, en este curso se analizan temas clave como la revolución digital y tecnológica, aunado a su contribución en la construcción social del conocimiento; las diversas clasificaciones del aprendizaje mediado por tecnología, con el subsecuente análisis de las tendencias educativas actuales; y la colaboración en red, como estrategia para el desarrollo académico del docente. \u003c/p\u003e\n\u003cp\u003eIndependientemente de tu experiencia previa, este curso te permitirá establecer un marco conceptual de las competencias digitales, permitiéndote identificarlas claramente, con la finalidad de establecer una estrategia para su incorporación al ejercicio de tu práctica profesional.\u003c/p\u003e1a5:T8c6,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"ES\"\u003e¿Y si la solución a muchas de las problemáticas sociales se diera al interconectarnos mejor entre humanos y el mundo real por medio de dispositivos electrónicos?\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eDesde esta posibilidad se aborda el curso, buscando aprender a implementar prototipos en el que tener diferentes dispositivos interconectados sea un requerimiento para la solución. Los dispositivos electrónicos que siguen en crecimiento son los teléfonos celulares y por ello se vuelven una herramienta fundamental como puntos de contacto entre los individuos y la red digital.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eSi hacemos uso de los dispositivos electrónicos para la obtención de información en lo que parece ser tiempo real, intercambiar información para gestionar un proceso, detectar un evento o el valor de algún parámetro físico, se fortalecerá la gestión y toma de decisiones de las sociedad vinculada y beneficiada de dicha red.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eNo pierdas la oportunidad de obtener conocimientos específicos, aplicados y con alcances prácticos, usando herramientas especializadas de alto nivel para crear tu prototipo de impacto tecnológico-social. Puede que tu solución inicie con solo unos cuantos dispositivos para luego alcanzar miles o cientos de miles de ellos, con las herramientas y enseñanzas propuestas no tendrás que pasar por reprocesos o rediseños significativos como sucede con la gran mayoría de herramientas de código abierto.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEn este curso \u003cspan lang=\"ES\"\u003einiciará con una introducción a las últimas tecnologías en el marco de la revolución 4.0 y la gestión de proyectos de tecnología. Luego, se ahondará en la construcción de prototipos en el contexto del internet del todo para la resolución de problemáticas sociales.\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eÉste curso se articula con el MOOC “Protothinking®️ para proyectos sociales” de forma que tengas la estrategia y la implementación. Aunque este curso no presenta ningún pre o co-requisito, es altamente recomendable que tomes los dos cursos.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1a6:T631,\u003cp\u003e\u003cspan lang=\"ES-TRAD\"\u003eA lo largo de los años, la inteligencia artificial ha logrado muchos años de evolución. Existen antecedentes desde los años 50s que brindaron los fundamentos para llegar al crecimiento del poder computacional que vemos hoy en día.\u003c/span\u003e\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eLa inteligencia artificial se ha rodeado de diversos mitos y realidades, en especial hacia su concepto, que permiten identificar sus alcances y potencialidades, comprendiendo el mecanismo de cómo se genera un aprendizaje de máquina, visualizando los procesos que pueden ser automatizados.\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEn los últimos años, se ha visto una reducción de costos para la adopción de internet, aumento de las capacidades de almacenamiento y procesamiento de información; esto ha logrado reducir barreras de adopción de inteligencia artificial, por lo que tener una solución en los negocios resulta cada vez más real y alcanzable.\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eSi deseas implementar soluciones de inteligencia artificial en tu negocio o implementar un negocio nuevo de soluciones de inteligencia artificial este curso es para ti. No importa si no tienes experiencia en el desarrollo tecnológico, la toma de decisiones es tu principal motivador para generar valor con esta tecnología.\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCada uno de los temas permite relacionar el aprendizaje automático para utilizar herramientas de inteligencia artificial poco conocidas y que están al alcance, creando una propuesta de valor basada en inteligencia artificial.\u003c/p\u003e1a7:T5df,\u003cp\u003eEl futuro pertenece a la ciencia de datos y a quienes la entiendan. Al igual que el petróleo y el gas impulsaron las economías de los siglos XX y XXI, los datos impulsan cada vez mas la innovación y la economía global a medida que avanzamos hacia una nueva era denominada la revolución digital.\u003c/p\u003e\n\u003cp\u003eLas empresas que están cambiando a una mentalidad de datos van a obtener primero una enorme ventaja competitiva.\u003c/p\u003e\n\u003cp\u003eEsto se ha con"])</script><script>self.__next_f.push([1,"vertido en una verdad universal: las empresas modernas se están inundando de big data. El año pasado, McKinsey estimó que las iniciativas de Big Data en el sistema de salud de los Estados Unidos, \"podrían representar de $300 mil millones a $450 mil millones en gastos de salud reducidos o del 12 al 17 por ciento de la línea de base de $2.6 billones en costos de salud de los Estados Unidos\". Por otro lado, sin embargo se estima que los datos erróneos le cuestan a los Estados Unidos apróximadamente $3.1 trillones de dólares al año.\u003c/p\u003e\n\u003cp\u003eAunque la ciencia de datos representará ventajas puntuales para las empresas como mitigar el riesgo y/o el fraude; entregar al cliente productos relevantes y tener experiencias personalizadas al mismo, es sin embargo, importante notar que la ciencia de datos podrá agregar un valor a cuaquier negocio, siempre y cuando pueda usar bien sus datos. El análisis de la información y la inteligencia de negocios ayudan a las organizaciones a tomar decisiones inteligentes basadas en el análisis de datos.\u003c/p\u003e1a8:T4f6,\u003cp\u003eConoce los principales hitos del desarrollo de la Inteligencia Artificial a través de la historia, recorriendo los planteamientos, desafíos y desarrollos que hoy en día hacen posible la existencia de plataformas asistidas por IA como ChatGPT. Aprende como ChatGPT genera contenido en texto mediante modelos de procesamiento del lenguaje natural y conoce su interfaz para comenzar a utilizarlo sin conocimientos previos.\u003c/p\u003e\n\u003cp\u003eConoce que son los avisos (o instrucciones) y aprende a estructurarlos mediante diferentes estrategias que buscan optimizar los resultados generados por ChatGPT. Estudia diferentes aplicaciones prácticas en entornos educativos y laborales para diseñar una estrategia de implementación propia. Experimenta con cada nuevo concepto y desarrolla habilidades para complementar actividades y tareas, reduciendo los tiempos operativos e incrementando la productividad.\u003c/p\u003e\n\u003cp\u003eConoce sobre las consideraciones éticas que involucran el uso de plataforma"])</script><script>self.__next_f.push([1,"s como ChatGPT y analiza sus capacidades y limitaciones para implementarlo de manera consciente y responsable en tu entorno de trabajo. Los beneficios de ChatGPT se encuentran al alcance de tus manos, ¿qué esperas para sumergirte en el mundo de la Inteligencia Artificial generativa?\u003c/p\u003e1a9:T6d6,\u003cp\u003eDigamos que necesitas comprender big data; miles o incluso millones de filas de datos, y tienes poco tiempo para hacerlo. los datos pueden provenir de tu equipo, en cuyo caso tal vez ya estés familiarizado con lo que estás midiendo y de los resultados que se esperan. O puede provenir de otro equipo, o tal vez de varios equipos a la vez, y estar completamente familiarizado.\u003c/p\u003e\n\u003cp\u003eDe cualquier manera, la razón por la que lo estás viendo es porque tienes que tomar una decisión lo mas rápido posible y sería de gran ayuda que los datos te informen como tomarla (inteligencia de negocios); pues esa decisión podrá afectar positiva o negativamente a un cliente, a un producto o a toda la organización. En este curso online, conocerás una parte importante de la ciencia de datos o Data Science; la visualización de los datos y las herramientas que puedes usar para aplicarlos.\u003c/p\u003e\n\u003cp\u003eDebido a la forma en que el cerebro humano procesa la información, usar tablas o gráficos para visualizar grandes cantidades de datos complejos es mas fácil que analizar hojas de cálculo o informes. La visualización de datos es una forma rápida y fácil de transmitir conceptos de manera universal, y es posible el poder experimentar con diferentes escenarios haciendo pequeños ajustes.\u003c/p\u003e\n\u003cp\u003eLa visualización de datos es la presentación de datos en un formato gráfico.\u003c/p\u003e\n\u003cp\u003ePermite a los tomadores de decisiones ver el análisis presentados visualmente, para que puedan comprender conceptos dificiles o identificar nuevos patrones. La visualización de datos revela informacion inadvertida, especiamente en grandes conjuntos de datos (big data); da respuestas mas rápido; y ayuda a entender mas fácilmente la relación causa-efecto.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1aa:T4fa,\u003cp\u003eEl participante podrá ser capáz de utilizar diversas formas y habilidades del pensamiento o métodos de indagación (methods of inquiry) al aproximarse al análisis de problemas complejos.\u003c/p\u003e\n\u003cp\u003eContará también con una visión más completa y aprenderá a poner a prueba su propio juicio y las bases de sus suposiciones al resolver problemas y diseñar soluciones. Las habilidades de pensamiento le permitirán sintetizar en un todo coherente (coherent whole) la información recopilada desde diveras perspectivas.\u003c/p\u003e\n\u003cp\u003eEl problema crucial de nuestro tiempo es el de la encesidad de un pensamiento apto para aceptar el desafío de la complejidad de lo real, apto para aprender de las relaciones, las interacciones y las implicaciones mutuas, los fenómenos multidimensionales.\u003c/p\u003e\n\u003cp\u003eEste curso también te invita a llevar a cabo una reforma del pensamiento, integrando de manera transdisciplinaria el pensmaiento sistémico, el pensmaiento crítico y el pensamiento complejo, lo cual nos permitirá contar con nuevas formas de indagación colectiva.\u003c/p\u003e\n\u003cp\u003eYa no se trata solamente de la ilustración versus el oscurantismo, el hombre tiene que aprender a pensar de nuevo, incorporando lo mejor de sus habilidades del pensamiento en la solución de problemas.\u003c/p\u003e1ab:T620,\u003cp\u003eEn este curso, estudiaremos la forma en que los diversos sistemas de pensamiento y formas de cognición se entrelazan e interrelacionan, y nos permiten construir modelos mentales para interpretar el mundo y poder proponer formas alternas en el planteamiento y solución de problemas.\u003c/p\u003e\n\u003cp\u003eSe analiza de manera integral cómo cada forma de pensamiento contribuye en las diversas etapas de la indagación y solución de problemas, haciendo énfasis en la contribución de los diversos saberes colectivos que se obtienen al abrir nuestras perspectivas y visión de las cosas.\u003c/p\u003e\n\u003cp\u003eEl curso perfila diversas formas de intervención a la hora de enfrentar los problemas complejos de nuestro tiempo, disminuyendo con ellos las polarizaciones que se dan en"])</script><script>self.__next_f.push([1," las búsquedas de las soluciones a los problemas.\u003c/p\u003e\n\u003cp\u003eMediante todo lo anterior, el curso busca crear los hábitos de la mente, para pensar y actuar de manera colectiva a la hora de resolver los problemas retorcidos, que la modernidad plantea.\u003c/p\u003e\n\u003cp\u003eEste curso te permitirá:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDesarrollar y ampliar tu visión holística de los problemas.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e*Adquirir nuevos métodos de indagación, relacionados con la complejidad y la manera de comprender el mundo.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003eDiseñar formas alternativas de intervención social.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eTrabajar en equipo para aprovechar el conocimiento colectivo.\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eProponer formas alternas de solución de problemas retorcidos (wcked problems).\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003eConvertirte en un pensador reflexivo y autónomo.\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e1ac:Ta00,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa visualización de datos surge como una poderosa herramienta que trnasforma los datos sin procesas en representaciones significativas y visualmente convincentes.\u003c/p\u003e\n\u003cp\u003eLa visualización de datos también mejora la comunicación y la colaboración dentro de las organizaciones. Las representaciones visuales de datos facilitan el intercambio de conocimientos y hallazgos entre los equipos y departamentos. En lugar de revisar páginas de hojas de cálculo o informes, las partes interesadas pueden interpetar y analizar la información sin ningún esfuerzo cuando se presenta visualmente. Esto promueve una comprensión compartida y alinea a los equipos hacia los mismos objetivos comunes, lo que, en última instancia, fomenta una colaboración más eficaz y eficiente.\u003c/p\u003e\n\u003cp\u003ePodemos concluir que la visualización de datos permite a las organizaciones identificar información procesable e impulsar fuertemente a la innovación. Al visualizar los datos de diferentes maneras, los patrones y los valores atípicos se pueden detectar fácilmente, situaciones lo que lleva a nuevos descubrimientos y oportunidades valiosas. Las herramientas de visualización también admiten la exploración interactiva, lo que permite a los usuarios profundizar en puntos de datos específicos o filtrar información según sus criterios de interés. Esta flexibilidad permite a las organizaciones descubrir relaciones ocultas, descubrir nuevas tendencias y hacer prediciones informadas, lo que lleva a la innovación y la ventaja competitiva.\u003c/p\u003e\n\u003cp\u003eEn este curso de Visualización de datos - Impacto en la gestión empresarial aprenderás sobre las 3 herramientas que se han colocado en la preferencia de las organizaciones cuando se busca obtener información significativa de los grandes volúmenes de datos en constante aumento que las organizaciones están teniendo. Lo que te permitirá aprovechar los datos para tomar decisiones de manera efectiva y mantenerte a la vanguardia en el panorama actual basado en los datos y sus analíticas.\u003c/p\u003e\n\u003cp\u003eLa visualización de datos ayuda a contar historias seleccionando los datos en una forma más fácil de entender, destacando las tendencias y los valores atípicos. Una buena visualización cuenta una historia, eliminando el ruido de los datos y resaltando la información útil. La visualización de datos es un tema delicado de equilibrio entre forma y función. Recuerda que los datos y los elementos visuales deben trabajar juntos, y que hay algo de arte en combinar un gran análisis con una gran narración.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ad:T87f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eNuestras economías están sedientas de energía. Sin energía la economía mundial simplemente se detendría en seco; no habría generación suficiente de electricidad, combustibles para los automóviles, transporte público, transporte terrestre de mercancías, ya sea por ferrocarril o autobús. No se podrían mover las mercancías por vía marítima, la producción alimenticia sufriría de problemas, el suministro de agua potable se vería comprometido.\u003c/p\u003e\n\u003cp\u003eLa energía ha permitido desde finales del Siglo XVIII, un desarrollo sin igual en los ámbitos científico, tecnológico y económico de nuestra sociedad. Hemos gozado, hasta ahora, de un suministro relativamente barato de energía a través de los combustibles fósiles, generando un impacto ambiental negativo.\u003c/p\u003e\n\u003cp\u003eLa trayectoria seleccionada de consumo de combustibles fósiles hasta el momento, no es sostenible a largo plazo. De ahí el reto que no debemos esquivar, aun cuando lo podríamos negar: ¿qué debemos hacer para lograr una supervivencia futura hacia una economía de bajo carbono con una menor dependencia de los combustibles fósiles, y así asegurar que las generaciones futuras tengan la posibilidad de disfrutar una mejor calidad de vida?\u003c/p\u003e\n\u003cp\u003eEstamos ante un hito histórico sobre cómo debemos usar y apropiarnos de los recursos naturales, así como trabajar en disminuir la pobreza y desigualdad social.\u003c/p\u003e\n\u003cp\u003eEste curso te permitirá adentrarte al fascinante mundo de la energía. Los contenidos del curso, además de brindarte herramientas para la interpretación y manejo de información básica sobre la energía, te llevarán a través de los cambios históricos ligados con la energía que han sido fundamentales en el desarrollo de la sociedad moderna. Los contenidos del curso te ayudarán a la resolución de preguntas como: ¿ha sido siempre la energía un factor de cambio en el desarrollo de la sociedad? ¿la era del petróleo se terminará antes de que se termine el petróleo? ¿cuál es la importancia actual de los energéticos en la economía? ¿te imaginas cómo se obtendrá la energía necesaria para mantener nuestra calidad de vida en el futuro?\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ae:T43d,\u003cp\u003eAre you fascinated by Geosciences and willing to take the challenge of predicting the nature and behavior of the Earth subsurface? This is your course!\u003c/p\u003e\n\u003cp\u003eIn a voyage through the Earth, you will explore the Earth interior and master the processes forming mountains and sedimentary basins. You will understand how sediments are formed, transported, deposited and deformed. You will also acquire basic knowledge on the two most important sources of subsurface energy: hydrocarbons and water (this in terms of hydrogeology and geothermal energy)geothermal! Key knowledge in times of global change climate change and energy transition!\u003c/p\u003e\n\u003cp\u003eThe course focuses on fundamental processes, exploring their nature and quantitative interactions. It will show you how to use the acquired knowledge to predict the nature and behavior of the Earth subsurface.\u003c/p\u003e\n\u003cp\u003eThis is your ideal first step as a future Geoscientists or professional to upgrade your knowledge in the domain of Earth Sciences. Skilled professionals are key for the safe and responsible use of the Earth subsurface.\u003c/p\u003e1af:T706,\u003cp\u003eIn this course: (1) you will learn to model the multi-axial stress-strain response of isotropic linear elastic material due to combined loads (axial, torsional, bending); (2) you will learn to obtain objective measures of the severity of the loading conditions to prevent failure; (3) you will learn to use energy methods to efficiently predict the structural response of statically determinate and statically indeterminate structures.\u003c/p\u003e\n\u003cp\u003eThis course will give you a foundation to predict and prevent structural failure and will introduce you to energy methods, which form one basis for numerical techniques (like the Finite Element Method) to solve complex mechanics problems\u003c/p\u003e\n\u003cp\u003eThis is the third course in a 3-part series. In this series you will learn how mechanical engineers can use analytical methods and “back of the envelope” calculations to predict structural behavior. The three courses in the series are:\u003ca href=\"https:"])</script><script>self.__next_f.push([1,"//www.edx.org/course/elements-of-structures\"\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePart 1 – 2.01x: Elements of Structures. (Elastic response of Structural Elements: bars, shafts, beams).\u003ca href=\"https://www.edx.org/course/mechanics-of-deformable-structures-part-1\"\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePart 2 – 2.02.1x Mechanics of Deformable Structures: Part 1. (Assemblages of Elastic, Elastic-Plastic, and Viscoelastic Structural Elements).\u003c/p\u003e\n\u003cp\u003ePart 3 – 2.02.2x Mechanics of Deformable Structures: Part 2. (Multi-axial Loading and Deformation. Energy Methods).\u003c/p\u003e\n\u003cp\u003eThese courses are based on the first subject in solid mechanics for MIT Mechanical Engineering students. Join them and learn to rely on the notions of equilibrium, geometric compatibility, and constitutive material response to ensure that your structures will perform their specified mechanical function without failing.\u003c/p\u003e1b0:T6ac,\u003cp\u003eThis course covers the fundamentals of advanced fluid mechanics: including its connections to continuum mechanics more broadly, hydrostatics, buoyancy and rigid body accelerations, inviscid flow, and the application of Bernoulli’s theorems, as well as applications of control volume analysis for more complex fluid flow problems of engineering interest. This course features lecture and demo videos, lecture concept checks, practice problems, and extensive problem sets.\u003c/p\u003e\n\u003cp\u003eThis course is the first of a three-course sequence in incompressible fluid mechanics: Advanced Fluid Mechanics: Fundamentals, Advanced Fluid Mechanics: The Navier-Stokes Equations for Viscous Flows, and Advanced Fluid Mechanics: Potential Flows, Lift, Circulation \u0026amp; Boundary Layers. The series is based on material in MIT’s class 2.25 Advanced Fluid Mechanics, one of the most popular first-year graduate classes in MIT’s Mechanical Engineering Department. This series is designed to help people gain the ability to apply the governing equations, the principles of dimensional analysis and scaling theory to develop physically-based, approximate models of complex fluid physics phenomena. Peopl"])</script><script>self.__next_f.push([1,"e who complete these three consecutive courses will be able to apply their knowledge to analyze and break down complex problems they may encounter in industrial and academic research settings.\u003c/p\u003e\n\u003cp\u003eThe material is of relevance to engineers and scientists across a wide range of mechanical chemical and process industries who must understand, analyze and optimize flow processes and fluids handling problems. Applications are drawn from hydraulics, aero \u0026amp; hydrodynamics as well as the chemical process industries.\u003c/p\u003e1b1:T648,\u003cp\u003eThis online course from the MIT Department of Mechanical Engineering introduces principles of structural analysis and mechanics of materials for understanding and predicting material behavior under stress.\u003c/p\u003e\n\u003cp\u003eYou will learn fundamental concepts of continuum mechanics, including internal resultants, displacement field, stress, and strain, with applications to three essential types of elastic load-bearing elements: bars in axial loading, axisymmetric shafts in torsion, and symmetric beams in bending.\u003c/p\u003e\n\u003cp\u003eWhile emphasizing analytical techniques, the course also introduces computing environments using MATLAB and numerical methods (Finite Elements).\u003c/p\u003e\n\u003cp\u003eThis is the first course in a 3-part series which explores how mechanical engineers use analytical methods and calculations to predict structural behavior. The three courses in the series are:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ePart 1 – 2.01x: Elements of Structures. Elastic response of Structural Elements: Bars, Shafts, Beams. \u003c/li\u003e\n\u003cli\u003ePart 2 – 2.02.1x Mechanics of Deformable Structures: Part 1. Assemblages of Elastic, Elastic-Plastic, and Viscoelastic Structural Elements. \u003c/li\u003e\n\u003cli\u003ePart 3 – 2.02.2x Mechanics of Deformable Structures: Part 2. Multi-axial Loading and Deformation. Energy Methods. \u003cbr /\u003e\nBased on the first subject in solid mechanics for MIT Mechanical Engineering students, these undergraduate-level courses will teach you to rely on the notions of equilibrium, geometric compatibility, and constitutive material response to ensure that yo"])</script><script>self.__next_f.push([1,"ur structures will perform their specified mechanical functions without failing.\u003c/li\u003e\n\u003c/ul\u003e1b2:T656,\u003cp\u003eMany natural and man-made structures can be modeled as assemblages of interconnected structural elements loaded along their axis (bars), in torsion (shafts) and in bending (beams). In this course you will learn to use equations for static equilibrium, geometric compatibility and constitutive material response to analyze structural assemblages. \u003c/p\u003e\n\u003cp\u003eThis course provides an introduction to behavior in which the shape of the structure is permanently changed by loading the material beyond its elastic limit (plasticity), and behavior in which the structural response changes over time (viscoelasticity). \u003c/p\u003e\n\u003cp\u003eThis is the second course in a 3-part series. In this series you will learn how mechanical engineers can use analytical methods and “back of the envelope” calculations to predict structural behavior. The three courses in the series are: \u003c/p\u003e\n\u003cp\u003ePart 1 – 2.01x: Elements of Structures. (Elastic response of Structural Elements: Bars, Shafts, Beams).\u003cbr /\u003e\nPart 2 – 2.02.1x Mechanics of Deformable Structures: Part 1. (Assemblages of Elastic, Elastic-Plastic, and Viscoelastic Bars in axial loading).\u003cbr /\u003e\nPart 3 – 2.02.2x Mechanics of Deformable Structures: Part 2. (Assemblages of bars, shafts, and beams. Multi-axial Loading and Deformation. Energy Methods). \u003c/p\u003e\n\u003cp\u003eThese courses are based on the first subject in solid mechanics for MIT Mechanical Engineering students. Join them and learn to rely on the notions of equilibrium, geometric compatibility, and constitutive material response to ensure that your structures will perform their specified mechanical function without failing.\u003c/p\u003e1b3:T486,\u003cp\u003eAll around us, engineers are creating materials whose properties are exactly tailored to their purpose. This course is the third of three in a series of mechanics courses from the Department of Materials Science and Engineering at MIT. Taken together, these courses provide similar content to the MIT subject 3.032"])</script><script>self.__next_f.push([1,": Mechanical Behavior of Materials.\u003c/p\u003e\n\u003cp\u003eThe 3.032x series provides an introduction to the mechanical behavior of materials, from both the continuum and atomistic points of view. At the continuum level, we learn how forces and displacements translate into stress and strain distributions within the material. At the atomistic level, we learn the mechanisms that control the mechanical properties of materials. Examples are drawn from metals, ceramics, glasses, polymers, biomaterials, composites and cellular materials.\u003c/p\u003e\n\u003cp\u003ePart 3 covers viscoelasticity (behavior intermediate to that of an elastic solid and that of a viscous fluid), plasticity (permanent deformation), creep in crystalline materials (time dependent behavior), brittle fracture (rapid crack propagation) and fatigue (failure due to repeated loading of a material).\u003c/p\u003e1b4:T631,\u003cp\u003eAll around us, engineers are creating materials whose properties are exactly tailored to their purpose. This course is the second of three in a series of mechanics courses from the Department of Materials Science and Engineering at MIT. Taken together, these courses provide similar content to the MIT subject 3.032: Mechanical Behavior of Materials.\u003c/p\u003e\n\u003cp\u003eThe 3.032x series provides an introduction to the mechanical behavior of materials, from both the continuum and atomistic points of view. At the continuum level, we learn how forces and displacements translate into stress and strain distributions within the material. At the atomistic level, we learn the mechanisms that control the mechanical properties of materials. Examples are drawn from metals, ceramics, glasses, polymers, biomaterials, composites and cellular materials.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://www.edx.org/course/mechanical-behavior-materials-part-1-mitx-3-032-1x\"\u003ePart 1\u003c/a\u003e covers stress-strain behavior, topics in linear elasticity and the atomic basis for linear elasticity, and composite materials.\u003c/p\u003e\n\u003cp\u003ePart 2 covers stress transformations, beam bending, column buckling, and cellular materials.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://"])</script><script>self.__next_f.push([1,"www.edx.org/course/mechanical-behavior-materials-part-3-mitx-3-032-3x\"\u003ePart 3\u003c/a\u003e covers viscoelasticity (behavior intermediate to that of an elastic solid and that of a viscous fluid), plasticity (permanent deformation), creep in crystalline materials (time dependent behavior), brittle fracture (rapid crack propagation) and fatigue (failure due to repeated loading of a material).\u003c/p\u003e1b5:T630,\u003cp\u003eAll around us, engineers are creating materials whose properties are exactly tailored to their purpose. This course is the first of three in a series of mechanics courses from the Department of Materials Science and Engineering at MIT. Taken together, these courses provide similar content to the MIT subject 3.032: Mechanical Behavior of Materials.\u003c/p\u003e\n\u003cp\u003eThe 3.032x series provides an introduction to the mechanical behavior of materials, from both the continuum and atomistic points of view. At the continuum level, we learn how forces and displacements translate into stress and strain distributions within the material. At the atomistic level, we learn the mechanisms that control the mechanical properties of materials. Examples are drawn from metals, ceramics, glasses, polymers, biomaterials, composites and cellular materials.\u003c/p\u003e\n\u003cp\u003ePart 1 covers stress-strain behavior, topics in linear elasticity and the atomic basis for linear elasticity, and composite materials.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://www.edx.org/course/mechanical-behavior-materials-part-2-mitx-3-032-2x\"\u003ePart 2\u003c/a\u003e covers stress transformations, beam bending, column buckling, and cellular materials.\u003c/p\u003e\n\u003cp\u003e\u003ca href=\"https://www.edx.org/course/mechanical-behavior-materials-part-3-mitx-3-032-3x\"\u003ePart 3\u003c/a\u003e covers viscoelasticity (behavior intermediate to that of an elastic solid and that of a viscous fluid), plasticity (permanent deformation), creep in crystalline materials (time dependent behavior), brittle fracture (rapid crack propagation) and fatigue (failure due to repeated loading of a material).\u003c/p\u003e1b6:Tafa,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"EN-US\"\u003e“\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003eLa cantidad de datos a nivel mundial se duplica cada tres años y el futuro de las empresas depende de saber convertirlos en activos de negocios”, fuente: McKinsey \u0026amp; Company.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e“75% de las compañías carecen de las habilidades y la tecnología para sacar el máximo provecho de los datos que recolectan”, fuente: PWC\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCuando hablamos de datos estructurados nos referimos a los datos que se encuentran almacenados en la mayoría de bases de datos. Son datos que pueden ser extraídos y procesados fácilmente por herramientas de minería de datos entre ellas el Lenguaje de Consultas Estructurado SQL.\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003cspan lang=\"EN-US\"\u003e\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eSi eres programador indudablemente, vas a tener que utilizar el lenguaje SQL. Al final, salvo contadas excepciones, la mayor parte de los programas deben almacenar y recuperar información en mayor o menor medida. Y la mayor parte de esta información se sigue guardando en bases de datos relacionales. Por ello, es muy difícil escapar de SQL,.\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAhora bien, si no eres programador, es posible que con el tiempo, te conviertas en algún funcionario, empleado o profesional con tipo de mando intermedio o jefe de proyectos. En ese caso, con toda seguridad, una de las tareas propias de tu cargo va a ser obtener información y consultar datos de todo tipo: tareas y tiempos, errores, uso de características, efectividad de cambios, entre otros. Hay muchas probabilidades de que la mayor parte de\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e esta información esté recogida en una base de datos, y querrás usar SQL para poder acceder a ella sin ayuda externa.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEn este mismo sentido, si trabajas en mercadeo o en cualquier puesto de dirección, necesitarás analizar crecimientos, efectividad de campañas, correlaciones entre acciones y resultados y aunque uses algunas herramientas estándar para ver la información, seguro que muchos de estos datos acaban en una base de datos relacional o en un almacén que puede consultarse usando SQL. Hasta puedes usar el lenguaje SQL para acceder a información que luego exportarás en una hoja de cálculo Excel o en una herramienta para visualizar datos y generar bonitos informes, con gráficos y cálculos basados en tus consultas previas\u003cspan lang=\"EN-US\"\u003e.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eSi quieres hacer una carrera en el mundo de la inteligencia empresarial ( \u003cem\u003ebussiness intelligence\u003c/em\u003e ), o si desea convertirse en un científico de datos, un conocimiento práctico de las bases de datos, el lenguaje SQL es imprescindible.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1b7:T10a5,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003e¿Sabías que una acción ante el cambio climático también se puede llevar a cabo mediante la incorporación de estrategias verdes y resilientes en la vivienda?\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003ePero ¿qué significa que una vivienda se considere verde y resiliente?\u003c/p\u003e\n\u003cp\u003eO ¿es posible implementar estrategias verdes y resilientes en viviendas ya construidas o antiguas?\u003c/p\u003e\n\u003cp\u003eTe invitamos a participar en este curso para profundizar a las respuestas a estas preguntas y aprender sobre diseño de viviendas verdes y resilientes con los expertos del BID.\u003c/p\u003e\n\u003cp\u003eEl sector de la vivienda verde está creciendo rápidamente y representa un gran nicho de mercado, se estima que la construcción verde residencial alcance los 15,7 billones de dólares en 2030, una gran oportunidad para que los actores del sector privado adapten sus modelos de negocio según la demanda cambiante de los consumidores, el apetito de los inversores y las regulaciones mundiales.\u003c/p\u003e\n\u003cp\u003eLa vivienda es una de las condiciones sociales básicas que determina la calidad de vida y el bienestar de la población. La agenda del programa Hábitat II en la Conferencia de las Naciones Unidas sobre los Asentamientos Humanos en Estambul (1996), enfatizó la necesidad de atender la demanda de vivienda desde una perspectiva que no sólo provea un techo capaz de prestar refugio a las personas, sino que también proporcione confort térmico, saneamiento y \u003cspan lang=\"ES-ES\"\u003eadaptación a las condiciones \u003c/span\u003emedioambientales\u003cspan lang=\"ES-ES\"\u003e del entorno de la vivienda, así como también, sea accesible y asequible para todos los diferentes grupos sociales. \u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEntre los temas que se abordarán en este curso están los fundamentos de una vivienda verde y resiliente, herramientas y estrategias para un diseño verde basado en tecnologías modernas y convencionales, incentivos y productos para el financiamiento verde.\u003c/p\u003e\n\u003cp\u003ePor último, la modalidad de este curso es \"a tu propio ritmo ( \u003cem\u003eself-paced\u003c/em\u003e )\". Esto significa que puedes registrarte en cualquier momento, aunque lleve abierto un tiempo. \u003c/p\u003e\n\u003cp\u003eSi optas por la \u003cstrong\u003emodalidad asistente\u003c/strong\u003e tendrás acceso ilimitado a los contenidos del curso, pero no podrás realizar las actividades evaluadas ni obtener el certificado.\u003c/p\u003e\n\u003cp\u003eSi optas por la \u003cstrong\u003emodalidad certificado verificado\u003c/strong\u003e puedes acceder al curso y sus evaluaciones hasta la fecha de cierre, tras hacer un pago de USD 10\u003cspan lang=\"ES-ES\"\u003e. \u003c/span\u003e\u003cspan lang=\"ES-ES\"\u003eDe esta forma, si apruebas, además del certificado verificado, obtendrás una \u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cursos.iadb.org/es/indes/credenciales-digitales\" rel=\"noopener\" target=\"_blank\"\u003e\u003cspan lang=\"ES-ES\"\u003einsignia digital\u003c/span\u003e\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e que permite transformar la forma en que compartes tus logros académicos y profesionales, como, por ejemplo, en redes sociales.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"ES-AR\"\u003e¿Conoces la ayuda financiera de edX para optar al certificado verificado e insignia digital?\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eEdX ofrece asistencia financiera a aquellos alumnos que tengan dificultades para realizar el pago. Inscríbete en el curso y rellena esta \u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://courses.edx.org/financial-assistance/\" rel=\"noopener\" target=\"_blank\"\u003esolicitud de asistencia financiera\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eConsulta más información en el apartado de \"Preguntas frecuentes\" que encontrarás más abajo.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e¿A QUIÉN ESTA DIRIGIDO ESTE CURSO?\u003c/p\u003e\n\u003cp\u003eA. Funcionarios públicos vinculados en el desarrollo de programas de vivienda en ministerios de vivienda, de obras públicas, de finanzas u otros interesados en la planificación, diseño y construcción de vivienda verde; así como en el desarrollo de políticas públicas afines.\u003c/p\u003e\n\u003cp\u003eB. Profesionales del sector privado y empresas interesadas en la planificación, diseño, construcción y financiación de vivienda verde.\u003c/p\u003e\n\u003cp\u003eC. Profesionales de innovación y emprendimiento en cuanto a diseño de viviendas verdes y resilientes.\u003c/p\u003e\n\u003cp\u003eD. Profesores y estudiantes de universidad interesados en aprender buenas prácticas de diseño de vivienda verde y resiliente.\u003c/p\u003e\n\u003cp\u003eE. Profesionales o empresas de innovación como Govtech, Cleantech, Proptech\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1b8:T829,"])</script><script>self.__next_f.push([1,"\u003cp\u003e“If history is our guide, we can assume that the battle between the intellect and will of the human species and the extraordinary adaptability of microbes will be never-ending.” (1)\u003c/p\u003e\n\u003cp\u003eDespite all the remarkable technological breakthroughs that we have made over the past few decades, the threat from infectious diseases has significantly accelerated. In this course, we will learn why this is the case by looking at the fundamental scientific principles underlying epidemics and the public health actions behind their prevention and control in the 21st century.\u003c/p\u003e\n\u003cp\u003eThis is the first (origins of novel pathogens) of the four courses, covers these topics:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eEpidemics: Past, Present and Future\u003c/li\u003e\n\u003cli\u003eDiscussion on Ebola and Zika Outbreak, and Supplementary Module on Next Generation Informatics for Global Health\u003c/li\u003e\n\u003cli\u003eEcology, Evolution and Emergence of Infectious Diseases\u003c/li\u003e\n\u003cli\u003eMedical Detective: Bug Hunting in Epidemics\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e如果历史是我们的向导,我们可以认为人类的智慧和意志与微生物种惊人的适应性之间的斗争将永远持续下去。”(1)\u003c/p\u003e\n\u003cp\u003e尽管过去的几十年间我们在科技领域取得了令人瞩目的突破,可是传染病对人类的威胁却显著增加。本课程将通过学习流行病学的基础科学原理以及预防与控制流行病的公共卫生措施,对上述现象予以阐释。\u003c/p\u003e\n\u003cp\u003e这是四個课程中的第一个(新型病原體的起源):\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e流行病:过去、现在和未来\u003c/li\u003e\n\u003cli\u003e讨论埃博拉和寨卡疫情的爆发,以及全球卫生信息学的补充单元\u003c/li\u003e\n\u003cli\u003e传染病的生态、演变和形成\u003c/li\u003e\n\u003cli\u003e医学侦探:追踪流行病的病原体\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e---------------------------------------------------------------------------------------------------------------------------------------\u003cbr /\u003e\n\u003cem\u003e(1) Fauci AS, Touchette NA, Folkers GK. Emerging Infectious Diseases: a 10-Year Perspective from the National Institute of Allergy and Infectious Diseases. Emerg Infect Dis 2005 Apr; 11(4):519-25.\u003c/em\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1b9:Tbfa,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa transformación digital ha impactado en todos los ámbitos públicos y privados en los últimos años, apoyándose en tecnologías como la inteligencia artificial, la analítica de grandes volúmenes de datos, la computación en la nube, la impresión 3D, la realidad aumentada o blockchain, entre otras. La naturaleza de la transformación digital es tan variada, no solo tecnológicamente, sino también en sus aspectos económicos, sociales y regulatorios, que es un desafío entenderla y comunicarla de manera efectiva.\u003c/p\u003e\n\u003cp\u003ePara ello, este curso presenta una introducción a la transformación digital, a partir de la coevolución que ha tenido la tecnología y la sociedad, haciendo hincapié en el entorno de alta incertidumbre y múltiples crisis en el que se desarrolla, así como su relación con los negocios, la sostenibilidad, los servicios públicos. política y los aspectos de privacidad, seguridad y regulación que determinan sus efectos positivos y negativos. Esto implica una comprensión de los ecosistemas digitales, las diferentes estrategias para abordar la transformación digital y los nuevos modelos de negocio que la materializan en diferentes sectores y contextos, a partir de casos y ejemplos. Además, requiere un acercamiento a las tecnologías emergentes, con especial atención al procesamiento de datos y al lenguaje natural. Asimismo, se proporcionan los elementos para la identificación de nuevos contextos laborales y las habilidades necesarias a nivel organizacional e individual.\u003c/p\u003e\n\u003cp\u003eEste curso se sitúa en la confluencia entre los nuevos escenarios de la transformación digital de la comunicación y la comunicación de la transformación digital como fenómeno sociotécnico. Se trata de un recorrido por conceptos, enfoques y herramientas que permitan comprender mejor la transformación digital, ayudando a discernir su significado, impacto y valor. Asimismo, brinda elementos para reconocer oportunidades de aplicación, apropiación y emprendimiento digital a profesionales que, desde su labor institucional, social o de gestión, realicen acciones de articulación y comunicación social mediadas por herramientas digitales.\u003c/p\u003e\n\u003cp\u003eFinalmente, el curso presenta las transformaciones fundamentales vividas en el ecosistema comunicacional. En esta transformación, pasamos de la comunicación analógica y hegemónica a la comunicación digital interactiva y colaborativa. Nos fijamos en las categorías o rasgos que definen esto.\u003c/p\u003e\n\u003cp\u003ecomunicación digital y que forman parte de la arquitectura del nuevo medio: Internet. Analizamos el perfil del nuevo comunicador, su versatilidad mediática y los retos que se presentan con la comunicación digital. Repasamos las competencias y habilidades básicas que deben desarrollar los comunicadores digitales y proponemos un modelo para la creación y producción de contenidos multiplataforma, basado en una serie de software y aplicaciones 2.0, que permiten además la gestión de la interactividad con las audiencias y el diseño. de métricas digitales.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ba:T4b6,\u003cp\u003e\u003cem\u003e\u003cstrong\u003e\u003cspan lang=\"ES-CO\"\u003eLos primeros 1,500 participantes inscritos en la ruta auditada que cumplan con el 80% de participación en el programa recibirán un certificado gratuito emitido por la Universidad Javeriana en alianza con Google. Si deseas recibir este certificado, regístrate y rellena el formulario activo en el curso.\u003c/span\u003e\u003c/strong\u003e\u003c/em\u003e \u003cstrong\u003e\u003cem\u003eAsimismo\u003c/em\u003e\u003c/strong\u003e \u003cstrong\u003e\u003cem\u003e, podrás gestionar el certificado pagado con Edx por el valor de referencia publicado en este sitio.\u003c/em\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cem\u003eTodo el contenido del programa académico es un esfuerzo entre Google y la Pontificia Universidad Javeriana.\u003c/em\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eEste curso ofrece una comprensión del nuevo escenario digital en el que nos encontramos y el impacto que tiene la transformación digital; También propone una aproximación al uso de herramientas y tecnologías emergentes para adquirir habilidades en áreas como la creatividad, la innovación y la disrupción digital en el ámbito de la comunicación. El curso está dirigido a comunicadores y otros profesionales que desde su labor social o institucional estén interesados en el impacto de la transformación digital.\u003c/p\u003e1bb:T6f9,\u003cul\u003e\n\u003cli\u003eInterpretar la coevolución de la sociedad y la tecnología.\u003c/li\u003e\n\u003cli\u003eComprender la transformación digital y sus tecnologías habilitadoras.\u003c/li\u003e\n\u003cli\u003eComprender el análisis de datos y el procesamiento del lenguaje natural.\u003c/li\u003e\n\u003cli\u003eIdentificar competencias para la transformación digital\u003c/li\u003e\n\u003cli\u003eReconocer los ecosistemas digitales\u003c/li\u003e\n\u003cli\u003eIdentificar estrategias para concebir y gestionar la transformación digital.\u003c/li\u003e\n\u003cli\u003eComprender la relación entre transformación digital y sostenibilidad\u003c/li\u003e\n\u003cli\u003eIdentificar modelos de negocio tras la transformación digital\u003c/li\u003e\n\u003cli\u003eExaminar el contexto internacional de la política de transformación digital.\u003c/li\u003e\n\u003cli\u003eRelacionar transformación y gobierno digital\u003c/li\u003e\n\u003cli\u003eAbordar los aspectos regulatorios y éticos de la transformación digital\u003c/li\u003e\n\u003cli\u003eIdent"])</script><script>self.__next_f.push([1,"ificar amenazas y defensas a la seguridad digital.\u003c/li\u003e\n\u003cli\u003eAbordar la transformación digital y el presente de la comunicación\u003c/li\u003e\n\u003cli\u003eConoce las herramientas digitales para el ejercicio de la comunicación y el periodismo en la web\u003c/li\u003e\n\u003cli\u003eComprender cómo funciona la información en el ecosistema digital\u003c/li\u003e\n\u003cli\u003eExaminar las métricas y su impacto en la calidad de la comunicación y el periodismo actual.\u003c/li\u003e\n\u003cli\u003eAprenda a pasar del modelo lineal y hegemónico de comunicación al modelo interactivo y ampliado\u003c/li\u003e\n\u003cli\u003eIdentificar nuevos modelos y tipologías de comunicación en escenarios virtuales.\u003c/li\u003e\n\u003cli\u003eDiseñar estrategias de transmedialización basadas en dinámicas experienciales.\u003c/li\u003e\n\u003cli\u003eConoce el modelo de cocreación digital o comunicación interactiva y colaborativa\u003c/li\u003e\n\u003cli\u003eIdentificar la disrupción digital en las narrativas digitales, la producción para Internet y el horizonte móvil y ubicuo de la comunicación.\u003c/li\u003e\n\u003c/ul\u003e1bc:T8aa,"])</script><script>self.__next_f.push([1,"\u003cp\u003eSi tomas decisiones en tu empresa o deseas involucrarte en la ciencia de datos y el uso de tecnologías computacionales, este curso es para ti.\u003c/p\u003e\n\u003cp\u003eEl análisis multivariado es muy importante y único, al tomar en cuenta al mismo tiempo las diferentes variables a las que está sujeta una entidad, la cual puede ser numérica o categórica, es decir, podemos analizar tanto datos que representan propiedades físicas o químicas, como datos que que son indicadores de una situación o estado.\u003c/p\u003e\n\u003cp\u003eDe esta forma podemos analizar cualquier tipo de información proveniente de nuestra empresa y ser capaces de tomar mejores decisiones al considerar todos los factores que afectan a nuestro elemento en cuestión. Y esta es la parte que casi iguala la capacidad de nuestro cerebro de poder decidir de forma casi instantánea y ponderar todas las variables involucradas en la toma de una decisión que puede ser de vida o muerte. \u003c/p\u003e\n\u003cp\u003eCada vez que manejamos sometemos a nuestro cerebro a un continuo análisis multivariado que pondera variables como la velocidad, las condiciones del clima, del camino, las distracciones internas y externas o los imprevistos que pudiéramos encontrar. Esto es lo que hacemos en el análisis multivariado, considerar muchas variables, discriminarlas, agruparlas, relacionarlas y conformar grupos de datos.\u003c/p\u003e\n\u003cp\u003eA lo largo de este curso, aprenderás las principales técnicas del análisis multivariante empleando R y R studio como herramienta de análisis, graficación y toma de decisiones. El software R de análisis estadístico y la plataforma de desarrollo R studio poseen la gran ventaja de ser de uso libre, con una gran comunidad de programadores que la enriquecen con librerías que hacen su uso sencillo y extremadamente poderoso.\u003c/p\u003e\n\u003cp\u003eEn este curso, además de aprender los fundamentos de R y R studio, aplicaremos las técnicas de análisis multivariado como: componentes principales, análisis de clústeres y análisis discriminante en la solución de problemas y casos empresariales. No necesitas experiencia previa en programación solo conocimientos básicos de estadística, te guiaremos paso a paso en el uso de de estas herramientas y su aplicación.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1bd:T62b,\u003cp\u003e“Escudo Digital: Ciberseguridad para Protección de Datos y Sistemas” es un curso diseñado para proporcionar una introducción sólida a la protección de datos sensibles y la infraestructura que da soporte a diversos sistemas de información.\u003c/p\u003e\n\u003cp\u003eEste MOOC fue creado en colaboración con CYBERPRO Global, empresa proveedora internacional líder de programas de enseñanza cibernética con más de una década de experiencia en entrenamientos para personal de seguridad y en provisión de proyectos tecnológicos a gran escala, y tiene como objetivo formar a los participantes en los conceptos fundamentales de seguridad de la información y ciberseguridad incluyendo técnicas y tácticas necesarias para proteger la información y los sistemas informáticos de potenciales amenazas.\u003c/p\u003e\n\u003cp\u003eLos participantes obtendrán la capacidad de comprender los conceptos básicos de la seguridad de la información, incluyendo la identificación de vulnerabilidades y amenazas, la prevención de ataques cibernéticos y la implementación de medidas y controles de seguridad. También, aprenderán las principales técnicas utilizadas por los profesionales de ciberseguridad para proteger los sistemas informáticos.\u003c/p\u003e\n\u003cp\u003e“Escudo Digital: Ciberseguridad para Protección de Datos y Sistemas” ofrece los principales conceptos, habilidades y conocimientos necesarios para proteger eficazmente los sistemas informáticos contra las amenazas cibernéticas y garantiza un sólido nivel inicial para fortalecer la educación en el campo de la seguridad de la información.\u003c/p\u003e1be:T69d,\u003cp\u003e\u003cspan lang=\"ES-AR\"\u003eLa Universidad Galileo junto con el Programa Energías Renovables y Eficiencia Energética (4E) en Centroamérica que implementa la GIZ, desarrolló este curso con el objetivo de promover la \u003cstrong\u003e“Digitalización en el sector energético”\u003c/strong\u003e\u003c/span\u003e\u003cspan lang=\"ES-AR\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eLa analítica avanzada permite utilizar los datos generados por un sistema para obtener información relevante sobre su estado actual "])</script><script>self.__next_f.push([1,"o posibles estados futuros.\u003c/p\u003e\n\u003cp\u003eEn este curso, aprenderás cómo la analítica avanzada, por medio de diferentes técnicas, permite crear modelos predictivos, prescriptivos y automáticos para mejorar la gestión de los activos energéticos en un sistema eléctrico. Iniciaremos conociendo los conceptos básicos de analítica avanzada, hasta estudiar los principales casos de uso de estas herramientas en el sector energético.\u003c/p\u003e\n\u003cp\u003ePor otra parte, conocerás la importancia de la seguridad cibernética y su impacto en el proceso de digitalización del sector energético. Identifcarás los principales tipos de ataques, y cómo estos afectan los sistemas informáticos relacionados a los mercados energéticos y la operación y control del sistema eléctrico de potencia.\u003c/p\u003e\n\u003cp\u003eFinalmente, se presentarán las mejores prácticas y lineamientos generales necesarios para minimizar los riesgos debidos a ataques cibernéticos y disminuir el impacto de posibles vulnerabilidades de los sistemas.\u003c/p\u003e\n\u003cp\u003eEste es el tercer curso de una serie de tres:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eEl rol de la digitalización en la transición energética\u003c/li\u003e\n\u003cli\u003eCadena de bloques e internet de las cosas\u003c/li\u003e\n\u003cli\u003eAnalítica avanzada y seguridad cibernética\u003c/li\u003e\n\u003c/ul\u003e1bf:T50e,\u003cp\u003eEl internet de las Cosas (IoT) está alrededor de nosotros y rápidamente se está expandiendo, a penas estamos viendo sus beneficios. El IoT ayuda a los individuos a mejorar su calidad de vida, además ayuda a las organizaciones e industrias a mejorar la administración de recursos y volverse más eficientes. Ya que las organizaciones están incrementando el uso de soluciones de IoT, éste rápido crecimiento ha introducido nuevos retos que incluyen:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCómo integrar a millones de dispositivos de diferentes marcas puedan utilizar aplicaciones personalizadas.\u003c/li\u003e\n\u003cli\u003eCómo integrar nuevos sensores a la infraestructura actual de red.\u003c/li\u003e\n\u003cli\u003eCómo asegurar estos nuevos dispositivos, cada uno configurado con diferentes niveles de seguridad.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003ePara ayudar a reso"])</script><script>self.__next_f.push([1,"lver estos desafíos y ayudar a las organizaciones e industrias adoptar soluciones de IoT es que se genera el presente curso, basado en los seis pilares de tecnología que ayudan a simplificar y asegurar una integración de soluciones de IoT podemos mencionar:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eConectividad de Red\u003c/li\u003e\n\u003cli\u003eFog Computing \u003c/li\u003e\n\u003cli\u003eCiberseguridad y Seguridad Física\u003c/li\u003e\n\u003cli\u003eAnálisis de Datos\u003c/li\u003e\n\u003cli\u003eAdministración y Automatización\u003c/li\u003e\n\u003cli\u003ePlataformas de habilitación de aplicaciones\u003c/li\u003e\n\u003c/ul\u003e1c0:T5c3,\u003cp\u003e\u003cspan lang=\"ES\"\u003eCada vez más personas cuentan con internet, computadores, teléfonos inteligentes, tabletas etc., permitiéndoles producir más y más información cada día. \u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEste crecimiento exponencial de información disponible en internet es una oportunidad que no se ha tenido en ningún otro momento de la historia de la humanidad, sin embargo, es absolutamente necesario saber qué hacer con esta información, saber cómo usarla y tener claro qué se desea de ella y para qué usarla. Así mismo, es imprescindible saber reconocer la fiabilidad de la información y entender las dinámicas del ciberespacio y los riesgos que conlleva la interacción en los diferentes entornos digitales.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eCon este curso de cuatro semanas adquirirás conocimientos, aprenderás estrategias y serás consciente de la actitud necesaria, para: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"ES\"\u003eNavegar, buscar y filtrar contenido digital\u003c/span\u003e\u003cspan lang=\"ES\"\u003e.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"ES\"\u003eAplicar criterios para evaluar los contenidos en internet y validar la fiabilidad de páginas web y noticias en redes sociales.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"ES\"\u003eUsar herramientas de citación y referenciación aprovechando al máximo las herramientas tecnológicas.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"ES\"\u003eIdentificar los riesgos a los que nos exponemos al navegar en internet y a tomar medidas para evitarlos.\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e1c1:T70e,\u003cp\u003e\u003cem\u003eTenga en cuenta: Los alumnos que completen con éxi"])</script><script>self.__next_f.push([1,"to este curso de IBM pueden obtener una insignia de habilidad (badge), una credencial detallada, verificable y digital que describe los conocimientos y habilidades que ha adquirido en este curso. ¡Inscríbase para obtener más información, complete el curso y reclame su insignia!\u003c/em\u003e\u003c/p\u003e\r\n\u003cp\u003eEste curso presenta los conceptos básicos de la computación en la nube (cloud computing). Obtendrá el conocimiento fundamental necesario para comprender la computación en la nube desde las perspectivas empresarial y profesional.\u003c/p\u003e\r\n\u003cp\u003eAprenderá sobre la definición y las características esenciales de la computación en la nube, su historia, las tendencias emergentes y casos de negocio del cloud computing. También aprenderá sobre los diversos modelos de servicios en la nube (IaaS, PaaS, SaaS), los modelos de implementación (nube pública, nube privada, nube híbrida) y los componentes clave de una arquitectura de nube (virtualización, máquinas virtuales, almacenamiento, redes, contenedores).\u003c/p\u003e\r\n\u003cp\u003eEl curso también lo familiarizará con las tendencias emergentes asociadas con la nube, incluida la multinube híbrida, los microservicios, la computación sin servidor (serverless), la nube nativa, DevOps y la modernización de aplicaciones. Aprenderá sobre los conceptos básicos de seguridad en la nube y se le presentarán algunos estudios de casos y oportunidades de carrera relacionadas con la computación en la nube.\u003c/p\u003e\r\n\u003cp\u003eEste curso de introducción a la computación en la nube de IBM/UPV es adecuado para cualquier persona que sea nueva en la nube, ya sea alguien que solo quiere comprender la jerga de la nube o alguien que tenga la intención de comenzar una carrera relacionada con la computación en la nube.\u003c/p\u003e1c2:T4f3,\u003cul\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eCaracterísticas y beneficios esenciales de la computación en la nube, por ejemplo, pago por uso, etc.\u003c/span\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eProveedores clave de servicios en la nube: IBM Cloud, Amazon Web Services (AWS), Alibaba Cloud, Microsoft Azure, Google Cloud Pl"])</script><script>self.__next_f.push([1,"atform, etc.\u003c/span\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eModelos comunes de servicios en la nube (IaaS, PaaS, SaaS) y modelos de implementación (público, privado, híbrido)\u003c/span\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eComponentes de la infraestructura en la nube (regiones, zonas de disponibilidad, centros de datos, virtualización, máquinas virtuales, bare metal, redes y tipos de almacenamiento en la nube (conexión directa / efímera, persistente: almacenamiento de archivos, almacenamiento en bloque, almacenamiento de objetos, etc.)\u003c/span\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eTendencias emergentes en computación en la nube, incluyendo multinube híbrida, contenedores, microservicios, sin servidor, nativa de la nube, DevOps y modernización de aplicaciones\u003c/span\u003e\u003c/li\u003e\r\n\u003cli\u003e\u003cspan lang=\"es\"\u003eConceptos en seguridad, cifrado y monitorización en la nube\u003c/span\u003e\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003e\u003cspan lang=\"es\"\u003e\u003c/span\u003e\u003c/p\u003e\r\n\u003cp\u003eOpciones de carrera, profesiones relacionadas con la nube y sus habilidades requeridas\u003c/p\u003e1c3:T9cf,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cem\u003e\u003cspan lang=\"EN-US\"\u003ePor favor ten en cuenta: Los estudiantes que completen con éxito este curso de IBM ahora pueden obtener una insignia digital de habilidades: una credencial detallada, verificable y digital que comprueba los conocimientos y habilidades que has adquirido en este curso. Inscríbete para obtener más información, completa el curso y reclama tu insignia digital.\u003c/span\u003e\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eAl inscribirse en este curso en línea, es probable que hayas estudiado inteligencia artificial, construido chatbots y tal vez incluso hayas utilizado Watson Assistant en el camino. Pero, ¿sabías que puedes acelerar el coeficiente intelectual de tu chatbot con IBM Watson Discovery, un servicio diseñado para revelar el valor oculto en los datos? Discovery se especializa en tomar los datos, estructurados o no, y extraer de ellos respuestas y patrones.\u003c/p\u003e\n\u003cp\u003ePor ejemplo, si tienes un repositorio grande, cuyo contenido podría responder a preguntas de clientes , tienes los ingredientes de un gran chatbot de preguntas frecuentes.\u003c/p\u003e\n\u003cp\u003eEn este curso, aprenderás cómo crear consultas en Discovery, que te permite mostrar respuestas y patrones a partir de grandes depósitos de datos. A continuación, aprenderás a usar Discovery para extraer información de un conjunto de reseñas de hoteles. Luego, para que esos datos cobren vida, se integrará Discovery con otros servicios de Watson para crear un chatbot que pueda informar sobre los mejores hoteles en una determinada ciudad de EE. UU. Al utilizar estos servicios de Watson, agregas más capas de análisis para ayudar a encontrar el mejor hotel.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eAssistant\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eDiscovery\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003eTone Analyzer\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"EN-US\"\u003ePersonal Insights\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eAl final de este curso, habrás construido un chatbot con IA completamente funcional.\u003c/p\u003e\n\u003cp\u003eAdemás, deberías poder aplicar los servicios enseñados aquí a tus propios conjuntos de datos, lo que te permitirá crear sofisticados chatbots propios.\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eTen en cuenta que los foros de discusión de este curso están abiertos para que los estudiantes publiquen y se comuniquen entre sí. Sin embargo, los foros ya no serán supervisados por el equipo de IBM. Las preguntas técnicas relacionadas con tu experiencia en el curso deben dirigirse al equipo de soporte de edX a través de la información de contacto proporcionada en el curso. Gracias.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1c4:T59a,\u003cp dir=\"ltr\"\u003eElectronic sports (Esports) or competitive gaming has been growing rapidly in popularity to become a multibillion-dollar industry.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nOur Esports Management course is designed to equip you with the knowledge and skills necessary to thrive in this dynamic and rapidly growing industry. From managing Esports teams and events to marketing and content creation, there are many ways to get involved and build a rewarding career.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nGet ready to make your mark in the thrilling world of Esports!\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nRemember to obtain your certification for free by using referral code \u003cb style=\"font-family: Calibri, sans-serif; font-size: 14.666667px;\"\u003e6FJGJOTX7MFH5M2H\u003c/b\u003e\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nWhy learn from us:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eHP’s Esports Management and Game Development program – ‘HP Gaming Garage’ – blend’s HP’s technology and innovation heritage with leading academia’s subject matter expertise\u003c/li\u003e\n\u003cli\u003eOne of the most comprehensive education programs on Esports and Gaming that takes the learner on a complete journey from development to management\u003c/li\u003e\n\u003cli\u003eEasy to follow modules with many real-life industry examples and references\u003c/li\u003e\n\u003cli\u003eWorldwide recognition and acceptance through verifiable certification on successful completion of each course\u003c/li\u003e\n\u003cli\u003eCertification provided free-of-cost through a reference voucher code available on each course page\u003c/li\u003e\n\u003c/ul\u003e1c5:T19f5,"])</script><script>self.__next_f.push([1,"\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eFundamentals of Esports:\u003c/strong\u003e Understand the evolution of Esports, explore popular titles, and discover the diverse genres within the gaming industry. The Esports industry has taken over the world with over 3 billion people playing some sort of a game. The fundamentals of Esports will help you understand how the industry started out as several local LAN parties within communities to international championships gathering multi-million live viewers rooting for their favorite team competing! Esports isn’t only about the players/teams but also is about the work that goes on behind the scenes including the planning, operations, execution \u0026amp; post-execution phases of an online/offline event \u0026amp; more!\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eReal Sports vs. Esports:\u003c/strong\u003e Analyze similarities and differences, uncovering the unique aspects of competitive gaming. Esports has adopted several things from the sports industry in different regards such as marketing strategies, broadcasting, brand activations, fan engagements, sponsorship \u0026amp; partnership strategies to name a few from the long list. That being said, differences include ROI, Unique IP ideations, technological investments into online/offline events, data protection laws \u0026amp; fan behavior and much more\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eEsports Ecosystem:\u003c/strong\u003e Dive into the world of teams, players, organizers, sponsors, and fans, understanding their roles and importance. Having an understanding of the Esports ecosystem is one of the most important things to learn about in this course. The ecosystem will allow you to gain in-depth knowledge about how this industry is worth billions of dollars and most importantly how the industry functions with all the different moving parts\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eCareers in Esports:\u003c/strong\u003e Identify various opportunities including players, content creators, administrators, managers, production, graphic designer, video editor, PR, etc. There are several career paths in the industry to choose from. You might choose to be behind the scenes in operations or might enjoy front-facing the world of esports by hosting an event in front of thousands of fans. The industry is young, vibrant \u0026amp; full of interesting folks with great experiences from different cultures \u0026amp; backgrounds working together with a shared love for Esports\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eManaging Esports:\u003c/strong\u003e Dive into the various aspects of competitive gaming, team formation, player management, organizational structure and talent development. Develop a keen understanding of the field and the esports ecosystem. Identify what it takes to form and maintain a successful Esports team, the responsibilities towards players, their well-being and skill enhancement. Understand game strategy, sponsorships, partnerships and organizing tournaments. Engaging with the community through social media and streaming platforms, and fostering a positive and inclusive gaming environment. Effective esports management demands a combination of business acumen, gaming expertise, and adaptability to the rapidly evolving nature of the industry\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eLevels of Esports:\u003c/strong\u003e Explore tiered competitions and take a peek into the life of professional players. Just like in sports, Esports players \u0026amp; teams compete in local, national \u0026amp; international leagues \u0026amp; competitions. Teams \u0026amp; players are also classified in tiers, such as professionals, semi-professionals, competitors \u0026amp; amateurs\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eCoaching in Esports:\u003c/strong\u003e Study the pivotal role of coaches in team success. There are several types of coaches involved in the success of many international professional teams \u0026amp; players. Similar to the sports industry, Esports teams do have mental \u0026amp; physical coaches, therapists, nutritionists, esports coaches \u0026amp; a few more to make sure the players \u0026amp; teams are always performing at their top most level and are in good form for all their tournaments \u0026amp; leagues\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eGame Publishers:\u003c/strong\u003e Learn about the pivotal role of game publishers within the dynamic Esports ecosystem and their significant impact on shaping Esports events. Publishers are one of the most important elements within the industry. They are the owners of the game titles that are played by the 3 billion+ people in the world. They have full authority over their game titles and play a massive role in making sure their community is involved \u0026amp; engaged! Publishers’ support towards tournament organizers \u0026amp; sponsors of these tournaments is very crucial, learn more about this crucial role played by the game publishers\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eManagerial Challenges:\u003c/strong\u003e Whether it’s teams, players or tournaments, esports comes with its own set of unique obstacles that require a combination of traditional sports management skills and an understanding of the gaming ecosystem. Understand how to analyze each situation and develop effective problem-solving strategies. Managing esports presents a unique blend of challenges that demand a deep understanding of gaming culture, effective business practices, and adaptability to the fast-paced and ever-evolving nature of the industry\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eEsports Investment and Marketing:\u003c/strong\u003e Delve into the financial side, sponsorships, and marketing techniques. Investment into the world of Esports has been at its all-time high, but this wasn’t the case a few decades ago. Learn more about this topic from the past until the present \u0026amp; its future in a brief manner by taking this course\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eEsports Events and Tournament Operations:\u003c/strong\u003e Learn about the organization and execution of Esports events, from local tournaments to major international competitions as well as the intricacies of running Esports tournaments, from logistics to rule enforcement\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cstrong\u003eEsports Event Sponsorship:\u003c/strong\u003e Study the role of sponsors and their benefits to the industry. Esports events are usually heavily dependent on sponsorships. Securing sponsorships can be one of the hardest tasks to perform within the industry. However, this industry has only been growing in massive numbers over the past few years and has been a head-turner for not only endemic brands but also for non-endemic brands who want to be a part of this massive growth and get involved by themselves and reach the audiences \u0026amp; fans. Learn more about this interesting side of Esports in this course\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"1c6:T91e,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEn un mundo cada vez más digitalizado y en constante evolución tecnológica, es importante estar al tanto de las herramientas y recursos que están transformando la educación, y sin duda Chat GPT es una de ellas; revolucionando la forma en que los estudiantes acceden y procesan información, y la forma en que los docentes diseñan y entregan contenidos educativos personalizados.\u003c/p\u003e\n\u003cp\u003eChatGPT es un modelo de lenguaje de inteligencia artificial desarrollado por OpenAI. Funciona mediante el uso de técnicas de procesamiento del lenguaje natural y es entrenado con grandes cantidades de texto para generar respuestas a preguntas o sugerencias dadas por los usuarios.\u003c/p\u003e\n\u003cp\u003eEl potencial de esta tecnología en la educación es evidente. ChatGPT puede apoyar a los docentes en muchas tareas como la generación de contenidos, o en el desarrollo de sus planteamientos didácticos. Sin embargo, como siempre sucede cuando aparecen tecnologías relacionadas con el conocimiento y el saber hacer, rápidamente surgen preocupaciones sobre su uso en el aula. Por un lado, los optimistas elogian la herramienta porque apoya la enseñanza. Por otro lado, los escépticos ven una clara dificultad con respecto a la posibilidad de que los estudiantes completen fácilmente una tarea con el uso de ChatGPT. Preocupaciones y preguntas que surgen cada vez que aparecen nuevas tecnologías en el ámbito educativo, pero, como de costumbre, estas preocupaciones deben considerarse dentro de un marco más general de reflexión como la relación (pasado, presente y futuro) entre las tecnologías y la educación.\u003c/p\u003e\n\u003cp\u003eEn este curso descubrirás cómo interactuar con ChatGPT de manera efectiva y creativa para obtener respuestas sorprendentes y relevantes en el ámbito educativo. Aprenderás, a través de ejemplos prácticos, todo lo que necesitas saber sobre ChatGPT y cómo utilizarlo para diseñar planes de estudio, planificar los aprendizajes, crear materiales didácticos, diseñar actividades de aprendizaje y evaluaciones.\u003c/p\u003e\n\u003cp\u003eAl finalizar el curso los participantes tendrán una comprensión sólida de cómo utilizar ChatGPT para potenciar los procesos de enseñanza y aprendizaje y la oportunidad de experimentar con ChatGPT para comenzar a desarrollar sus propias ideas de cómo implementarlo en su práctica docente.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1c7:T432,\u003cul\u003e\n\u003cli\u003eComprender los conceptos fundamentales de la Inteligencia Artificial aplicada a la educación,\u003c/li\u003e\n\u003cli\u003eConocer la tecnología de ChatGPT y su potencial para mejorar la educación.\u003c/li\u003e\n\u003cli\u003eIntegrar ChatGPT en procesos de enseñanza y aprendizaje utilizando ejemplos prácticos y aplicados al ámbito educativo.\u003c/li\u003e\n\u003cli\u003eDesarrollar el diseño curricular, planificación de los aprendizajes, generación de materiales didácticos, diseño de actividades de aprendizaje y evaluaciones utilizando de forma efectiva ChatGPT.\u003c/li\u003e\n\u003cli\u003eMejorar la eficacia y eficiencia en la enseñanza y el aprendizaje al integrar ChatGPT con otras herramientas de IA.\u003c/li\u003e\n\u003cli\u003eIdentificar y abordar de manera responsable los desafíos éticos y de privacidad que surgen al utilizar ChatGPT en la educación.\u003c/li\u003e\n\u003cli\u003eEvaluar y reflexionar sobre la relevancia y la aplicabilidad de la Inteligencia Artificial en la educación\u003c/li\u003e\n\u003cli\u003eElaborar una lista de recursos adicionales sobre el tema de IA y su aplicación en la educación para mantenerse a la vanguardia en el tema.\u003c/li\u003e\n\u003c/ul\u003e1c8:Tf00,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa apertura de las comunicaciones ha generado diversos beneficios para el ser humano. El internet ha logrado que la sociedad viva conectada y se comunique de forma rápida y sencilla. Nuestros novedosos y sofisticados sistemas de redes, el wifi y aplicaciones web permiten la fluidez de mucha información y la gestión de gran cantidad de datos.\u003c/p\u003e\n\u003cp\u003eA pesar de los grandes beneficios que nos brindan las páginas web, el IoT y el big data, las sociedades, instituciones y organizaciones se enfrentan con obstáculos relacionados con la seguridad en los datos. Los ciberataques están a la orden del día, los cuales vulneran el sistema, crean brechas de seguridad y una pérdida de datos irreparable que atenta contra el funcionamiento de plataformas, bases de datos y la integridad de los clientes.\u003c/p\u003e\n\u003cp\u003eLa protección de sistemas operativos mediante programas de antivirus y cortafuegos son útiles para disminuir el riesgo de los ataques perpetrados por los cibercriminales. Sin embargo, se requieren de estrategias adicionales y el desarrollo de plugins que aseguren la protección de los datos personales y la información confidencial que se almacena en los sistemas informáticos.\u003c/p\u003e\n\u003cp\u003eAdemás, la seguridad de los equipos de cómputo no es el único objetivo de la ciberseguridad, sino que también se ha vuelto necesario el desarrollo de estrategias para la protección de sitios web y dispositivos móviles con los que se brinda un acceso remoto a los usuarios a través de redes inalámbricas y a través de los cuales los ciberdelincuentes son capaces de realizar sus ataques. De aquí se sigue que la seguridad de aplicaciones móviles es una prioridad para los desarrolladores de ciberseguridad.\u003c/p\u003e\n\u003cp\u003eLas redes sociales y el correo electrónico son parte de los pilares de interés en las estrategias de ciberseguridad. En consecuencia, el desarrollo de una cultura que ronde en la protección de los datos personales es fundamental para evitar el uso de la ingeniería social y phishing que deje vulnerables datos personales y así evitar la suplantación de identidad. \u003c/p\u003e\n\u003cp\u003eLas habilidades para la gestión de ataques cibernéticos en tiempo real y el desarrollo de estrategias de ciberseguridad son altamente solicitadas por muchas organizaciones. Según reportes de predicciones por parte del \u003ca href=\"https://www.nytimes.com/2018/11/07/business/the-mad-dash-to-find-a-cybersecurity-force.html\"\u003eNew York Times\u003c/a\u003e, existirá una necesidad de llenar 3.5 millones de vacantes en empleos relacionados con la ciberseguridad.\u003c/p\u003e\n\u003cp\u003eLa demanda de expertos en ciberseguridad aumenta conforme las organizaciones utilizan herramientas de seguridad relacionadas con el internet y aplicaciones de código abierto. La seguridad de red se ha vuelto una prioridad para muchas organizaciones que utilizan herramientas cibernéticas para sus actividades. \u003ca href=\"https://hbr.org/sponsored/2019/06/the-public-private-partnership-thats-working-to-make-new-york-city-a-global-hub-of-cybersecurity-talent\"\u003eHarvard Business Review\u003c/a\u003e reporta que el 58% de los gerentes en seguridad informática alrededor del mundo están preocupados por la brecha de habilidades en ciberseguridad y opinan que empeorará el problema de no contar con expertos en ciberseguridad.\u003c/p\u003e\n\u003cp\u003eEste curso tiene la intención de brindarte los fundamentos necesarios para enfrentarte a las amenazas de ciberseguridad que se presentan en las organizaciones. Aprenderás a identificar riesgos y generar estrategias para la mejor gestión de ataques cibernéticos. Aprenderás a proteger los datos de una organización basándote en fundamentos de criptografía, monitoreo y gestión de datos. Además, comprenderás el futuro de la ciberseguridad abordando los adelantos tecnológicos que apoyarán a esta disciplina tan demandada en nuestros días.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1c9:T657,\u003cp\u003e\u003cspan lang=\"ES\"\u003eEn este curso de 4 módulos, desarrollarás competencias básicas para el cálculo identificando elementos de diferentes sistemas numéricos, obtendrás habilidades en el manejo de las operaciones básicas, el manejo de signos y resolviendo problemas que involucran la solución de ecuaciones de primer grado. También identificarás elementos de diferentes sistemas numéricos y el manejo de las operaciones básicas y de signos, y resolverás problemas que involucran la solución de ecuaciones de primer grado. \u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEste curso, también te permitirá desarrollar competencias para resolver ejercicios y problemas que requieran exponentes o radicales para su modelización, es decir; para ser planteados, desarrollados y resueltos. Identificarás relaciones entre expresiones algebraicas, efectuar operaciones y reconocer situaciones que pueden ser resueltas con el uso del álgebra.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAdicionalmente, comprenderás el uso de las ecuaciones y las desigualdades para resolver problemas que requieren de estos planteamientos y podrás resolver ecuaciones con potencias superiores, expresiones fraccionarias y radicales, también desigualdades lineales y cuadráticas, todo esto aplicado en la solución de problemas.\u003c/p\u003e\n\u003cp\u003eAl finalizar, encontrarás facilidad para leer, interpretar y predecir el comportamiento de situaciones de la cotidianidad representadas mediante gráficas, tablas o ecuaciones de dependencia. Así mismo, tendrás habilidad para construir modelos funcionales a partir de observaciones para apoyar otras disciplinas.\u003c/p\u003e1ca:T6b0,\u003cp\u003eEste curso te guiará a través de las primeras etapas de una revisión sistemática de literatura, desde la definición de la pregunta a resolver, hasta el cribado eficiente de los resultados obtenidos tras una búsqueda automática.\u003c/p\u003e\n\u003cp\u003eAprenderás a crear un diagrama PRISMA, una herramienta esencial para reportar revisiones sistemáticas con precisión y transparencia. Este conocimiento te permi"])</script><script>self.__next_f.push([1,"tirá estructurar tus investigaciones de manera clara y reproducible, elevando la calidad de tus decisiones académicas y/o profesionales.\u003c/p\u003e\n\u003cp\u003ePaso a paso, desarrollarás habilidades críticas para evaluar la calidad de los estudios identificados en tu revisión. Aprenderás a discernir entre evidencia robusta y débil, a identificar sesgos potenciales y a sopesar la relevancia de los hallazgos en el contexto de tu investigación. Además, te introduciremos en el uso de tecnologías avanzadas como \"sentence transformers\" y modelos de lenguaje grande (LLM) para copilotar y optimizar la fase de cribado, permitiéndote manejar grandes volúmenes de información de manera más eficiente.\u003c/p\u003e\n\u003cp\u003eA lo largo del curso, trabajarás con casos prácticos, permitiéndote aplicar inmediatamente lo aprendido. Al finalizar, estarás equipado con las herramientas necesarias para completar las primeras etapas de revisiones sistemáticas rigurosas, una habilidad altamente valorada en el ámbito académico y profesional.\u003c/p\u003e\n\u003cp\u003eÚnete a nosotros en este viaje hacia la síntesis de evidencia científica, una herramienta esencial en la toma de decisiones basada en evidencia. Transforma tu enfoque de investigación o destaca en tu campo profesional con las habilidades adquiridas en este curso MOOC.\u003c/p\u003e1cb:Td8f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLa inteligencia artificial es una disciplina de las ciencias de la computación que ha buscado emular los procesos del pensamiento humano para crear máquinas inteligentes que logren tomar decisiones con base en los datos que se presenten. Esta tecnología se comenzó a desarrollar a mediados de los años 50’s presentando un crecimiento intermitente en sus inicios. La inteligencia artificial y el aprendizaje máquina comenzaron a tomar fuerza en los años 90’s y en los inicios del nuevo milenio se consolidó como una ciencia con mucho potencial gracias al surgimiento del Big Data y el internet.\u003c/p\u003e\n\u003cp\u003eEn los albores del siglo XXI muchas compañías han aprovechado las bondades de la inteligencia artificial. Amazon, Uber, AirBnB, entre otros, han invertido en esta área para crear nuevas aplicaciones y oportunidades de negocio basadas en la Inteligencia Artificial, Machine Learning y Deep Learning. Los bancos e instituciones financieras también utilizan esta tecnología para identificar posibles fraudes y dar confiabilidad a los procesos informáticos en las transacciones bancarias. \u003c/p\u003e\n\u003cp\u003eLos desafíos económicos que se presentan en esta época de pandemia encuentran una solución en estas herramientas computacionales. La nueva generación de emprendedores debe de estar a la vanguardia en el uso de la inteligencia artificial para aplicarla en la construcción de nuevos negocios que haga unos de las tecnologías digitales para abarcar mayor cantidad de usuarios o clientes. El surgimiento de startups y nuevos métodos de financiamiento, como el crowdfunding, son una alternativa cada vez más utilizada por aquellos que confían en el desarrollo de negocios basados en las herramientas digitales.\u003c/p\u003e\n\u003cp\u003eEsta tendencia no es exclusiva de los tiempos de pandemia, sino que seguirá vigente una vez acabe la contingencia sanitaria y tomarán fuerza los negocios que hayan aprovechado desde un inicio las nuevas tecnologías.\u003c/p\u003e\n\u003cp\u003eEste curso tiene la intención de ser un referente para la nueva generación de emprendedores y brindar una guía tanto para constituir nuevos negocios, como transformar organizaciones existentes utilizando los beneficios de la inteligencia artificial y las nuevas metodologías de innovación.\u003c/p\u003e\n\u003cp\u003eExploraremos la definición de negocios exponenciales y daremos un repaso por los nuevos modelos de negocios que demanda el siglo XXI. Además, sentaremos las bases de la llamada “transformación digital” que muchas pequeñas y medianas empresas necesitan realizar para adaptarse al nuevo paradigma de negocios.\u003c/p\u003e\n\u003cp\u003eRevisaremos las diferentes tendencias que está marcando la inteligencia artificial y estudiaremos como es que esta nueva tecnología está ayudando a que las organizaciones se vuelvan exponenciales.\u003c/p\u003e\n\u003cp\u003eAprenderemos sobre la metodología Running Lean para desarrollar negocios de manera rápida y con pocos recursos. Abordaremos también el desarrollo del producto mínimo viable basándonos en los pains y gains de los usuarios para definir los Jobs to be done de tu producto.\u003c/p\u003e\n\u003cp\u003ePor último, abordaremos la metodología de Purpose Launchpad para sentar las bases del propósito de la organización y darles sentido a las decisiones de negocio pensando en el usuario final. Revisaremos diferentes maneras de aproximarnos a las necesidades del cliente para entender a tus usuarios de tal forma que la información sea útil para adaptar tu producto a sus requerimientos.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1cc:T74b,\u003cp\u003eEste curso online te ayudará a comprender los conceptos de privacidad y protección de datos personales en la economía digital, así como los principios y reglas generales para el tratamiento online de datos personales, como primer paso para abordar este tema, fundamental para cualquier organización, gobierno, negocio o empresa que opere en este mundo digital.\u003c/p\u003e\n\u003cp\u003eEs importante aprender cómo, en la era de las conexiones digitales, interactúan los agentes que procesan datos personales y cómo existen desafíos legales y de política pública relacionados con la gestión de la privacidad y la protección de datos personales que surgen para todos aquellos que utilizan o proporcionan tecnologías. . y servicios digitales.\u003c/p\u003e\n\u003cp\u003eVivimos en un mundo impulsado por los datos, donde organizaciones públicas y privadas de todo tipo de origen, tamaño y naturaleza, disponen de grandes cantidades de datos que, procesados con herramientas y servicios digitales como la computación en la nube o herramientas avanzadas de análisis de datos, como las presentes en la Inteligencia Artificial, tienen el potencial de ayudar al crecimiento económico y social, proporcionar más y mejores servicios públicos y privados y crear nuevas oportunidades de mercado. Parte de esta información corresponde a datos personales de clientes, proveedores, ciudadanos, pacientes, estudiantes, miembros de la comunidad e interesados en datos personales en general. Todos los agentes de nuestra sociedad y economía digitales procesan ahora este tipo de datos personales.\u003c/p\u003e\n\u003cp\u003eEste curso en línea te ofrece una estructura para aprender los temas fundamentales relacionados con la privacidad y la protección de datos personales en la era digital, que te ayudará a navegar los desafíos diarios que surgen al procesar datos personales en la era digital.\u003c/p\u003e1cd:T913,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHistóricamente, las matemáticas nacieron por primera vez, debido a la necesidad de entender nuestro entorno y tomar decisiones. En particular, la ciencia de datos (data science), se enfoca en el procesamiento de datos: analizar, explorar e interpretar conjuntos de datos, y con base en ello, tener un panorama completo del presente.\u003c/p\u003e\n\u003cp\u003eAl escuchar sobre la ciencia de los datos, se podría pensar que es un tema únicamente relacionado con los científicos de datos y el big data, dirigido a personas que hablan lenguajes de programación como python o que concierne solo a empresas de base tecnológica e inteligencia artificial como IBM o Amazon. Sin embargo, cada vez más, es necesario hacer uso de la inteligencia de negocios y por medio de la minería de datos obtener resultados para una mejor toma de decisiones sin importar el giro de la empresa.\u003c/p\u003e\n\u003cp\u003eConsiderando que la mercadotecnia tiene entre sus objetivos la identificación de necesidades y preferencias de los consumidores para satisfacer sus necesidades, aprender a realizar encuestas que reúnan datos y conocer las herramientas de análisis de datos idóneas para grandes cantidades de datos, se convierte imprescindible para el crecimiento de toda empresa o negocio.\u003c/p\u003e\n\u003cp\u003eSin necesidad de ser un experto en data science o programador, actualmente existen una serie de técnicas estadísticas que pueden ser utilizadas por un marketer, como excel y spss, y estas le permitirán realizar data mining o extracción de datos, para identificar las variables importantes de un producto, clasificar a los consumidores, organizar sus gustos y en general, tomar decisiones precisas con una base matemática a problemas complejos.\u003c/p\u003e\n\u003cp\u003eEste curso se encuentra enfocado en su totalidad al estudio de mercado, desde los ejemplos hasta las técnicas de análisis estadístico seleccionadas, tanto para pequeños como grandes volúmenes. Utilizando softwares estadísticos para realizar el proceso matemático en las bases de datos y la visualización de datos, permitiendo un enfoque interpretativo de los resultados para la toma de decisiones.\u003c/p\u003e\n\u003cp\u003eUtiliza el business intelligence a tu favor y adquiere las herramientas necesarias para llevar el marketing de tu empresa o negocio al siguiente nivel y realizar una toma de decisiones acertada.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ce:T432,\u003cp\u003eEste curso proporciona habilidades para trabajar en equipo en un entorno remoto. Algo que ya es habitual en todas las instituciones y organizaciones, y que cada vez lo será más.\u003c/p\u003e\n\u003cp\u003eEn entornos de trabajo remoto, el trabajar en equipo es más complejo de desempeñar. Por un lado, no existe una experiencia asentada en la selección y activación de los comportamientos adaptados al entorno remoto, y por otro, tampoco es habitual encontrar cursos específicos donde se refuercen estos nuevos comportamientos. Debemos tener presente que hay que activar unos recursos personales diferentes de los que se activan en entornos presenciales.\u003c/p\u003e\n\u003cp\u003ePor ello, queremos ayudar a preparar a las personas que participan en equipos de trabajo a adaptarse a estos contextos de trabajo más digitales.\u003c/p\u003e\n\u003cp\u003eConstruiremos el aprendizaje mediante recursos digitales, ejemplos de experiencias, auto-diagnósticos de las personas inscritas y feedback de pares para completar una información 360º que permita trazar un plan de acción de gestión de la competencia adquirida.\u003c/p\u003e1cf:T48c,\u003cp\u003eLas competencias transversales (soft skills) son esenciales en prácticamente todos los puestos de trabajo actuales y complementan a las competencias técnicas (hard skills) para construir un perfil exitoso de las personas que abanderan/representan el talento de una organización.\u003c/p\u003e\n\u003cp\u003eEn entornos remotos comunicar de forma eficiente, es, si cabe, más esencial y, además, más complejo de desempeñar. Por ello, queremos ayudar a preparar a las personas que ocupan puestos de mando o que participan en equipos de trabajo a adaptarse a estos contextos de trabajo más digitales.\u003c/p\u003e\n\u003cp\u003eLa riqueza de los canales remotos, a pesar de los avances, no está al nivel de la presencialidad y, además, requiere de ciertas habilidades de interacción con la tecnología para mostrar, a pesar de la distancia física entre los participantes, la cercanía que trabajar en equipo necesita.\u003c/p\u003e\n\u003cp\u003eConstruiremos el aprendizaje mediante recursos digitales, eje"])</script><script>self.__next_f.push([1,"mplos de experiencias, auto-diagnósticos de las personas inscritas y feedback de pares para completar una información 360º que permita trazar un plan de acción de gestión de la competencia adquirida.\u003c/p\u003e1d0:T63c,\u003cp dir=\"ltr\"\u003eEl diseño de juegos consiste en la conceptualización, el desarrollo y la implementación de todos los elementos que componen un juego. Esto incluye la jugabilidad, el arte, el sonido y la narración.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cbr\u003e\u003c/br\u003e\n\nEl campo del diseño de juegos ha crecido de manera considerable en los últimos años, a medida que los videojuegos se han convertido en una importante forma de entretenimiento, con aproximadamente tres mil millones de usuarios en todo el mundo.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nEmbárcate en un emocionante viaje hacia el dinámico reino del diseño de juegos mediante este completo curso de HP. Recuerda obtener tu certificación de forma gratuita mediante el código de referencia 6FJGJOTX7MFH5M2H.\u003c/p\u003e\n\u003cp dir=\"ltr\"\u003e\n\nPor qué aprender con nosotros:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eEl programa de Gestión de Esports y Desarrollo de juegos de HP, “HP Gaming Garage”, combina la herencia tecnológica e innovadora de HP con destacados expertos del mundo académico en el tema.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eUno de los programas educativos más completos sobre Esports y Gaming que acompaña al estudiante por un recorrido completo, desde el desarrollo hasta la gestión.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eMódulos fáciles de seguir con muchos ejemplos y referencias reales de la industria.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eReconocimiento y aceptación en todo el mundo mediante una certificación verificable al finalizar con éxito cada curso.\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003eCertificación gratuita mediante un código de referencia disponible en la página de cada curso.\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e1d1:T1bab,"])</script><script>self.__next_f.push([1,"\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eIntroducción al curso:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAdéntrate en el mundo del diseño de juegos y comprende la estructura del curso. Conoce las diferentes tareas necesarias para realizar un videojuego y qué rol desempeñan los diseñadores de juegos.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eConceptos de diseño:\u003c/b\u003e\u003cbr\u003e\u003c/br\u003eProfundiza en los principios fundamentales del diseño de juegos y explora conceptos como la estética, la dinámica y la mecánica, junto con los procesos y el vocabulario usado en este sector.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\u003c/li\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eHistoria de los juegos:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nSigue la evolución de los juegos y aprende sobre el gaming, tal como lo conocemos hoy en día. Además, aprende a investigar sobre juegos del pasado relevantes para tu proyecto actual.\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003cbr\u003e\u003c/br\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eAnálisis de juegos:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAprende a diseccionar y analizar de manera crítica los juegos existentes al descifrar sus mecánicas, elementos de diseño y técnicas de narración. Saca el máximo provecho de tu tiempo de juego y aprende todo lo posible (sobre lo que hay que hacer y lo que NO hay que hacer) de quienes ya han creado juegos antes.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDefinición de “diversión”:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDescubre la esquiva naturaleza de la “diversión” en los juegos con la ayuda de una herramienta conceptual llamada marco MDA (Mecánica-Dinámica-Estética). Esta te ayudará a responder preguntas, tales como qué es la diversión, de dónde proviene y por qué encontramos ciertas cosas divertidas (o no), de modo que te sirva a la hora de diseñar juegos.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eNarración lineal:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nExplora el arte de la narración lineal en los juegos, donde la historia se desarrolla en una secuencia predeterminada.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eNarración no lineal:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nProfundiza en las técnicas de narración no lineal que te permiten crear historias interactivas donde las elecciones del jugador influyen en el desarrollo de la trama.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDinámica y ciclos de feedback:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nComprende las interacciones dinámicas dentro de los juegos y cómo los ciclos de feedback contribuyen a la participación y la progresión del jugador. El módulo profundiza en los intrigantes sucesos que ocurren durante el juego y explora las estrategias que emplean los diseñadores de juegos para crear experiencias inolvidables.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eToma de decisiones:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAprende a diseñar momentos relevantes de toma de decisiones que permitan a los jugadores influir en el curso del juego. Gran parte de la “diversión” en los juegos proviene de estas decisiones. Este módulo explorará qué es lo que hace que estas decisiones sean interesantes y la manera en que puedes hacer que estas interacciones con los jugadores sean aún más atractivas.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eTipos de diversión/Tipos de jugadores:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDescubre los diferentes tipos de jugadores y las diversas formas de diversión que buscan, lo que te permitirá diseñar experiencias adaptadas a diversos públicos.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDiseño de niveles (PvE):\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nUna de las especializaciones más conocidas dentro del diseño de juegos es el diseño de niveles. Domina el arte de crear cautivadores niveles para un jugador que desafíen, entretengan y sumerjan a los jugadores en el mundo del juego.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDiseño de niveles (PvP):\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nExplora las particularidades del diseño de niveles de jugador contra jugador (PvP). Aquí, la atención se centra en la creación de momentos interesantes de tensión entre los jugadores, en lugar de entre los jugadores y el juego.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDiseño UI/UX:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDescubre el diseño de interfaz de usuario (UI) y de experiencia de usuario (UX), para optimizar la interacción del jugador y garantizar que la experiencia de juego sea intuitiva y fluida.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003ePruebas de juego:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\n¿Dónde se encuentran los probadores de juegos? ¿Cómo se organiza una sesión de pruebas de juego para obtener el máximo valor en el menor tiempo posible? ¿Cuál es el proceso para organizar sesiones de prueba de juegos adecuadas? Apréndelo todo acerca de la importancia de las pruebas de juego y cómo recopilar información valiosa para perfeccionar y mejorar el diseño de tu juego.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eEquilibrio de juego:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDescubre los secretos del equilibrio en los juegos: qué es, cómo influyen en él los diseñadores de juegos y el proceso que utilizan para lograrlo. \u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003ePrototipado rápido:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nAprovecha el poder del prototipado rápido para iterar y refinar rápidamente las ideas de juegos. Esto ayuda a resolver dudas de diseño mediante pruebas de juego antes de gastar recursos considerables en la creación del juego final.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eDocumentación de diseño:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDescubre los diferentes tipos de documentos que redactan los diseñadores y aprende algunos métodos y trucos sobre cómo (y cuándo) escribir cada uno.\u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003cb style=\"font-weight: normal;\"\u003e\u003c/b\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eRedacción de reglas:\u003c/b\u003e\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\n\nDomina el arte de escribir reglas de juego claras y concisas para guiar a los jugadores. \u003cbr\u003e\u003c/br\u003e\u003cbr\u003e\u003c/br\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eComunicación del equipo:\u003cbr\u003e\u003c/br\u003e\u003c/b\u003eAprende técnicas de comunicación eficaces para colaborar de forma fluida con diseñadores, programadores y otros miembros del equipo. Esto es esencial, porque un diseñador de juegos es el guardián y defensor de la visión del juego y es su responsabilidad vincularse con el resto del equipo y lograr el mejor resultado.\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp dir=\"ltr\"\u003e\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003e\u003cp dir=\"ltr\"\u003e\u003cb\u003eCarreras en el diseño de juegos:\u003cbr\u003e\u003c/br\u003e\u003c/b\u003eExplora las posibles trayectorias profesionales en el sector dinámico y cambiante del diseño de juegos.\u003c/p\u003e\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"1d2:T56b,\u003cp\u003eDurante las últimas décadas se ha producido un desarrollo explosivo en las tecnologías de almacenamiento y procesamiento de datos y por tanto un incremento en los volúmenes de información para ser analizada y procesada. Esto ha creado una oportunidad sin precedentes mediante el proceso de descubrimiento de información interesante y útil a partir de repositorios de datos disponibles. El uso inteligente de los datos se ha convertido en uno de los motores de empoderamiento de las industrias, les ha permitido conocer mejor a sus clientes, mejorar su productividad, generar innovación, y alcanzar nuevos niveles de competitividad. La analítica de datos facilita a las empresas la comprensión de su situación actual y de las oportunidades de mejora, a partir de la adquisición de conocimientos basados en los datos de su propia operación, esto les permite realizar tareas como identificar fraudes, realizar perfiles de clientes con comportamientos similares, predecir cuáles de los clientes están en mayor riesgo de abandonar una compañía por la competencia, identificar el mejor conjunto de productos a recomendar a un cliente, entre otros.\u003c/p\u003e\n\u003cp\u003ePara comprender mejor cómo es el proceso de analíticas al interior de las empresas abordaremos el caso de Alpina Productos Alimenticios S.A. BIC una industria pionera en productos alimenticios a base de lácteos.\u003c/p\u003e1d3:T5ad,\u003cp\u003eCon la constante evolución y cambios de los procesos de enseñanza aprendizaje en las Instituciones de educación superior se ha determinado que un factor clave para el desarrollo de profesionales capaces y comprometidos con su proceso de enseñanza aprendizaje es la integridad académica.\u003c/p\u003e\n\u003cp\u003eDerivado del crecimiento exponencial de la información y acceso a través de medios digitales, ha sido detectado un incremento significativo de los actos fraudulentos que atentan contra la Integridad Académica dentro de los diferentes procesos que involucra la educación digital, tales como engaño, excusas falsas, plagio, uso indebido d"])</script><script>self.__next_f.push([1,"e dispositivos durante exámenes, falsificación de identidad, entre otros.\u003c/p\u003e\n\u003cp\u003eEstudios recientes evidencian la necesidad de fomentar, formar y reforzar la aplicación de los principios de integridad académica en el desempeño psicosocial de los estudiantes, este proceso actitudinal genera beneficios tangibles como el prestigio y credibilidad tanto en los estudiantes, profesores, investigadores, administradores y de los grados académicos que confiere una Institución educativa.\u003c/p\u003e\n\u003cp\u003eEste curso pretende presentar a la comunidad educativa los aspectos, generalidades y medios de aplicación que deben ser parte fundamental de la cultura de integridad académica en su práctica docente, haciendo uso de las diversas tecnologías disponibles para promover procesos de calidad académica digital.\u003c/p\u003e1d4:T715,\u003cp\u003eLa neurociencia es un campo muy amplio que estudia el cerebro, sus estructuras y funciones en el cuerpo humano. Desde el momento en que nacemos, interactuamos con el movimiento en la manera en que aprendemos a gatear, caminar, correr, bailar e, incluso, practicar un deporte; por tanto, el movimiento es un elemento esencial de salud y bienestar en el ser humano en todas sus etapas de la vida.\u003c/p\u003e\n\u003cp\u003eEn este curso podrás dar respuesta a preguntas de la vida diaria, tales como: ¿cuál es la representación precisa del cerebro y la organización del movimiento?, ¿por qué cuando somos pequeños imitamos corporalmente a otros?, ¿cómo se recupera nuestro cerebro después de una lesión motora?, ¿por qué a veces cuando dormimos sentimos que no podemos movernos y tenemos un fantasma encima?, ¿cómo podemos hacer cálculos tan sencillos como llevar un vaso de agua a nuestra boca sin dejarlo caer?, o cosas tan extrañas como soñar que caemos de un gran abismo y damos un salto impresionante en la cama. Estos interrogantes serán solucionados mediante el análisis de casos de la vida real, como los de los actores Michael J. Fox y Selma Blair, el científico Stephen Hawking o la periodista Julie Chin.\u003c/p\u003e\n\u003cp\u003ePo"])</script><script>self.__next_f.push([1,"r tanto, en este curso abordaremos conceptos prácticos de neuroanatomía y neurofisiología del control y el aprendizaje motor, y su aplicación en el análisis de pacientes con trastornos del movimiento como el Alzheimer o la esclerosis múltiple, y trastornos neurológicos de la infancia.\u003c/p\u003e\n\u003cp\u003eTambién, y más interesante aún, veremos cómo los desarrollos tecnológicos y la inteligencia artificial presentan avances que nos ayudan a mejorar actividades motoras, generan ayudas en caso de enfermedad y permiten analizar y predecir patrones para determinar un tratamiento.\u003c/p\u003e1d5:T47d,\u003cul\u003e\n\u003cli\u003eComprender los principios básicos de la neurociencia en el movimiento humano.\u003c/li\u003e\n\u003cli\u003eReconocer cómo se integra la información sensorial en el cerebro para reproducir respuestas motoras.\u003c/li\u003e\n\u003cli\u003eConocer los principios fundamentales del control y el aprendizaje motor.\u003c/li\u003e\n\u003cli\u003eComprender las características del desarrollo motor en niños, adolescentes y cómo evolucionan con la edad.\u003c/li\u003e\n\u003cli\u003eAnalizar los factores biológicos, cognitivos y ambientales que influyen en el desarrollo y la ejecución de habilidades motoras.\u003c/li\u003e\n\u003cli\u003eExplorar nuevas tecnologías emergentes en la comprensión del movimiento.\u003c/li\u003e\n\u003cli\u003eExplorar cómo puede aplicarse la inteligencia artificial para mejorar la optimización y el aprendizaje motor.\u003c/li\u003e\n\u003cli\u003eIdentificar las implicaciones del trastorno del movimiento en la calidad de vida, la independencia funcional y la participación de los pacientes con trastornos neurológicos.\u003c/li\u003e\n\u003cli\u003eExplorar estrategias de tratamiento en el manejo de enfermedades motoras.\u003c/li\u003e\n\u003cli\u003eComprender cómo puede ser integrada la inteligencia artificial en el cuidado de pacientes con alteraciones motoras.\u003c/li\u003e\n\u003c/ul\u003e1d6:T5e1,\u003cp\u003e\"In this course, we will delve into the advanced techniques that can be used to prompt ChatGPT, allowing it to generate responses that are even more accurate, relevant, and engaging. We will \u003c/p\u003e\n\u003cp\u003eexplore the different applications of ChatGPT across various industries, including healthcare, "])</script><script>self.__next_f.push([1,"finance, education, and customer service, among others. \u003c/p\u003e\n\u003cp\u003eMoreover, we will also look into integrating ChatGPT with other tools, such as natural language processing (NLP) and machine learning (ML), to further enhance its capabilities and create more advanced chatbot applications. By the end of this course, you will have a deep understanding of how to leverage the power of ChatGPT and build intelligent chatbots that can deliver superior customer experiences. \u003c/p\u003e\n\u003cp\u003eIn addition to its powerful capabilities, ChatGPT also has some limitations that we need to consider when developing applications on top of it. For instance, while it can generate responses based on a vast corpus of data, it may not always produce the desired results. Therefore, it is important to understand these limitations and how to work around them to ensure that we can build robust and effective chatbot applications. \u003c/p\u003e\n\u003cp\u003eSo, buckle up, and get ready to explore the advanced techniques of ChatGPT. I hope you will find this course both informative and enjoyable, and that you will come\u003c/p\u003e\n\u003cp\u003eaway with a deeper appreciation for the power of AI and its potential to change the world. Enroll now to start diving in!\"\u003c/p\u003e1d7:T5ab,\u003cp\u003eModel-based systems engineering (MBSE) is a contemporary systems engineering methodology that uses conceptual models for communication between system architects, designers, developers, and stakeholders. Object-Process Methodology (OPM, ISO 19450) is an MBSE language and methodology for constructing domain-independent conceptual models of all kinds of systems. The course provides systems engineers and others with basic knowledge and tools for MBSE using OPM, focusing on conceptual modeling of systems, giving learners a competitive advantage over their peers. \u003c/p\u003e\n\u003cp\u003eOPM has a small set of symbols and one kind of diagram, making it easy to learn and enjoyable to use. Every OPM model is composed of objects and processes, connected by relations. \u003c/p\u003e\n\u003cp\u003eOPM models include two ways of expression: graphical (Object-Process"])</script><script>self.__next_f.push([1," Diagram) and verbal (Object-Process Language). The methodology enables complexity management of systems via hierarchical composition. OPM is a formal yet intuitive approach to conceptual modeling. It is implemented in OPCloud, a novel Web-based OPM modeling environment. \u003c/p\u003e\n\u003cp\u003eDuring the course, you will learn the process of system design and development using MBSE with OPM. The course content was produced to be informative and entertaining. You will model various real-life systems in OPM – mainly technological, but also social and natural. Learning is made interactive through diverse, engaging exercises.\u003c/p\u003e1d8:Tdd9,"])</script><script>self.__next_f.push([1,"\u003cp\u003eHoy parece que se esta hablando de \"Big Data\" por todas partes. Pero ¿qué tan importante o relevante es esto y qué oportunidades ofrece para las organizaciones y nuestros países? ¡Inscríbete en el MOOC \"Big Data sin misterios\" y descubre las respuestas a estas preguntas!\u003c/p\u003e\n\u003cp\u003eLa revolución de los datos implica contar con un gran volumen de datos, pero también contar con nuevos tipos de datos. Gran parte de la población mundial, así como las máquinas, se encuentran conectadas a internet mediante dispositivos: celulares, computadores, sensores... Sin embargo, ¿estamos aprovechando el potencial de todos estos datos para tomar mejores decisiones? ¿Estamos generando valor a partir de ellos? Big Data supone un cambio de paradigma que se refiere tanto a los datos masivos como a las técnicas y tecnologías para su recopilación y análisis; con el fin de detectar patrones, aprender de la experiencia y predecir situaciones futuras para tomar decisiones estratégicas.\u003c/p\u003e\n\u003cp\u003e\"Big Data sin misterios\" te mostrara las ventajas de utilizar Big Data, la analítica avanzada y la inteligencia artificial, tanto en el sector público, como en el sector privado. El curso te proporcionará, mediante videos y lecturas, fundamentos teóricos, metodologías y ejemplos de casos reales de uso. También tendrás la oportunidad de rendir actividades evaluadas para que puedas poner a prueba lo aprendido.\u003c/p\u003e\n\u003cp\u003ePor último, la modalidad de este curso es \"a tu propio ritmo ( \u003cem\u003eself-paced\u003c/em\u003e )\". Esto significa que puedes registrarte en cualquier momento, aunque lleve abierto un tiempo. Si escoges pagar por el certificado verificado, tendrás la flexibilidad de tomar el curso hasta la fecha de cierre del curso.\u003c/p\u003e\n\u003cp\u003eLos estudiantes que obtienen el certificado en este curso también recibirán una insignia digital. Las insignias digitales permiten compartir más fácilmente y de forma más confiable las habilidades o el conocimiento adquirido. Para más informaciones sobre las insignias digitales puedes visitar el enlace \u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cursos.iadb.org/es/indes/credenciales-digitales\" rel=\"noopener\" target=\"_blank\"\u003einsignias digitales\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e.\u003c/p\u003e\n\u003cp\u003eSi optas por la \u003cstrong\u003emodalidad asistente\u003c/strong\u003e tendrás acceso ilimitado a los contenidos del curso, pero no podrás realizar las actividades evaluadas ni obtener el certificado.\u003c/p\u003e\n\u003cp\u003eSi optas por la \u003cstrong\u003emodalidad certificado verificado\u003c/strong\u003e puedes acceder al curso y sus evaluaciones hasta la fecha de cierre, tras hacer un pago de USD 25\u003cspan lang=\"ES-ES\"\u003e. \u003c/span\u003e\u003cspan lang=\"ES-ES\"\u003eDe esta forma, si apruebas, además del certificado verificado, obtendrás una \u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://cursos.iadb.org/es/indes/credenciales-digitales\" rel=\"noopener\" target=\"_blank\"\u003e\u003cspan lang=\"ES-ES\"\u003einsignia digital\u003c/span\u003e\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e que permite transformar la forma en que compartes tus logros académicos y profesionales, como, por ejemplo, en redes sociales.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"ES-AR\"\u003e¿Conoces la ayuda financiera de edX para optar al certificado verificado e insignia digital?\u003c/span\u003e\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eEdX ofrece asistencia financiera a aquellos alumnos que tengan dificultades para realizar el pago. Inscríbete en el curso y rellena esta \u003cem\u003e\u003cstrong\u003e\u003ca href=\"https://courses.edx.org/financial-assistance/\" rel=\"noopener\" target=\"_blank\"\u003esolicitud de asistencia financiera\u003c/a\u003e\u003c/strong\u003e\u003c/em\u003e.\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eConsulta más información en el apartado de \"Preguntas frecuentes\" que encontrarás más abajo.\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"1d9:T614,\u003cp\u003eEl MOOC de visualización de datos es un curso diseñado para llevar tus habilidades de visualización de datos al siguiente nivel. La visualización de datos es una parte esencial en la toma de decisiones informadas y una herramienta poderosa para comunicar información de manera clara y efectiva. A lo largo de este curso, aprenderás a utilizar Google Data Studio, una poderosa herramienta de visualización de datos en línea desarrollada por Google, para crear visualizaciones impresionantes y expresivas y manipular datos de forma eficiente.\u003c/p\u003e\n\u003cp\u003eA lo largo del curso, te sumergirás en los fundamentos de la visualización de datos. Aprenderás la importancia de la visualización efectiva en la comunicación de información y conocerás los principios básicos de diseño y comunicación visual. También te familiarizarás con las ventajas de utilizar Google Data Studio y cómo conectar y preparar tus fuentes de datos para la visualización.\u003c/p\u003e\n\u003cp\u003eAl finalizar este MOOC de Visualización de Datos con Google Data Studio, estarás equipado con las habilidades y técnicas necesarias para crear visualizaciones efectivas y expresivas. Serás capaz de utilizar Google Data Studio de manera experta para comunicar datos de forma profesional y persuasiva. ¡Prepárate para transformar tus datos en poderosas historias visuales y llevar tus habilidades de visualización al siguiente nivel!\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e¡Te esperamos en el curso para embarcarnos juntos en esta emocionante aventura en el mundo de la visualización de datos!\u003c/strong\u003e\u003c/p\u003e1da:T772,\u003cp\u003eStudents will question for themselves the meaning of human freedom, responsibility and identity by reading and responding to Dante Alighieri's Divine Comedy. The Comedy, which is richly steeped in the medieval culture of the 14th century, still speaks vividly to modern readers struggling with the question, “who am I?” Dante, as a Florentine, a poet, a lover, and religious believer, struggled with the same question in each facet of his life before coming to a mome"])</script><script>self.__next_f.push([1,"nt of vision that wholly transformed him as a person.\u003c/p\u003e\n\u003cp\u003eAs a 21st century reader, you will encounter the poem in a novel online environment that integrates knowledge from the disciplines of literature, history, psychology, philosophy, and theology with modern technology. You will be guided through the poem by means of the \"MyDante\" Project, an online environment developed by Professor Ambrosio in collaboration with the Georgetown University Center for New Designs in Learning and Scholarship (CNDLS), which will aid your own contemplative engagement with the poem. Alone and with the edX community, you will reflect on both Dante's interpretation of freedom and how it functions in the formation of personal identity, and the problem of finding appropriate metaphors to discuss these issues in our modern life.\u003c/p\u003e\n\u003cp\u003eYou, the modern reader, will only understand the full implications of Dante's poetry if you participate with it in a way that is personal and is genuinely contemplative. You will discover that contemplative reading goes beyond the literal meaning, and even beyond the traditional allegorical and interpreted meaning, to apply every possible meaning contained in the text to your own life and identity. Through the MyDante platform, you will learn to know yourself in your own historical, personal, and spiritual contexts as you journey towards your understanding of your personal freedom and identity.\u003c/p\u003e1db:T424,\u003cul\u003e\u003cli\u003eStudents will become familiar with the theory and practice of “Contemplative Reading” that constitutes one of the principal structural dynamics of Liberal Arts education.\u003c/li\u003e\n\t\u003cli\u003eStudents will be able to apply the general practice of “Contemplative Reading” to Dante’s Divine Comedy.\u003c/li\u003e\n\t\u003cli\u003eStudents will demonstrate in-depth and relatively advanced familiarity with and knowledge of an epic poem of the highest cultural significance; in specific, Dante’s Divine Comedy.\u003c/li\u003e\n\t\u003cli\u003eStudents will begin to articulate for themselves their own personal convictions in response to refle"])</script><script>self.__next_f.push([1,"ction questions about human dignity, freedom and responsibility with which the Divine Comedy inevitably confronts its readers.\u003c/li\u003e\n\t\u003cli\u003eStudents will engage with the most fundamental goal of Liberal education, promoting the universal dignity of personhood.\u003c/li\u003e\n\t\u003cli\u003eStudents will become acquainted with the specific contributions the Christian, Catholic and Jesuit tradition of Georgetown University bring to the promotion of human dignity.\u003c/li\u003e\n\u003c/ul\u003e1dc:T883,"])</script><script>self.__next_f.push([1,"\u003cp\u003eMarketing Digital: Desde SEO hasta Analítica de Datos nace de la imperante necesidad de familiarizarse con las vertiginosas transformaciones tecnológicas que redefinen el universo empresarial. Desarrollado por la Universidad Anáhuac Online y hospedado en edX, este curso te sumerge en las profundidades del marketing digital, descifrando aquellos componentes esenciales que están reinventando el modo en que las marcas interactúan con su audiencia.\u003c/p\u003e\n\u003cp\u003eLa era digital ha alterado la esencia misma de cómo las empresas se aproximan a sus negocios. Esta formación detalla el impacto de dicha metamorfosis en el marketing, habilitando a las organizaciones para forjar relaciones más directas, dinámicas y personalizadas con sus clientes. Aquí descubrirás cómo moldear estrategias ajustadas y certeras utilizando herramientas como el Customer Journey y el Marketing Funnel.\u003c/p\u003e\n\u003cp\u003eAdentrándonos en las arterias de los motores de búsqueda, el curso brinda una visión clara de SEO (Search Engine Optimization) y SEM (Search Engine Marketing). Aprenderás desde la selección acertada de palabras clave hasta las sutilezas en la estructuración web, asegurando una visibilidad óptima y una atracción genuina hacia tu público objetivo.\u003c/p\u003e\n\u003cp\u003eSin embargo, la presencia digital va más allá de los buscadores. El curso desentraña el potencial del email marketing, el influjo de los influencers y la relevancia de seleccionar el social media idóneo. Analizarás cómo identificar y adaptarte a cada plataforma en función de su naturaleza y la demografía de sus usuarios.\u003c/p\u003e\n\u003cp\u003eFinalmente, en la era de la información, saber decodificar datos es imperativo. Este curso te empodera con las herramientas para interpretar métricas y comprender el retorno de inversión en tus estrategias digitales.\u003c/p\u003e\n\u003cp\u003eEn suma, Marketing Digital: Desde SEO hasta Analítica de Datos es tu pasaporte a un mundo digital en constante evolución. Proporciona una visión de 360 grados del marketing digital actual, preparándote para concebir y ejecutar estrategias robustas y resonantes, y para establecer conexiones significativas con tus clientes en el entramado digital.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1dd:Tc00,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"ES\"\u003eLas redes de computadores, o renombradas hoy en día como \u003cem\u003eNetworks of Things\u003c/em\u003e , son esenciales para soportar los servicios de Internet que usamos a diario, dado que soportan la transformación digital de las empresas y apalancan de manera directa la revolución 4.0 que vivimos hoy en día.\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEntender el funcionamiento de las redes de computadores es fundamental para poder iniciarse en roles orientados al diseño, implementación y mantenimiento de redes corporativas, y sin duda también representa un conocimiento diferencial para poder optar por uno de los denominados empleos de la cuarta revolución industrial que incluyen: Especialistas en Big Data, Especialistas en transformación digital, Desarrolladores y analistas de software y aplicaciones, gestor de servicios de TI, entre otros.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEste curso te enseñará los conceptos claves y herramientas que te ayudarán a entender mejor la forma como funcionan las redes de computadores, realizando un entendimiento de la arquitectura más utilizada en internet (TCP/IP) y haciendo una revisión de los protocolos más importantes de cada una de las capas de dicha arquitectura. Las redes inalámbricas también serán incluidas como parte del temario del curso por su importancia hoy en día en el despliegue de soluciones de tipo \u003cem\u003esmart\u003c/em\u003e home donde se tienen múltiples equipos conectados a internet ofreciendo y consumiendo información. Adicionalmente, se apropiarán algunos conceptos de seguridad de redes para asegurar las redes corporativas a través de diferentes mecanismos de protección como VLANs y Firewalls.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eDentro de los laboratorios a implementar se encuentran: cálculo del Throughput, inspección de mensajes del protocolo HTTP, implementación de sockets TCP y UDP, cálculo de direccionamiento IP, configuración de un servicio DHCP, implementación de rutas estáticas y dinámicas, prueba del protocolo ARP, configuración de una red inalámbrica, implementación de VLANs, entre otros. Para el desarrollo de estos laboratorios se utilizará software libre, por ejemplo el monitor de tráfico Wireshark que permite revisar la estructura de los paquetes en una red. Por otro lado también se utilizará software de simulación de redes de uso gratuito, por ejemplo el simulador Packet Tracer del proveedor de telecomunicaciones CISCO.\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003cspan lang=\"ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAprende a través de una metodología de enseñanza dinámica ofrecida desde la Escuela de Ingeniería, Ciencia y Tecnología de la Universidad del Rosario, la cual explica los conceptos teóricos de una manera precisa y posteriormente los pone en práctica a través de los laboratorios, sin necesidad de implementar infraestructura compleja o costosa. El estudiante también puede optar por presentar test al final de cada módulo los cuales le permitirán validar y afianzar el conocimiento adquirido.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1de:T86c,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEn un futuro, el concepto de Internet de las Cosas en la industria tendera a ser tan grande que se espera que en el 2035 hayan mas de 50 billones de dispositivos inteligentes interconectados entre si a traves de multiples redes de comunicación, creando un mercado para la industria de entre 14 y 15 trillones de dolares (Khodadadi, Dastjerdi, \u0026amp; Buyya, 2016). Con el gran crecimiento de la tecnología en los ultimos años, las industrias se encuentran en una constante transformación tecnológica.\u003c/p\u003e\n\u003cp\u003eEl paradigma de Internet de las Cosas hace parte de las recientes tecnologías que propenden ayudar a mejorar la atención médica y los procesos industriales que requieren una monitorización en tiempo real. Para lograr este objetivo, es fundamental integrar de manera efectiva la información proveniente de las fuentes heterogéneas (dispositivos) de tal forma que se puedan compartir los datos obtenidos manteniendo su seguridad y privacidad, utilizar herramientas de análisis de datos avanzados y extraer información relevante con el fin de obtener el mejoramiento continuo en diferentes campos de la ciencia y tecnología (Dridi, Sassi, \u0026amp; Faiz, 2018).\u003c/p\u003e\n\u003cp\u003eEste curso online busca que las personas interesadas se enfrenten a la experiencia de un aprendizaje activo en temas relacionados con la ciencia, tecnologia, desarrollo de sistemas escalables y el uso de software libre utilizando el concepto de Internet de las Cosas; promoviendo conceptos fundamentales que las personas deberan poseer en un futuro para ser competitivos en sus trabajos. El curso busca que los estudiantes se enfrenten a problemáticas reales, a las cuales se les dara una solución implementando adecuadamente el concepto de Internet de las Cosas.\u003c/p\u003e\n\u003cp\u003eEste curso mostrara el alcance que tiene el Internet de las cosas en la actualidad. Este curso esta diseñado para que en cada una de las secciones se presente un componente teórico acompañado de una práctica real en donde el participante del curso pueda aplicar los conocimientos adquiridos en cada sección. Este curso ayuda a desarrollar las competencias que requieren las industrias 4.0.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1df:T83b,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEste curso en línea te ayudará a comprender qué es la gobernanza de datos, los criterios que deben tener en cuenta quienes formulan política pública al momento de redactar o desarrollar leyes, regulaciones o políticas en materia de protección de datos y privacidad, así como aspectos prácticos de los programas de gobernanza de datos.\u003c/p\u003e\n\u003cp\u003eAntes, cuando las organizaciones podían almacenar la información de sus clientes en ficheros o archivadores manuales, las decisiones sobre cómo ejercer la autoridad sobre el procesamiento de datos personales eran más sencillas. La continua evolución de tecnologías digitales cambia constantemente las formas en que se procesan datos personales y por lo tanto, el paradigma de protección de datos personales.\u003c/p\u003e\n\u003cp\u003eDiversos países están adoptando leyes y regulaciones que intentan abarcar y prever todos los aspectos de las distintas y siempre cambiantes maneras en que se procesan datos personales en la era digital. Por ello, los legisladores y autoridades de Protección de Datos personales se enfrentan al desafío de desarrollar un marco legal y regulatorio que pueda seguir el ritmo acelerado del desarrollo económico basado en la tecnología, a la vez que se protegen efectivamente los derechos e intereses de los sujetos titulares de datos.\u003c/p\u003e\n\u003cp\u003eLos estudiantes se verán expuestos a aspectos intrínsecos al mundo online que deben ser considerados en el diseño de las leyes, regulaciones, políticas y programas de cumplimiento (compliance) de datos personales, incluyendo los sistemas de múltiples capas y múltiples actores interesados, que se ven involucrados en la protección de datos personales desde la perspectiva de cumplimiento y política pública.\u003c/p\u003e\n\u003cp\u003eEste curso de derecho proporcionará al estudiante una base estructurada de aprendizaje apara entender las tensiones que surgen cuando actores online procesan datos personales, y cómo abordar dilemas y cuestiones básicas de protección de datos y privacidad en el diseño de políticas públicas y programas de cumplimiento (compliance) en datos personales.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e0:Ta15,"])</script><script>self.__next_f.push([1,"\u003cp\u003eMúltiples y diversas manifestaciones muestran que se están produciendo unos profundos cambios en el mundo. El modelo de la sociedad industrial está dejando paso a un nuevo modelo de sociedad, aún difuso, en el que la capacidad de transformar la información en conocimiento es clave. Es fácil deducir que para esta nueva sociedad emergente se necesita un concepto de educación bien distinto al que requería la sociedad industrial. Sin este cambio educativo difícilmente se podrá conseguir satisfactoriamente el cambio y, consecuentemente, instalarse adecuadamente en un mundo que va a alterarse radicalmente.\u003c/p\u003e\n\u003cp\u003eEl curso tiene dos objetivos. El primero es presentar el fenómeno de la transformación de la sociedad que estamos viviendo y los fundamentos para definir el mundo que está emergiendo como el de la sociedad del conocimiento. La pretensión de la primera parte es disponer de un escenario suficientemente detallado y sólido de lo que está sucediendo y superar así la visión e interpretación triviales que pueda haber sobre un nuevo modelo de sociedad. Sin esta buena base es difícil fundamentar el siguiente objetivo del curso: el papel de la educación.\u003c/p\u003e\n\u003cp\u003eEl objetivo de tratar la educación en este curso es para presentarla en estrecha relación con una intensa crisis cultural que inevitablemente tiene que sobrevenir para que no aumente el desajuste entre el mundo tecnológico -planetario, desigual y contradictorio- que hemos levantado y los valores culturales de otros tiempos con los que queremos mirar e interpretar el mundo de hoy y el que se avecina. Así que se tratará la estrecha relación que hay y debe haber entre educación y cultura. De igual modo se verá en el curso la relación entre tecnología y educación, no desde el punto de vista instrumental, sino cultural.\u003c/p\u003e\n\u003cp\u003eLa pretensión del curso es que de esta observación del fenómeno actual de cambio, y de la interpretación del papel de la educación para la orientación y control de ese cambio, surjan elementos inspiradores de acciones educativas precisas ajustadas a las múltiples realidades concretas desde las que se están sintiendo los desafíos de vivir en el siglo XXI.\u003c/p\u003e\n\u003cp\u003eEl planteamiento didáctico del curso seguirá la estructura de un viaje por el tiempo, por lugares y también por conceptos que haga ameno el recorrido durante las siete semanas. En cuanto a la parte textual, habrá la experiencia de lectura de piezas multimedia concebidas y escritas para la lectura en pantalla, y especialmente en \u003cem\u003esmartphones\u003c/em\u003e y tabletas.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e1:Teeb,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"ES\"\u003eLa AI o inteligencia artificial, el internet de las cosas, el Big Data, los asistentes virtuales y las tecnologías digitales han cambiado las reglas del juego en el mundo de los negocios. \u003c/span\u003eEl acceso a internet mediante dispositivos móviles y portátiles transformaron la manera como las personas interactúan con el mundo. Estas interacciones han permitido la generación y recolección de datos que los usuarios que utilizan diariamente aplicaciones, redes sociales y teléfonos móviles. Esto brinda información muy valiosa tanto a organizaciones, como a empresas. En consecuencia, las organizaciones deben enfrentar nuevos retos que implican el resguardo de datos personales de sus clientes potenciales y activos mediante las mejores prácticas que diferentes reguladores mundiales emiten.\u003c/p\u003e\n\u003cp\u003ePor todo lo anterior y, ante el crecimiento de la cantidad de datos, la inteligencia artificial es vital para entender y aprovechar todo este conocimiento. No solo eso, el desarrollo de las tecnologías digitales ha crecido a tal grado que implementaciones como el reconocimiento de imágenes, el lenguaje natural o chatbots, el desarrollo de aplicaciones para el uso de asistentes personales como Siri o Alexa y el aprendizaje automático para desarrollar aplicaciones de IA pueden ser aplicados a soluciones de negocios sin la necesidad de contar con amplios recursos materiales para llevarlos a cabo.\u003c/p\u003e\n\u003cp\u003ePor otro lado, el mundo de los negocios ha comenzado a ser dominado por las grandes empresas que implementan metodologías ágiles y aplican soluciones de inteligencia artificial y machine learning en sus procesos. Esto potencializa la calidad de sus procesos, mejora el entendimiento de las necesidades de los clientes, brinda una mejor toma de decisiones basada en datos y ayuda a dirigir los esfuerzos de las organizaciones al mejoramiento de la experiencia de usuario. Empresas como IBM, Amazon, Microsoft o Google son punta de lanza en el sector empresarial debido al dominio de estas metodologías que permiten reducir el riesgo que implica apostarle a la innovación.\u003c/p\u003e\n\u003cp\u003eSegún un reporte de Forrester del 2020 titulado “\u003ca href=\"https://www.ibm.com/downloads/cas/KNQQOLGG\"\u003eReinventing Workflows\u003c/a\u003e”, las organizaciones han identificado un impacto directo en la optimización de sus procesos gracias a la inteligencia artificial en las áreas de mejoramiento de experiencia de usuario con un 66% de efectividad; optimizaron la agilidad de su organización en un 62%; incrementaron sus utilidades en un 59%; incrementaron su productividad en un 58%; y redujeron costos en un 50%.\u003c/p\u003e\n\u003cp\u003ePor lo anterior, es vital que las empresas adopten estrategias que impliquen una transformación digital gradual para que puedan abrirse a las nuevas oportunidades que brinda la inteligencia artificial si desean mantenerse vigentes en el mercado y ser competitivas.\u003c/p\u003e\n\u003cp\u003eEn este MOOC abordarás las herramientas que permiten aprovechar las ventajas de la tecnología mediante casos prácticos y amigables para aplicar en tu negocio. Te proporcionaremos todos los consejos importantes que llevarán a tu empresa al éxito utilizando la IA. Así mismo, te brindaremos los conocimientos técnicos con un enfoque amigable que te permitan entender cómo funcionan los sistemas de inteligencia artificial actuales para recolectar y realizar análisis de datos en tiempo real.\u003c/p\u003e\n\u003cp\u003eAbordaremos distintos ejemplos prácticos de aplicación de inteligencia artificial en diferentes áreas de negocio y con diferentes tecnologías y te proporcionaremos herramientas amigables para la solución de casos aplicados a los negocios.\u003c/p\u003e\n\u003cp\u003eNuestro interés no es que tu negocio se convierta en un proveedor de tecnología, sino que ocupes la tecnología para potencializar tu negocio.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e2:T8a2,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eLa dinámica actual de las ciencias de la salud exige una gran solidez en la formación técnica y científica, trabajo con la mejor evidencia disponible, experiencia profesional y respeto por las expectativas y necesidades de las personas. Para lograr esto, cada día es más importante investigar, producir nuevo conocimiento y generar evidencia sólida que permita tomar decisiones en cada área del conocimiento, que garantice el mejor ejercicio profesional, que aporte a cada disciplina, a los pacientes y a la sociedad en general.\u003c/span\u003e\u003cspan lang=\"ES-ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEl informe de la Unesco sobre la ciencia, publicado en 2015, indica que sea cual sea el nivel de ingresos de un país, debe apostar en la investigación científica para impulsar su desarrollo. Este impulso inicia desde la formación de nuevos profesionales y se perfecciona en los postgrados, los cuales deben ofrecer herramientas para realizar investigación de calidad, que aporte a la sociedad y al país.\u003cspan lang=\"ES-ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEl presente curso te permitirá adquirir los conocimientos y herramientas básicas para que presentes un proyecto de investigación factible, interesante para la comunidad científica, novedoso, alineado a los más altos estándares éticos, de relevancia para la sociedad. \u003cspan lang=\"ES-ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEstos conocimientos incluyen el manejo de los diferentes paradigmas de la investigación, la epidemiología, la bioestadística, las tecnologías de la informática y las telecomunicaciones, elementos de escritura científica, los cuales se articulan con la metodología de la investigación, bajo lineamientos de bioética e integridad científica. \u003cspan lang=\"ES-ES\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003ePara esto, inicialmente te aproximarás a las generalidades de la investigación y el método científico, los paradigmas de investigación que existen y el planteamiento del tema, el problema y la pregunta de investigación. En un segundo momento, conocerás algunas herramientas de apoyo a la investigación, así como la estructura base de un proyecto de investigación. Finalmente, profundizarás en la metodología de investigación y el análisis de la información.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e3:T535,\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eIdentificar los diferentes paradigmas de investigación y su aplicación práctica según el tema elegido por el estudiante y el problema de investigación. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eEstructurar un problema de investigación y justificarlo en el contexto científico. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eProponer una pregunta de investigación factible, interesante, novedosa, ética y relevante. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eRealizar una revisión bibliográfica completa, con referencias que aporten la mejor evidencia disponible y permitan estructurar un marco teórico sólido. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eFormular objetivos alineados con la pregunta de investigación, que orienten \u003c/span\u003edicha investigación. \u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003ePlantear una metodología que permita responder la pregunta de investigación, con el diseño, la muestra, los instrumentos y análisis apropiados. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eIdentificar los aspectos críticos que permitan plantear consideraciones éticas fundamentadas en los principios de bioética en investigación. \u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"ES-ES\"\u003eManejar herramientas TIC para realizar búsquedas bibliográficas y referenciar.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e1e4:T5ee,\u003cp\u003eThis course is the continuation of the basic MBSE with OPM course. \u003c/p\u003e\n\u003cp\u003eModel-based systems engineering (MBSE) is a contemporary systems engineering methodology that uses conceptual models for communication between system architects, designers, developers, and stakeholders. Object-Process Methodology (OPM, ISO 19450) is an MBSE language and methodology for constructing domain-independent conceptual models of all kinds of systems. The course provides systems engineers and others with advanced knowledge and tools for MBSE with OPM, focusing on conceptual modeling of systems, giving learners a competitive advantage over their peers. \u003c/p\u003e\n\u003cp\u003eOPM has a small set of symbols and one kind o"])</script><script>self.__next_f.push([1,"f diagram, making it easy to learn and enjoyable to use. Every OPM model is composed of objects and processes, connected by relations. OPM models include two ways of expression: graphical (Object-Process Diagram) and verbal (Object-Process Language). The methodology enables complexity management of systems via hierarchical composition. OPM is a formal yet intuitive approach to conceptual modeling. It is implemented in OPCloud, a novel Web-based OPM modeling environment. \u003c/p\u003e\n\u003cp\u003eDuring the course, you will learn the process of system design and development using MBSE with OPM. The course content was produced to be informative and entertaining. You will model various real-life systems in OPM - mainly technological, but also social and natural. Learning is made interactive through diverse, engaging exercises.\u003c/p\u003e1e5:T747,\u003cp\u003e\u003cspan lang=\"ES-CO\"\u003eDesde que Internet y la Web fueron creados, una cantidad infinita de posibilidades se han abierto. Quizás, las más importantes y usuales sean el acceso de datos, transacciones financieras y creación de contenido por parte del usuario. Sin embargo, esto ha traído consigo una serie de riesgos y vulnerabilidades de seguridad, pues ha aumentado el conjunto de defectos comunes y se han concebido nuevos tipos de ataques informáticos.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003ePor este motivo, se hace importante reconocer los puntos críticos de seguridad en la interacción de los usuarios con las aplicaciones, pues estos suelen ser los más vulnerables antes las fallas en los sistemas de información. Esto es un desafío, ya que, sin duda, los avances tecnológicos de estos últimos años exigen aplicaciones más seguras, tanto para las empresas que obtienen ingresos crecientes del comercio por Internet, como para los usuarios que confían información confidencial a las aplicaciones web. Es por esto que, el objetivo del curso es, introducir a los participantes a la seguridad en el desarrollo de aplicaciones web en pro de lograr aplicaciones web más seguras, confiables y robustas."])</script><script>self.__next_f.push([1,"\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEste curso, te permitirá conocer acerca de las problemáticas de seguridad y como mitigarlas, los aspectos básicos de seguridad en las aplicaciones web, el reconocimiento de sus vulnerabilidades para comprender la importancia de invertir en la seguridad de las entradas y salidas del sistema, principales fuentes de ataques mal intencionados, las principales prácticas de seguridad que se deben tener en cuenta para el desarrollo de aplicaciones seguras y robustas y finalmente identificar los principales estándares y herramientas de análisis que permiten valorar la seguridad de las aplicaciones web.\u003c/p\u003e1e6:T510,\u003cp\u003e\u003cspan lang=\"ES-CO\"\u003eAl finalizar el curso, el estudiante estará en la capacidad de:\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIdentificar las principales prácticas de seguridad en un modelo de ciclo de vida de desarrollo de aplicaciones web, reconociendo la problemática de seguridad actual, la cual debe ser tratada en cada una de sus fases, evaluándola basados en estándares internacionales, con el fin de desarrollar u obtener aplicaciones web más seguras y confiables.\u003c/p\u003e\n\u003cp\u003eReconocer los aspectos básicos de la seguridad de aplicaciones web, abordando su problemática, evolución y las vulnerabilidades que estas mismas poseen, con el fin de comprender la importancia de invertir en seguridad.\u003c/p\u003e\n\u003cp\u003eComprender las principales prácticas de seguridad que son necesarias en cada una de las fases del ciclo de vida de desarrollo de aplicaciones web, con el fin de obtener aplicaciones robustas, confiables y que presenten el mínimo de vulnerabilidades.\u003cspan lang=\"ES-CO\"\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eReconocer los principales métodos para realizar un análisis de evaluación de seguridad en una aplicación web, por medio de los principales estándares y herramientas de análisis, con el fin de reconocer las amenazas que se puedan presentar en el diseño de las mismas.\u003c/p\u003e1e7:T6f8,\u003cp\u003e\u003cspan lang=\"ES-CO\"\u003eLas organizaciones se deben adaptar rápidamente a los cambios que "])</script><script>self.__next_f.push([1,"se presentan en el entorno, en particular a las transformaciones sociales y tecnologías que impactan en su estabilidad. En este contexto, se requiere preparar a las organizaciones para entender las nuevas formas de trabajo que se pueden generar, así como los cambios en las interacciones humanas.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEl MOOC Gestión del Cambio y Transformación Cultural para la 4ª Revolución Industrial está dirigido a los directivos y personas responsables de la gestión de personas en la organización, quienes, al recorrer el curso, tendrán la posibilidad de comprender como la cultura organizacional modela el accionar de las personas que hacen parte de las empresas y cómo el desempeño de estas personas influye en sus resultados. Conocer estos modelajes le facultará al participante en la planeación de posibles soluciones y la toma de decisiones para asumir los retos que trae consigo la 4ª Revolución Industrial, retos que pueden afectar a sus usuarios y colaboradores, e implica, a su vez una nueva forma de liderazgo y de modelamiento de la cultura organizacional requerida para el logro de la estrategia organizacional.\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eEl curso lleva al participante a que, una vez entendido el significado de la cultura, comprenda los procesos requeridos para su transformación, es decir, la forma de cambiar las creencias, las formas de pensar y de actuar, para lograr que los equipos y la organización se adapten a los cambios del entorno, así, con esta información estará en capacidad de orientar estrategias y acciones para implementar procesos de cambio en los procesos de desarrollo humano.\u003c/p\u003e1e8:T67a,\u003cp\u003e\u003cspan lang=\"ES-CO\"\u003eA través de este MOOC conoceremos lo siguiente:\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"ES-CO\"\u003e Reconocer el concepto de cultura organizacional y las variables que la afectan, a través de los planteamientos teóricos que la sustentan, con el fin de fundamentar un marco de referencia para su posterior aplic"])</script><script>self.__next_f.push([1,"ación. \u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"ES-CO\"\u003e Reconocer el concepto de cambio organizacional y las variables que la afectan, a través de los planteamientos teóricos que lo sustentan, con el fin de fundamentar un marco de referencia para su posterior aplicación. \u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"ES-CO\"\u003e Reconocer la cultura actual y deseada de una organización, a través de metodologías de diagnóstico cultural, que permita identificar su alineación con los nuevos retos estratégicos.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"ES-CO\"\u003e Identificar las brechas entre la cultura actual y deseada, a través de la valoración de artefactos, valores y supuestos, para proponer las acciones de transformación cultural.\u003c/span\u003e\u003cspan lang=\"ES-CO\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"ES-CO\"\u003e Conocer metodologías para gestionar el cambio, teniendo en cuenta el direccionamiento estratégico y la cultura detectada, para minimizar los procesos de resistencia al cambio.\u003c/span\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"ES-CO\"\u003eIdentificar las acciones de gestión de cambio, a través de la aplicación de alguna de las metodologías propuestas y de acciones para su mantenimiento, de manera que responda a las necesidades de transformación para la cultura deseada.\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e1e9:T7a1,\u003cp\u003e\u003cem\u003ePor favor ten en cuenta: Los estudiantes que completen con éxito este curso de IBM ahora pueden obtener una insignia digital de habilidades: una credencial detallada, verificable y digital que comprueba los conocimientos y habilidades que has adquirido en este curso. Inscríbete para obtener más información, completa el curso y reclama tu insignia digital.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eOferta especial: este curso incluye una gran oferta de IBM: un año de servicios de Watson Assistant para potencializar 10 chatbots sin cargo. ¡La manera perfecta de iniciar tu negocio de construcción de chatbots!\u003c/p\u003e\n\u003cp\u003eLos chatbots son uno de los temas más interesantes y demandados en tecnología. Las empresas de todo el mundo muestran c"])</script><script>self.__next_f.push([1,"ada vez más interés en su potencial para ahorrar costos y mejorar la disponibilidad del servicio al cliente.\u003c/p\u003e\n\u003cp\u003eEn este curso en línea, aprenderás cómo construir chatbots con tecnología de Watson y cómo enfocarse en ganar dinero vendiendo chatbots a los clientes. Cubriremos las puertas para vender chatbots a posibles clientes en línea y fuera de línea. Exploraremos cómo planificar y construir chatbots utilizando una herramienta visual proporcionada por IBM. Ofreceremos métodos para probar, analizar y mejorar tus chatbots. Y le enseñaremos cómo implementar sus chatbots en sitios web a través de un plug-in para WordPress.\u003c/p\u003e\n\u003cp\u003e¡Aprovechando el poder de inteligencia artificial de Watson Assistant, podrás lograr todo esto sin la necesidad de escribir ningún código!\u003cspan lang=\"ES-TRAD\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eTen en cuenta que los foros de discusión de este curso están abiertos para que los estudiantes publiquen y se comuniquen entre sí. Sin embargo, los foros ya no serán supervisados por el equipo de IBM. Las preguntas técnicas relacionadas con tu experiencia en el curso deben dirigirse al equipo de soporte de edX a través de la información de contacto proporcionada en el curso. Gracias.\u003c/p\u003e1ea:T62a,\u003cp\u003eEn este curso aprenderás a diseñar, fabricar y programar tu propio robot (DYOR: Do Your Own Robot) con Arduino. Es una metodología que llevamos años implementando en asignaturas de robótica de la Universitat Politècnica de València. Está principalmente enfocado a educadores en áreas de Tecnología e Informática, pero también para personas que quieren iniciarse en el mundo Maker.\u003c/p\u003e\n\u003cp\u003eEl objetivo final del curso es disfrutéis aprendiendo en todo el proceso de diseño, fabricación y montaje del robot con actividades diversas, variadas y multidisciplinares. Por ello hemos preparado todos los contenidos necesarios que os permitirán fabricar un robot divertido, personalizable y de bajo coste partiendo desde cero y que vosotros podréis adaptar a vuestras necesidades. De forma orientativ"])</script><script>self.__next_f.push([1,"a, el coste de los materiales para fabricar el robot está en torno a los 65€, que correrán a cargo del alumno y que podrás comprar libremente donde más te interese.\u003c/p\u003e\n\u003cp\u003eEl curso es idóneo para personas que quieran iniciarse en el mundo de la electrónica, fabricación digital y la robótica. Aprenderás a utilizar herramientas CAD (TinkerCAD), diseño electrónico (Fritzing) y programación por bloques de Arduino (Facilino) y apps Android (App Inventor2).\u003c/p\u003e\n\u003cp\u003eEn el curso os explicamos divertidas actividades que podréis realizar con vuestros robots como generar emociones, reproducir melodías, controlar movimientos básicos, abrir/cerrar pinzas, seguir líneas, evitar obstáculos o controlar el robot remotamente desde un dispositivo móvil.\u003c/p\u003e1eb:T74a,\u003cp\u003e¿Alguna vez te has preguntado qué es y para qué sirve la Ingeniería de Software? ¿Quieres saber por qué es tan necesaria esta disciplina y por qué se utiliza tanto en entornos tecnológicos? ¿O cuál es el motivo de que muchos proyectos informáticos no finalizan en tiempo y coste o con la calidad deseada? \u003c/p\u003e\n\u003cp\u003eEn este curso en línea aprenderás cuáles son los métodos, técnicas y procedimientos adecuados para poder concluir con éxito un proyecto software cumpliendo requisitos de tiempo, recursos y costos. \u003c/p\u003e\n\u003cp\u003ePara ello, verás las principales diferencias de esta disciplina con el resto de ingenierías y entenderás por qué son necesarios procedimientos y técnicas específicos para el desarrollo y gestión del software. \u003c/p\u003e\n\u003cp\u003eConocerás el ciclo de vida de un proyecto y la importancia de definir las fases y el orden a seguir durante su desarrollo. \u003c/p\u003e\n\u003cp\u003eAprenderás a diferenciar las famosas metodologías ágiles (SCRUM, XP, KANBAN, etc.) de las tradicionales (ciclo de vida en cascada, iterativo, incremental, etc.) y cuándo aplicar cada una de ellas en función de las necesidades y características de tu proyecto. \u003c/p\u003e\n\u003cp\u003eVerás de cerca todas las fases que componen un proyecto y la importancia de cada una de ellas, desde la"])</script><script>self.__next_f.push([1," planificación hasta su puesta en marcha. \u003c/p\u003e\n\u003cp\u003eCuando finalices este curso tendrás los conocimientos y herramientas necesarios para poder desarrollar y gestionar tus proyectos eficazmente. Tanto tú como tu equipo podréis ser más productivos, realizar trabajos de mayor calidad y tener mejor clima de trabajo. \u003c/p\u003e\n\u003cp\u003eSi quieres conocer todo lo que engloba la Ingeniería de Software, mejorar la forma de desarrollar y gestionar tus proyectos o simplemente aprender nuevas técnicas y metodologías que te ayuden a ser más eficaz en tu trabajo, ¡no dudes en apuntarte a este curso!\u003c/p\u003e1ec:Tcc6,"])</script><script>self.__next_f.push([1,"\u003cp\u003eVous comprendrez mieux ce qu’est l’apprentissage profond, les types de problèmes qu’il permet de résoudre, les concepts fondamentaux et méthodes qu’il implique. Ce cours conçu par IVADO, Mila et l’Université de Montréal vous offre divers outils d’apprentissage pour saisir l’étendue de cette technologie innovatrice et transectorielle, une nécessité dans le domaine de l’informatique.\u003c/p\u003e\n\u003cp\u003eLa conception du cours a été faite par IVADO, centre de science des données et carrefour scientifique et économique reliant des partenaires du milieu universitaire, de l’industrie, et du gouvernement. Le contenu du cours a été crée par le Mila, institut de recherche de renommée mondiale qui rassemble les chercheurs spécialisés en apprentissage profond.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCette formation a eu lieu à Montréal du 9 au 13 septembre 2019, puis a été adaptée au format cours en ligne (MOOC) dont la version en anglais est sortie en mars 2020. La version traduite et sous-titrée en français de ce cours en ligne, \"L'essentiel de l'apprentissage profond\", vous est offerte exclusivement sur EDUlib!\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eYoshua Bengio, fondateur du Mila et directeur scientifique chez IVADO, aussi professeur à l’Université de Montréal, est l’un des spécialistes les plus connus au monde dans le domaine de l’intelligence artificielle. Il est un pionnier de l’apprentissage profond et le directeur scientifique de ce cours. Il est aussi colauréat du prix A. M. Turing de 2018, « le prix Nobel en informatique », qui souligne les avancées relatives aux fondements conceptuels et à l’ingénierie qui ont fait des réseaux de neurones profonds une composante essentielle de l’informatique.\u003c/p\u003e\n\u003cp\u003eEn apprentissage profond, une extension de l’apprentissage automatique, les machines peuvent apprendre par expérience, sans intervention humaine. Cette technologie est en grande partie influencée par le fonctionnement du cerveau humain dans la mesure où les algorithmes, ou les réseaux de neurones artificiels, sont capables d’apprendre de larges quantités de données et d’acquérir des compétences de la même façon qu’un cerveau humain le ferait. Ainsi, l’apprentissage profond est maintenant capable d’adresser une large variété de tâches considérées comme inaccessibles il y a quelques années en vision par ordinateur, en traitement de signaux, en traitement automatique du langage naturel, en robotique et en prise de décision séquentielle. En raison de ces avancées récentes, les modèles d’apprentissage profond sont maintenant déployés dans diverses industries et ont un impact sur différents secteurs de l’économie, telles que le transport, la santé, la finance, l’énergie et la vie quotidienne en général.\u003c/p\u003e\n\u003cp\u003eSi vous êtes dans le secteur professionnel, universitaire ou de la recherche et vous possédez des connaissances de base en mathématiques et en programmation, alors ce MOOC est fait pour vous!\u003c/p\u003e\n\u003cp\u003eEn plus du contenu riche sur l’apprentissage profond, découvrez les enjeux de biais et de discrimination en apprentissage automatique et apprenez-en plus sur ce sujet sociotechnique qui s’est avéré être une révélation pour de nombreuses personnes.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ed:T98f,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLe programme s'étend sur cinq modules interconnectés, offrant une plongée profonde dans les multiples facettes des changements climatiques et de leurs implications. Dans le module inaugural, \"Crises environnementales”, les étudiants sont conduits à travers une analyse complète des changements climatiques dans le cadre plus vaste des perturbations écologiques causées par l'activité humaine. Mettant en lumière l'interconnexion entre la crise climatique et d'autres enjeux environnementaux majeurs, tels que la perte de biodiversité, ce module met également en évidence les inégalités qui exacerbent ces problèmes. Ensuite, le module \"Changements climatiques: la science physique et les causes\" plonge dans les fondements scientifiques des changements climatiques, combinant les perspectives scientifiques et économiques pour une compréhension approfondie.\u003c/p\u003e\n\u003cp\u003eLe troisième volet, \"La modélisation du changement climatique\", initie les apprenants aux principes fondamentaux des modèles climatiques, les préparant à utiliser ces outils pour comprendre les changements climatiques induits par l'homme et les variations naturelles. En parallèle, le module \"La justice climatique et les politiques publiques\" présente les conséquences actuelles et possibles du réchauffement climatique et et explore les réponses sociétales aux changements climatiques à travers les politiques publiques, mettant en avant les perspectives autochtones et le concept de justice climatique. Mettant l'accent sur l'importance de la coopération internationale et de l'équité, ce module examine également les grandes ententes internationales et les actions gouvernementales locales et nationales.\u003c/p\u003e\n\u003cp\u003eEnfin, le cinquième module, \"Les technologies récentes\", expose une variété de solutions innovantes visant à promouvoir la neutralité carbone et le développement durable. Intégrant les dernières avancées technologiques, ce module explore également l'utilisation de modèles informatiques avancés pour aborder l'adaptation au changement climatique et prendre des décisions éclairées. Dans l'ensemble, ce programme offre une vision intégrée et holistique des défis climatiques actuels, combinant savoir scientifique, considérations sociétales et progrès technologiques pour former des intervenants aptes à relever les défis complexes du changement climatique avec des solutions durables et éclairées.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ee:T516,\u003cp\u003e1. Situer les changements climatiques dans le contexte plus large des crises environnementales contemporaines \u003c/p\u003e\n\u003cp\u003e2. Comprendre la science à la base de notre compréhension du climat et les enjeux reliés aux changements climatiques\u003c/p\u003e\n\u003cp\u003ea. Décrire les processus qui régissent et qui changent le climat\u003c/p\u003e\n\u003cp\u003eb. Expliquer les conséquences des changements climatiques\u003c/p\u003e\n\u003cp\u003ec. Caractériser les modèles climatiques\u003c/p\u003e\n\u003cp\u003ed. Interpréter des scénarios et simulations climatiques\u003c/p\u003e\n\u003cp\u003e3. Développer les compétences et l’intérêt pour les approches numériques reliant la science du climat, la biodiversité, la justice climatique, la modélisation numérique du changement climatique, les politiques publiques, les nouveaux outils numériques dont l’IA\u003c/p\u003e\n\u003cp\u003ea. Résumer les concepts-clé de l’IA\u003c/p\u003e\n\u003cp\u003eb. Décrire des exemples d’application de nouvelles technologies et de l’IA dans la science du climat\u003c/p\u003e\n\u003cp\u003ec. Expliquer les avantages et les limites de l’utilisation l’IA dans la science du climat par rapport aux approches classiques\u003c/p\u003e\n\u003cp\u003ed. Utiliser des outils découlant de l’IA \u003c/p\u003e\n\u003cp\u003ei. Les outils de prédiction \u003c/p\u003e\n\u003cp\u003eii. Les outils génératifs\u003c/p\u003e\n\u003cp\u003eiii. Des exemples concrets\u003c/p\u003e\n\u003cp\u003ee. Outils d'action pour répondre au changement climatique\u003c/p\u003e1ef:T74b,\u003cp\u003e\u003cspan lang=\"IT\"\u003eSi prega di rimanere sul percorso AUDIT per l'accesso gratuito. Digital Promise e HP forniranno una lettera di completamento, con indicazione delle ore di frequenza, al completamento dei 5 moduli di questo corso, se si utilizza il percorso di formazione gratuito (Audit). Inoltre, non avrai un limite di tempo per completare il corso. Non c'è alcuna differenza a livello di contenuti tra il percorso di apprendimento di audit (gratuito) e quello verificato (con certificazione). Per una migliore esperienza visiva, visualizza il corso a schermo intero.\u003c/span\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eQuesto corso è progettato per fornire agli insegnanti le conoscenze e le competenze essenziali per comprendere, utili"])</script><script>self.__next_f.push([1,"zzare e valutare i sistemi di intelligenza artificiale generativa. Attraverso cinque moduli interattivi e autoguidati, i partecipanti saranno introdotti all'intelligenza artificiale, apprenderanno tecniche efficaci per la formulazione dei prompt e apprenderanno applicazioni pratiche e limiti dell’intelligenza artificiale generativa, assieme alle strategie per integrare l’IA nella didattica. Alla fine del corso, gli insegnanti saranno in grado di riconoscere i rischi e i benefici dell'IA, sfruttandola in modo etico ed efficace nei contesti educativi. (Tempo stimato per il completamento: 3 ore.)\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIl corso incoraggia i partecipanti a unirsi a una comunità online su LinkedIn, per arricchire il percorso di apprendimento ed entrare in contatto con altri educatori interessati al tema dell'IA. Questa comunità offre uno spazio per condividere progetti, discutere le novità e cercare informazioni sull'IA generativa. Consente inoltre agli insegnanti di fare rete e di partecipare alle sessioni \"Ask Me Anything\" (AMA), che mantengono i membri informati e coinvolti con nuove risorse e discussioni.\u003c/p\u003e1f0:Tf04,"])</script><script>self.__next_f.push([1,"\u003cp\u003e\u003cspan lang=\"IT\"\u003eIl limite di caratteri raccomandato (spazi inclusi) è 2500. Restano 2500 caratteri.\u003c/span\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eQuesto corso è progettato per fornire agli insegnanti le conoscenze e le competenze essenziali per comprendere, utilizzare e valutare i sistemi di intelligenza artificiale generativa. Attraverso cinque moduli interattivi e autoguidati, i partecipanti saranno introdotti all'intelligenza artificiale, apprenderanno tecniche efficaci per la formulazione dei prompt e apprenderanno applicazioni pratiche e limiti dell’intelligenza artificiale generativa, assieme alle strategie per integrare l’IA nella didattica. Alla fine del corso, gli insegnanti saranno in grado di riconoscere i rischi e i benefici dell'IA, sfruttandola in modo etico ed efficace nei contesti educativi.\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eIl corso incoraggia i partecipanti a unirsi a una comunità online su LinkedIn, per arricchire il percorso di apprendimento ed entrare in contatto con altri educatori interessati al tema dell'IA. Questa comunità offre uno spazio per condividere progetti, discutere le novità e cercare informazioni sull'IA generativa. Consente inoltre agli insegnanti di fare rete e di partecipare alle sessioni \"Ask Me Anything\" (AMA), che mantengono i membri informati e coinvolti con nuove risorse e discussioni.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cspan lang=\"IT\"\u003eCosa imparerai\u003c/span\u003e\u003c/strong\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eAl termine del corso HP AI Academy sarai in grado di: \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eComprendere l’IA generativa\u003c/span\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cspan lang=\"IT\"\u003eDefinire l'IA generativa e identificarne i componenti chiave \u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"IT\"\u003eRiconoscere le tecnologie più diffuse di IA generativa per il settore dell'istruzione, come i tutor di intelligenza artificiale e i generatori di contenuti.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"IT\"\u003eConoscere gli ambiti dell'IA generativa e le relative applicazioni nella didattica.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\u003cspan lang=\"IT\"\u003eDiscutere le implicazioni etiche e sociali dell’IA generativa.\u003c/span\u003e\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eComprendere i principi del Prompt Engineering:\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eIllustrare il Prompt Engineering e la sua utilità per la didattica.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eInsegnare a formulare prompt efficaci per la didattica.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eIdentificare le applicazioni pratiche dell'IA nella didattica:\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eUtilizzare l'IA generativa per svolgere attività amministrative e burocratiche, o per creare piani e contenuti didattici personalizzati.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eVerificare e correggere i contenuti generati dall'IA per assicurarne l’accuratezza.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eValutare i benefici e i limiti dell'IA generativa nella creazione di piani e contenuti didattici personalizzati.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003cli\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003eUtilizzare l'IA generativa per creare test e valutazioni e per fornire feedback personalizzati agli studenti.\u003c/span\u003e\u003c/p\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e*\u003cspan lang=\"IT\"\u003e Identificare le migliori pratiche per l'uso dell'intelligenza artificiale, inclusa la protezione della privacy, la consapevolezza del rischio di parzialità e la gestione responsabile dei dati.\u003c/span\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eo\u003cspan lang=\"IT\"\u003e Promuovere l’alfabetizzazione all'IA tra gli studenti, con particolare attenzione alla comprensione delle capacità e dei limiti dell'IA.\u003c/span\u003e\u003cspan lang=\"IT\"\u003e\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003eo\u003cspan lang=\"IT\"\u003e Affrontare il tema di un uso etico dell’IA nella produzione di elaborati e documenti di ricerca, distinguendo tra lavoro originale e contenuto generato dall'IA, e garantendo la conformità con le politiche sulla privacy come il GDPR. \u003c/span\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1f1:Tb60,"])</script><script>self.__next_f.push([1,"\u003cp\u003eLos sistemas embebidos están en todas partes, y las tecnologías basadas en Arm son el estándar del sector. Empezar no podría ser más fácil. Este curso incluye instrucciones sobre cómo acceder a un simulador Mbed (consulta la sección de requisitos previos para obtener más detalles) para que puedas aplicar tus nuevos conocimientos y habilidades para crear prototipos y aplicaciones embebidas del mundo real de forma rápida, sin los problemas o gastos de compra de hardware.\u003c/p\u003e\n\u003cp\u003eDesde los dispositivos móviles, portátiles e inteligentes de hoy en día hasta la transformadora Inteligencia Artificial (IA) y el Internet de las Cosas (IoT) o 5G del futuro próximo, los sistemas embebidos son los pilares fundamentales de nuestro mundo conectado. A medida que pasamos de miles de millones a billones de dispositivos inteligentes y conectados, es fundamental que la próxima generación de ingenieros conozca a fondo cómo construir e implantar rápidamente una solución moderna de sistemas embebidos.\u003c/p\u003e\n\u003cp\u003eEn este curso, aprenderás los fundamentos de un sistema embebido y descubrirás porqué la arquitectura y los procesadores Arm son especialmente adecuados para las aplicaciones IoT.\u003c/p\u003e\n\u003cp\u003eNuestros laboratorios interactivos han sido diseñados para cubrir los fundamentos técnicos, desarrollando habilidades esenciales que son demandadas en el mercado laboral para cualquier aspirante a ingeniero de sistemas embebidos.\u003c/p\u003e\n\u003cp\u003eComenzarás aprendiendo las características de un sistema embebido, sus componentes, beneficios y limitaciones, identificarás las disyuntivas entre coste y rendimiento, y explorarás por qué la arquitectura Arm y los procesadores son particularmente adecuados para el IoT.\u003c/p\u003e\n\u003cp\u003eTras ello, aplicarás tus nuevos conocimientos sobre E/S digitales y analógicas, interrupciones, funciones de bajo consumo, temporizadores y modulación por ancho de pulsos para programar un generador de ondas de audio y un reproductor de audio, y controlar periféricos en el proceso.\u003c/p\u003e\n\u003cp\u003eTodo esto está soportado por la API Mbed - por lo que no se requiere hardware adicional, puedes descargar y utilizar el simulador directamente en tu propio ordenador.\u003c/p\u003e\n\u003cp\u003eA lo largo de los seis módulos, obtendrás una visión general clave de:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eLos sistemas embebidos y su importancia en las aplicaciones informáticas modernas.\u003c/li\u003e\n\u003cli\u003eLa arquitectura de microcontroladores basada en Arm estándar de la industria, sus características y modelos de programación.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLas posibilidades de desarrollo y conexión de IoT en el futuro son enormes. Para alcanzar esta visión de futuro, se necesitarán muchos ingenieros y desarrolladores que imaginen y diseñen estos dispositivos conectados y las tecnologías sobre las que se construyen.\u003c/p\u003e\n\u003cp\u003eEl mundo de los sistemas embebidos es tu puerta de entrada al IoT y a todas las oportunidades que ofrece.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1f2:Tf25,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe upcoming years are all about creating a sustainable future where it is necessary to move away from fossil resources and explore and implement the opportunities that biomass as a renewable energy source gives us.\u003c/p\u003e\n\u003cp\u003eJoin this course if you want to learn how to create a sustainable future by moving away from dependence on fossil resources to biomass resources for the production of food, chemicals and energy-carriers. You will learn what biomass is, how to produce biomass renewable energy- and biomass fuel and how to make biobased products.\u003c/p\u003e\n\u003cp\u003eYou will get a solid understanding of how chemistry works in a biobased economy and in the production of biomass renewable products. Your valuable knowledge will help your company drive into sustainability and actually make the transition to use biomass resources to produce biobased products.\u003c/p\u003e\n\u003cp\u003eYou will learn about the products that can be derived from biomass and the processes used to do so.\u003c/p\u003e\n\u003cp\u003eWe will explore catalytic conversion of biomass by discussing types of catalysts, special challenges for catalysis when converting biomass into biomass energy and the interplay of catalysis and up/down stream processes. Then we dive into biorefinery. Biorefinery deals with the challenge of extracting valuable biomass components and converting them to final products. To achieve this you first need knowledge of the different types of biomass, the molecules present and their chemical characteristics. Biorefinery is all about efficient processing. Aspects of processing include the harvesting, pre-treatments, conversion and separation technologies.\u003c/p\u003e\n\u003cp\u003eStating the obvious; a biobased economy runs on biomass. To apply the gained knowledge to the production of crops, it is therefore important to understand which factors play a major role in crop growth, yield formation and quality. In this module you’ll learn to identify design criteria for the production of biobased crops on both crop- and farm level.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eJoin the MicroMasters programme\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThis MOOC is part of two MicroMasters Programs:\u003cbr /\u003e\n\u003ca href=\"https://www.edx.org/micromasters/wageningenx-economics-and-policies-for-a-circular-bio-economy\"\u003e \u003cstrong\u003eEconomics and Policies for a Circular Bio-Economy\u003c/strong\u003e\u003c/a\u003e and\u003cbr /\u003e\n\u003cstrong\u003e\u003ca href=\"https://www.edx.org/micromasters/wageningenx-business-and-operations-for-a-circular-bio-economy\"\u003eBusiness and Operations for a Circular Bio-Economy\u003c/a\u003e.\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003eThe Business and Operations for a Circular Bio-Economy MicroMasters Program will provide you with the knowledge and tools to analyse the business and operations side of the switch to biobased products.\u003c/p\u003e\n\u003cp\u003eThe MicroMasters Program Economics and Policies for a Circular Bio-Economy covers the economic and policy side of converting biological resources into biobased products. You will able to contribute substantially to managerial decision-making as well as policy development. Both programmes consist of 3 courses and a final project; the capstone.\u003c/p\u003e\n\u003cp\u003eExplore the other courses in the MicroMasters programmes:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/economics-and-policies-in-a-biobased-economy\"\u003eEconomics and Policies in a Biobased Economy\u003c/a\u003e \u003cem\u003eor\u003c/em\u003e\u003ca href=\"https://www.edx.org/course/business-strategy-and-operations-in-a-biobased-eco\"\u003e Business Strategy and Operations in a Biobased Economy\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/circular-economy-an-interdisciplinary-approach\"\u003eCircular Economy: An Interdisciplinary Approach\u003c/a\u003e\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://www.edx.org/course/capstone-economics-politics-for-a-circular-economy\"\u003eCapstone Economics and Policies for a Circular Bio-Economy\u003c/a\u003e \u003cem\u003eor\u003c/em\u003e\u003ca href=\"https://www.edx.org/course/capstone-business-and-operations-for-a-circular-ec\"\u003e Capstone Business and Operations for a Circular Bio-Economy\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e"])</script><script>self.__next_f.push([1,"1f3:T914,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEl ecosistema digital está en constante cambio luego de la inmersión y evolución de la tecnología que permite analizar, desde la óptica del Marketing Digital, la aparición de nuevos indicadores de socialización.\u003c/p\u003e\n\u003cp\u003eEstos indicadores, además de proponer nuevos escenarios de convivencia —que a través de un plan de marketing cimentado bajo la estrategia de posicionamiento de marca se logra identificar toda actividad sociodigital— también conjuga elementos narratológicos que beneficia la construcción de contenido, así como su alineación con los objetivos y alcances de los ads, el paid media y cualquier otra actividad de monetización en redes sociodigitales o en motores de búsqueda.\u003c/p\u003e\n\u003cp\u003ePor esta razón, es fundamental identificar los pasos que implica el análisis digital que involucra la determinación del público objetivo; así como el conocimiento de su comportamiento web y en redes sociodigitales; y la pertinente reflexión en torno al uso de medios digitales manejados por la competencia, lo que permite centrar el plan de marketing en contenidos relevantes que favorezcan la consolidación de audiencias comprometidas.\u003c/p\u003e\n\u003cp\u003eEn el curso estrategias de posicionamiento digital mediante pauta y esquemas de monetización aprenderás a desarrollar diversas metodologías de análisis situacional de las empresas en relación a su comunicación e identidad digital, tales como el método PESTLE, Bench Marking o DAFO al mismo tiempo conoces las características necesarias que requiere la construcción de identidad desde el modelo de negocio que otorga establecer desde el inicio cuales son las ventajas competitivas de fidelización en el mercado, así como de los esfuerzos estratégicos comunicacionales que engloba la directriz del posicionamiento orgánico y pagado logrando con esto sortear la sobre oferta informativa mediante la comunicación diferenciada.\u003c/p\u003e\n\u003cp\u003eAl finalizar el curso, el egresado serás capaz de identificar los conceptos transversales tecnológicos derivado de la estrategia SEO y SEM que consideran la radiografía de navegación del buyer person y de audiencias participativas generales en el ecosistema digital generando con esto una comunicación estratégica eficaz y pertinente acorde a los objetivos y misiones organizacionales y de negocio.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1f4:T530,\u003cp\u003eTo ensure that the family business transcends and the company is sustained over time, in this course of entrepreneurship and business administration, you will have the opportunity to understand the complexity of family and business dynamics, reflect on the roles and ways of thinking of the family's leader and make a diagnosis of entrepreneurship.\u003c/p\u003e\n\u003cp\u003eAll this in order for you to know the instruments and components that involve leading and orchestrating the family business: the future vision of the business family, the development of the next generations and the formation of an effective and flexible family and business government. All the knowledge acquired in this course of business administration can be applied in the family business.\u003c/p\u003e\n\u003cp\u003eThe Center for Entrepreneurial Families and EGADE Business School of Tecnologico de Monterrey is the ideal institution to develop these skills, since Tec de Monterrey is #1 university in Mexico and the 6th best in Latin America according to Times Higher Education (THE) 2016.\u003c/p\u003e\n\u003cp\u003eProfessors from the Entrepreneurial Families Center are highly qualified and recognized as part of the worldwide STEP project for family entrepreneurship, moreover, EGADE Business School is number 1 school in Latin America, in its MBA, according to the ranking of America Economia.\u003c/p\u003e1f5:T56f,\u003cp\u003eInformation technology (IT) plays a vital role in improving efficiencies in business environments. Its impact lies in its ability to facilitate new business models and provide richer ways of communicating with suppliers and customers. However, considering the rapid rate at which the IT industry evolves, professionals need to regularly update their knowledge and skills to effectively manage the disruption this field presents. \u003c/p\u003e\n\u003cp\u003eOn the University of Cape Town (UCT) IT Management online short course, you’ll be equipped with the practical skills and tools required to lead your business’s IT operations. Experience a case-based approach to IT management that integrates core conceptual k"])</script><script>self.__next_f.push([1,"nowledge with practical, real-world managerial themes. Gain the knowledge to oversee IT infrastructure and processes, and guide an IT team through the challenges presented by digital transformation.\u003c/p\u003e\n\u003cp\u003eThis highly practical course is suited to both aspiring and established IT managers looking to create business value through IT systems in any industry. Those already leading an IT team can take this course to update their skills and stay up to speed with the latest IT trends and developments. Similarly, IT administrators, officers, and technicians may want to register to gain new and relevant knowledge and improve their chances of successfully moving into a managerial role.\u003c/p\u003e1f6:T6f0,\u003cp\u003eData, and the value it supplies, has become an invaluable business asset in today’s digital economy. Data monetization — converting data and analytics into financial gain — is now a crucial source of economic value for organizations across the globe.1\u003c/p\u003e\n\u003cp\u003eExplore how your organization can realize the full and future value of its data assets in the Data Monetization Strategy: Creating Value Through Data online short course from the MIT Sloan School of Management. Guided by renowned Faculty Director Dr. Barbara Wixom, you’ll learn to identify opportunities to create value from data to generate financial returns, drive process improvements, and leverage data-based insights to enrich products. In six weeks, you’ll gain a comprehensive understanding of data monetization using CISR-developed frameworks to empower you and your teams to strategically maximize value creation through data. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003e1\u003ca href=\"https://cisr.mit.edu/publication/2019_1101_DataMonCapsPersist_WixomFarrell\" target=\"_blank\"\u003eMIT CISR\u003c/a\u003e (Nov, 2019).\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eThe growing importance of data as a primary driver of business strategy, requires that data-driven business leaders elevate data and analytics strategies to advance a new vision of business problem-solving. This course is relevant to data-driven business leaders and analytics leaders inte"])</script><script>self.__next_f.push([1,"nt on creating economic value from organizational data. People in these roles may include, but are not limited to, chief data officers, chief information officers, chief technology officers, and chief analytics officers. Technology, data, and information managers, not to mention non-tech leaders and business directors, will elevate any existing knowledge and benefit from the practical frameworks unpacked in the course.\u003c/p\u003e1f7:T668,\u003cp\u003eEffective product management requires expertise in a range of different business areas. Consequently, practitioners in this field must be well equipped to perform a number of different roles in order to ensure that their company delivers competitive products that align with consumer needs.\u003c/p\u003e\n\u003cp\u003eThrough the Product Management online short course from the University of Cape Town (UCT), you’ll gain a holistic understanding of all the steps involved in developing, branding, launching, and managing a viable product. More specifically, you’ll learn how to design a product strategy and comprehensive development roadmap, get familiar with the product innovation process, and create a go-to-market strategy for a new launch. In addition to these learnings, you’ll have the chance to collaborate and form professional networks with the other students on the course. \u003c/p\u003e\n\u003cp\u003eAs the course content is relevant to many industries, you’ll find that you can apply the practical skills you learn in each module to various different business disciplines.\u003c/p\u003e\n\u003cp\u003eThis course is ideal for working professionals who want to enhance their career prospects by building or improving their ability to successfully bring products to market. It is especially suitable for those working in the fields of marketing, sales, user experience, business analytics, project management, information systems, and technology. Professionals who hope to use their knowledge of product development to boost business success may also benefit from this course, as will those seeking a practical product management toolkit for use in c"])</script><script>self.__next_f.push([1,"urrent or future roles.\u003c/p\u003e1f8:T839,"])</script><script>self.__next_f.push([1,"\u003cp\u003eCyberattacks and threats are no longer a case of if, but rather when. Cybercriminals can use phishing emails to gain passwords and credit card details, install malware that disrupts or destroys a computer network, or even use ransomware to hold information hostage. What can you do to protect your business? The Cybersecurity: Managing Risk in the Information Age online short course from Harvard’s Office of the Vice Provost for Advances in Learning (VPAL), in association with HarvardX, offers an in-depth exploration of this complex landscape. This course will help you grow your ability to guard the integrity and confidentiality of your company’s digital information. You’ll learn how to identify and manage operational, litigation, and reputational risk. As you progress through the program, you’ll gain the tools and confidence to conduct vulnerability assessments and locate weaknesses within your organization’s networks, systems, and data, and develop strategies for responding to a cyberattack.Cybersecurity isn’t an IT or tech department responsibility, it’s an organization-wide imperative. That’s why this cybersecurity course is aimed at business leaders and executives, as well as specialists in web security, security administration, or information security roles. In fact, it’s for any professional who wants to understand the full implications of a cyber breach, and have the skills to communicate this to their company and stakeholders. The C-suite or senior management team will learn how to lead their organization in a time of rapidly increasing cyber risk. These leaders will also gain insight into setting an appropriate budget that allows the experts to prepare for and mitigate cyberattacks. This program is also suitably in-depth for cybersecurity professionals – risk analysts, technology specialists, and information security professionals. It unpacks the most common types of cyberattacks, provides strategies for protecting an organization from a threat and its associated risks, and will help professionals develop and lead a cybersecurity plan.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1f9:T643,\u003cp\u003eArtificial intelligence (AI) and machine learning (ML) technologies are having a significant impact on innovation, with pharma and biotech being the latest industry to be affected. With the connection between drug discovery, technology, and business now clear, leaders and scientists need to become better equipped to leverage new developments in AI and ML. \u003c/p\u003e\n\u003cp\u003eIn the Artificial Intelligence in Pharma and Biotech online short course from the MIT Sloan School of Management, you’ll gain insight into how technology is currently being applied in the pharmaceutical industry. Over six weeks, you’ll explore ways that ML is driving new drug discovery, learn how AI can be used to create more accurate biological and generative modeling, and explore how ML can be used to streamline the design and management of clinical trials. You’ll walk away with an understanding of the benefits and challenges of these technologies, allowing you to make informed, innovative decisions within this rapidly evolving space.\u003c/p\u003e\n\u003cp\u003eIf you work in the pharmaceutical and biotech industry as a scientist, researcher, or specialist, you’ll learn about various AI and ML tools and how to apply them in your research and work. If you currently hold a leadership position in the pharma business sector, this program provides practical, strategic learnings that can be applied to the areas of drug discovery, clinical trials, and pharmaceutical sales. By bridging the gap between analysis and application, the information presented in this course will also benefit data scientists and analytics professionals.\u003c/p\u003e1fa:T70c,\u003cp\u003eThe ability to use data effectively is crucial to the success of most modern organizations. This includes optimizing processes using operational data, finding new customers through consumer data, and understanding the immediate business environment using competitor data. But it’s not enough to simply have data; nor is it enough to employ a team of analysts to sift through the multiple haystacks of raw information in se"])</script><script>self.__next_f.push([1,"arch of a needle of insight. To effectively use data, organizations need professionals who are able to communicate and disseminate data-driven insights in order to properly guide decision making.\u003c/p\u003e\n\u003cp\u003eThe MIT Sloan Communicating Data Through Storytelling online short course teaches you how to construct stories from data that persuade, motivate, and inspire action. Discover how to tailor logically sound presentations for a variety of audiences, as well as understand the best practices for presenting data with clarity rather than complexity. In the program, you’ll delve into the TOP-T (topic, orientation, point, transition) framework, developed by MIT Sloan faculty to make complex data more understandable.\u003c/p\u003e\n\u003cp\u003eThis course is ideal for any professional who regularly presents data-driven insights, whether that role is technical or not. If you’re an analyst or analytics manager, the program will enhance your ability to communicate insights, particularly when presenting specialist information to general audiences. If you’re a manager, decision maker, or occupy a functional role, it equips you with the skills needed to tell a clear story with data that can be shared with key stakeholders in the organization. If you’re a consultant or entrepreneur, you’ll have the opportunity to learn practical techniques for persuading and influencing clients.\u003c/p\u003e1fb:T6df,\u003cp\u003eDigital technologies have reshaped marketing, leading to a drastic shift in the quality and quantity of information we can store, access, and analyze. This proliferation of data allows businesses to better understand and react to consumer patterns. However, it also increases the need to evolve measurement, planning, and implementation of their marketing activity. Companies require skilled professionals who are equipped to ensure optimal return on investment (ROI) for marketing spend, and to deliver valuable insights that drive better customer service. \u003c/p\u003e\n\u003cp\u003eThe MIT Sloan Digital Marketing Analytics online short course unpacks how to leverage measure"])</script><script>self.__next_f.push([1,"ment and analysis within your digital marketing strategy. With a focus on analytics-based marketing, you will assess the latest applications of artificial intelligence, machine learning, and predictive modeling that will help drive ROI for campaigns. \u003c/p\u003e\n\u003cp\u003eDigital media and analytics tools have transformed traditional marketing theory and practice, making this course valuable to anyone working within the field or aspiring to a marketing career. This MIT Sloan digital marketing program is designed to give you the opportunity to close the gaps in your analytical knowledge and skills. If you’re involved in the field of marketing, this online course will help to supplement your level of expertise and offer an opportunity for career growth, or increase your attractiveness to potential employers. If you’re the owner of a small business, this program aims to help develop your ability to generate sales and improve revenue. This program is also aimed at validating the data analytics skills of established marketing professionals with an MIT Sloan digital certificate of completion.\u003c/p\u003e1fc:Tab6,"])</script><script>self.__next_f.push([1,"\u003cp\u003eOver the last decade, the highest performing asset class was not stocks, bonds, or even real estate, it was Bitcoin.1 Cryptocurrencies such as Bitcoin, Ethereum, and the MIT-developed Vault have emerged as a new asset class that has seen momentous returns. \u003c/p\u003e\n\u003cp\u003eTo navigate volatility, it’s necessary to demystify the real-world capabilities of cryptocurrency and its economic implications. \u003c/p\u003e\n\u003cp\u003eEnhance your knowledge of cryptocurrency, its limitations, capabilities, and the way it functions within the economic environment in the Cryptocurrency online short course from the MIT Media Lab. Taking a comprehensive approach, you’ll explore cryptocurrencies in comparison with traditional finance, and gain insight into how start-ups, financial institutions, big tech, and central banks are adapting to its emergence. \u003c/p\u003e\n\u003cp\u003eGuided by MIT Media Lab’s Digital Currency Initiative — as well as crypto industry experts, economists, financial regulators, and internet entrepreneurs — you’ll gain the skills to critically and holistically assess the viability of crypto projects, and understand the opportunities and challenges associated with the evolution of money. In six weeks, you’ll gain insight into blockchain technology, smart contracts, decentralized applications (DApps), and the broader environment in which cryptocurrencies exist. At the end of the course, you’ll be equipped with the critical reasoning skills to analyze the viability of any smart crypto project. \u003c/p\u003e\n\u003cp\u003e1\u003ca href=\"https://fortune.com/2020/08/24/crypto-digital-currency-bitcoin-jpmorgan/\" target=\"_blank\"\u003e \u003cem\u003eFortune\u003c/em\u003e\u003c/a\u003e \u003cem\u003e(Aug, 2020\u003c/em\u003e \u003cem\u003e).\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eThis course is designed for anyone seeking a working knowledge of the latest cryptocurrency developments and the skills to assess the viability of crypto projects, and is especially applicable to executives exploring new organizational needs. The program is relevant to both financial services and IT professionals aiming to gain a competitive advantage within their sector by understanding how crypto is actually being applied. Professionals and entrepreneurs from wide-ranging industries, who are seeking future growth or new opportunities, will also benefit from a comprehensive understanding of cryptocurrency and the environment in which it operates. \u003c/p\u003e\n\u003cp\u003eDuring this course, you will be provided with the information, knowledge, and frameworks to deepen your understanding of cryptocurrencies from a business perspective. You’ll also explore blockchain technology, how cryptocurrencies operate, and what value they offer in organizational contexts. \u003c/p\u003e\n\u003cp\u003eYou will not be given cryptocurrency investing advice, or investment or financial advice of any nature.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1fd:Ta66,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn an increasingly complex, algorithm-driven world, critical thinking is a vital skill for everyone in business. Professionals must use data discerningly and interrogate the assumptions and claims of others. Only then will they be able to capitalize on their competitive advantages over machines and over peers less able to harness Artificial Intelligence (AI). All this means developing tools and strategies to avoid cognitive bias and error, to make rigorous arguments and to seek truth from facts. \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCritical Thinking: Problem-Solving and Decision-Making in a Complex World\u003c/strong\u003e , a two-week online course from Economist Education, shows learners how to interrogate assumptions, use data, and combat cognitive bias to make better decisions. The course’s first module explores how everyone falls prey to uncritical thinking, including narrative oversimplification and confirmation bias, and provides tools to recognize and counteract them. The second module emphasises the importance of rigorous arguments based on data and research, while guiding learners to reframe complex problems and harness diverse perspectives. \u003c/p\u003e\n\u003cp\u003eThe course is guided by Dr Tom Chatfield, an expert on critical thinking, as well as senior editors at The Economist, and features insights from guest speakers including Daniel Kahneman, a Nobel prizewinner. The curriculum uses real-world examples, including The Economist’s editorial processes, to demonstrate the crucial role of critical thinking in decision making. Realistic scenarios and case studies challenge you to overcome oversimplification and faulty reasoning. The course encourages an approach to critical thinking that you can apply in your work, by fostering strategic pauses, self-reflection, investigation, and collaboration. \u003c/p\u003e\n\u003cp\u003eBy the end of the course, you will not only understand your cognitive strengths and vulnerabilities but also gain the tools to make decisions informed by data, stress-test business ideas and interrogate assumptions in a technology-driven world.\u003c/p\u003e\n\u003cp\u003eThis course is designed for experienced professionals and emphasizes the value of human critical thinking in a machine-driven world. Learners from diverse fields, such as marketing, consulting, and financial services, will learn to interrogate assumptions, use data discerningly, and identify essential questions that AI cannot. By embracing critical thinking, experienced professionals and aspiring leaders will be better equipped to stress-test business ideas, enabling them to avoid costly errors and make better decisions. This course is a must for those looking to stay relevant in the age of AI.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1fe:T866,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe digital age provides businesses with a wealth of data about consumer choices. A major challenge organizations face, however, is an evident skills gap among marketing professionals to translate that information into meaningful and actionable insights. As a result, marketers are increasingly looking to engage, measure, adapt, and optimize every touchpoint of the customer experience. They need a strategy for their customer and performance data that moves in real time and at scale.\u003c/p\u003e\n\u003cp\u003eThe Marketing Analytics: Strategy and Decision-Making online short course from the University of Cape Town (UCT) addresses the why, where, and what of marketing analytics: Why is it needed, where are the main touchpoints, and what analytical techniques can be leveraged to drive marketing efficacy? Over eight weeks, you’ll answer these questions by exploring the current state of marketing analytics, including key challenges that restrict strategic choices. You’ll discover why big data has transformed marketing and learn how to design an analytics framework that leverages big data for marketing decision-making. Using a variety of real-world scenarios, you’ll engage with concepts and techniques to better understand your customers and create data-driven outcomes that optimize return on marketing investment. Finally, you’ll explore existing and proposed privacy frameworks, and the impact that emerging trends will have on the future of marketing.\u003c/p\u003e\n\u003cp\u003eThis course is designed for anyone working in the field of marketing or aspiring towards a career in marketing analytics. It will also be beneficial to business leaders and C-suite professionals looking to increase the efficiency and effectiveness of their marketing departments to boost their bottom lines and stay ahead of competitors. Middle to senior managers looking to update their knowledge and move their career in a new direction will benefit from the real-world marketing scenarios discussed in the course. Newly qualified and existing marketing professionals who want to deepen their understanding of technologies, tools, and tactics will gain an expert-led skill set.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ff:T8c4,"])</script><script>self.__next_f.push([1,"\u003cp\u003eRapid digitization and questions of data privacy have led to the development of data protection laws across the globe, including the General Data Protection Regulation (GDPR). Designed to modernize laws that protect the personal information of individuals, these new data regulations impact how businesses and public sector organizations should handle customer and stakeholder information. The Data: Law, Policy and Regulation online certificate course from LSE explores the role of law in the digital space by contextualizing legal principles and concepts related to data and technology regulation. Ultimately, it empowers learners with the skills to navigate the changing legal environment shaping data law and policy. \u003c/p\u003e\n\u003cp\u003eThrough a socio-legal lens, you’ll engage critically with topical case studies and current data regulations, and gain insight into the legal challenges posed by digitization. Developed by leading academics from LSE’s Law School, the content draws on the strengths of the school’s innovative research and academic excellence to immerse you in pressing legal debates in data protection and algorithmic regulation. By the end of this online course, you’ll have gained the skills to think critically about the relationship between technology, policy, and the law. You’ll also walk away with a better understanding of the issues of digital data ownership and exploitation.\u003c/p\u003e\n\u003cp\u003eThis course is aimed at professionals looking to explore the global data protection concerns driving new internet and technology regulations. It’s designed to be open and applicable to people from various geographical or jurisdictional contexts eager to understand the core legal concepts and debates around data law and regulation, as well as data-driven decision making. Offering practical applications for both legal and business professionals, this course is relevant to business leaders, data analysts, and information technologists looking to gain expert perspectives on this current and critical issue. For legal consultants, public policy specialists, and law graduates, the course offers the opportunity to grow your knowledge in tech-driven policymaking, data privacy and protection, and data regulation issues.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"200:T912,"])</script><script>self.__next_f.push([1,"\u003cp\u003eIn an increasingly complex global and local environment, where individuals need to cope with rapid change and abundant information, effective communication is crucial. The fast-paced and public nature of digital communication can mean a single misstep can lead to loss of credibility at both a company and an individual level. \u003c/p\u003e\n\u003cp\u003eThe Communication and Influence in the Digital Age online short course from the University of Cape Town (UCT) explores traditional communication skills adapted for today’s connected and technology-driven environment. Led by UCT faculty and subject matter experts, you’ll learn to communicate effectively with your teams, stakeholders, and digital audience to improve trust, clarity, and goodwill. \u003c/p\u003e\n\u003cp\u003eYou’ll learn how to navigate the current communication landscape through critical thinking, persuasion, storytelling, cultural awareness, interpersonal communication, presentation, and crisis management, all integral to manifesting influence and communicating successfully. \u003c/p\u003e\n\u003cp\u003eThis course is aimed at professionals across industries who are looking to build their communication abilities \u003cem\u003e—\u003c/em\u003e in person and online \u003cem\u003e—\u003c/em\u003e to meet the needs of an increasingly complex, digitised world. In occupations where effective communication skills are required to engage with a range of stakeholders, this course will help to develop an interpersonal skill set applicable to the current communications landscape. If you’re seeking ways to influence and inspire others, build greater self-awareness and interpersonal skills, and communicate effectively, the course provides a practical roadmap to promote trust, clarity, and goodwill in your professional context. \u003c/p\u003e\n\u003cp\u003eRelevant to early- and mid-career professionals who need to engage with a wide range of personnel, as well as new or aspiring leaders who need to communicate effectively with teams, you’ll be compelled to assess your interpersonal communication skills and the value of investing in communication as a professional and a leader. No matter what your context, building influence is crucial for reaching your personal and professional goals. This course will help you develop your personal brand and hone your presentation skills in order to cultivate influence and communicate persuasively.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"201:Tfda,"])</script><script>self.__next_f.push([1,"\u003cp\u003eEmerging supply chain and last mile logistics technology is a major source of competitive advantage. Now that more efficient digital solutions have become available, companies can make greater improvements in supply chain performance. Combining digital applications with operational changes helps yield significant performance improvements that transform the supply chain.\u003c/p\u003e\n\u003cp\u003eThe \u003cstrong\u003eStrategies for Supply Chain Digitalization\u003c/strong\u003e online program from the Institute for Management Development (IMD) will help you identify opportunities to streamline and optimize your business supply chain. Over five weeks, you’ll discover the best way to adapt your organization to new technologies and examine the digital logistics available to support a customer-centric supply chain, from strategic sourcing to production. Guided by Carlos Cordon, Professor of Strategy and Supply Chain Management, you’ll explore efficient supply chain network design operations and how to address changing customer needs. Walk away with a roadmap to digitally transform your supply chain.\u003c/p\u003e\n\u003cp\u003eThis program will appeal to logistics, transport management, warehousing, procurement, and supply chain professionals seeking a better understanding of the opportunities afforded by digital initiatives in this sector. It’s particularly relevant to business professionals in the retail, wholesale, and manufacturing sectors. These roles include, but are not limited to, operations, project management, consultancy, business development, sales, engineering, and entrepreneurship.\u003c/p\u003e\n\u003cp\u003e\u003cimg src='https://www.getsmarter.com/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBbVVRIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--4526c39a0fb71f1c17d6351464c2a1adf972c3d1/Badge%20-%20IISB%20Accredited.jpeg' width='201' height='202' /\u003e \u003c/p\u003e\n\u003cp\u003eThe Strategies for Supply Chain Digitalization online program from the Institute for Management Development (IMD) is accredited by the International Supply Chain Education Alliance (ISCEA). ISCEA is the global leader in supply chain education, certification, and recognition programs. By completing this program, learners will receive globally recognized skills in the supply chain occupation, networking opportunities with like-minded individuals, and discounted fees for Certified Professional in Logistics Management (CPLM) certification. For more information on the benefits of taking this ISCEA-accredited program, \u003ca href=\"https://www.iscea.org/about-iscea\" target=\"_blank\"\u003eclick here\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cem\u003ePlease note that GetSmarter (part of edX) and IMD bear no responsibility for the claiming of these benefits with ISCEA. The onus, therefore, falls on you to do so.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cimg src='https://www.getsmarter.com/rails/active_storage/blobs/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBdk1RIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--9f5f9f60b7cf901fec4765e4f572ace0417dd778/image%20(2).png' width='683' height='91' /\u003e \u003c/p\u003e\n\u003cp\u003eIMD is a \u003ca href=\"https://www.imd.org/about-imd/rankings-accreditations/\" target=\"_blank\"\u003etriple-accredited academic institution\u003c/a\u003e, with the \u003cem\u003eFinancial Times\u003c/em\u003e ranking it first for its open programs nine years in a row. IMD attributes its success to its unique “Real Learning. Real Impact” approach. Based in Switzerland and Singapore, IMD is led by expert and diverse faculty who use their insights, tools, and perspectives to prepare learners for the future of business. As an independent academic institution with a global reach, IMD strives to educate ambitious individuals and organizations worldwide. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eBy taking this program, you have the opportunity to accelerate your career with the IMD Digital Excellence Diploma. Customize your learning journey with 15 days of programs that are relevant to your digital needs and pass an exam to earn the diploma. See the programs\u003c/em\u003e\u003ca href=\"https://www.imd.org/dtp/digital-excellence-diploma/\" target=\"_blank\"\u003e \u003cem\u003ehere\u003c/em\u003e\u003c/a\u003e \u003cem\u003e, and discover how participants are customizing their diploma.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003e\u003cem\u003e\u003cbr /\u003e\n\u003c/em\u003e\u003c/p\u003e"])</script><script>self.__next_f.push([1,"202:T960,"])</script><script>self.__next_f.push([1,"\u003cp\u003eThe turbulent nature of the current business climate has highlighted the impact that social, technological, and governmental disruption can have on an organisation. Now, more than ever, you need a firm comprehension of finance in order to participate in financial decision-making and discussions, and deliver value to your company. \u003c/p\u003e\n\u003cp\u003eOn the Oxford Executive Finance Programme from Saïd Business School, University of Oxford you’ll gain the practical knowledge and skills to understand the finances of any organisation and how they make decisions. Over the course of six weeks, you’ll also explore corporate finance in terms of capital structure, taxation and bankruptcy, and investigate the trade-offs of funding through an analysis of debt versus equity and how this choice affects an investment project’s valuation. \u003c/p\u003e\n\u003cp\u003eThrough analysing current industry debates and critical expert insights, you’ll discover the key topics that are changing practices in the fast-moving world of finance, such as corporate governance, and environmental, social, and governance (ESG) factors. By the end of the programme, you’ll be able to leverage finance as part of your executive toolkit to make more informed, strategic decisions and improve overall business performance. \u003c/p\u003e\n\u003cp\u003e\u003cem\u003eThe content of this programme also forms part of the six-month online\u003ca href=\"https://www.getsmarter.com/products/oxford-strategic-management-executive-programme\" target=\"_blank\"\u003eOxford Strategic Management Executive Programme\u003c/a\u003e, designed to help you advance as a business executive.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eThis online programme is designed to empower non-financial business leaders, senior executives, managers, and business professionals with the financial proficiency to participate in key discussions and strategic decision-making at an executive level. \u003c/p\u003e\n\u003cp\u003eThose aspiring to move into a strategic decision-making role will develop an understanding of corporate finance and the financial implications of their decisions, learn to better manage resources, and discover how best to use and interpret financial information to drive their business forward. \u003c/p\u003e\n\u003cp\u003eThis programme has no prerequisites, and participants are not required to have extensive finance experience or knowledge. On successful completion, you’ll earn a certificate of attendance from Saïd Business School, University of Oxford.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"203:T639,\u003cp\u003eIf you’re a leader at heart, you’re in the right place. Management and \r\nleadership skills are in demand across industries, and that means there’s \r\nplenty of opportunity for people like you to step up and build the skills \r\nto help maintain an efficient and effective work environment.\u003c/p\u003e\r\n\r\n\u003cp\u003eReal leadership starts with one brave decision, and we want to embolden you \r\nto make your next big career move. Earn your online Master of Arts in Management and Leadership degree from Maryville, and you can be the catalyst behind stronger, more \r\nsuccessful, more organized teams.\u003c/p\u003e\r\n\r\n\u003cp\u003eWe designed our program to be accessible regardless of your academic and \r\nprofessional background. We’ll help you establish a strong foundation in \r\nbusiness, then focus on developing in-demand leadership skills and \r\nqualities like communication, team-building, critical thinking, \r\ndecision-making, and problem-solving.\u003c/p\u003e\r\n\r\n\u003cp\u003eIf you’re ready to move forward in your career, start here. Our program \r\nfocuses on practical, real-world learning opportunities, and it features eight concentrations and/or certificates in Cybersecurity, Health Administration, Human Resource Management, \r\nInformation Technology, Marketing, Project Management, Software \r\nDevelopment, or Data Analytics. You’ll learn from experienced faculty in a \r\nprogram designed with input from top employers, so you can build practical, \r\nrelevant skills that you can apply to your career.\u003c/p\u003e\r\n\r\n\u003cp\u003eDon’t just prepare for the next step in your career. Prepare for every step.\u003c/p\u003e\r\n\r\n\u003cp\u003eGet Curriculum Details\u003c/p\u003e204:T7c3,The University of South Carolina is a globally recognized, high-impact research university committed to a superior student experience and dedicated to innovation in learning, research, and community engagement. UofSC offers 350+ degree programs and is one of only 40 public universities to receive Carnegie Classifications for both top-tier research activity and community engagement.\n-An undergraduate degree in Information Science teac"])</script><script>self.__next_f.push([1,"hes students how to organize, manage, and analyze large amounts of data, using tools and techniques such as databases, data mining, and machine learning.\n-They learn the fundamentals of computer science and programming, including algorithms, data structures, and software development.\n-Students learn about user experience (UX) and user interface (UI) design principles to develop applications that are easy to use and navigate.\n-They also study the principles of human-computer interaction (HCI), understanding how humans interact with technology and how to design technology that is both useful and usable.\n-Information science students learn about the legal and ethical issues surrounding information and data management, such as privacy, intellectual property, and data security.\n-They study the use of information technology in organizations, including the design and management of information systems that support business processes and decision-making.\n-Students learn about data visualization, exploring ways to present complex data and information in visual formats that are easy to understand.\n-They also learn about information retrieval, including search engines and the algorithms that underpin them.\n-An undergraduate degree in Information Science teaches students how to work collaboratively in teams and communicate technical information to non-technical stakeholders.\n-Finally, students learn about emerging technologies and their potential impact on society, preparing them to be innovative and responsible technology professionals.205:T7ac,Cleveland State University partners with world-class hospitals, Fortune 500 companies, government research centers, and cultural institutions to give its students academic, research, and job opportunities. With more than 175+ undergraduate degrees to choose from, Cleveland State Global students are prepared to succeed in the global workforce.\n-An undergraduate degree in Information Systems teaches students how to design, develop, and manage information systems that support business pr"])</script><script>self.__next_f.push([1,"ocesses and decision-making.\n-Students learn about the principles of project management, including planning, scheduling, and budgeting.\n-They study the analysis and design of information systems, using techniques such as data modeling and process mapping.\n-Information Systems students learn about databases, including design, implementation, and management of database systems.\n-They study enterprise resource planning (ERP) systems, which integrate business processes and functions across different departments and areas of an organization.\n-Students learn about the principles of data analytics, including data mining, machine learning, and statistical analysis, and their applications in business decision-making.\n-They also learn about the legal and ethical issues surrounding the use of information systems in organizations, including privacy, security, and intellectual property.\n-An undergraduate degree in Information Systems teaches students how to communicate technical information to non-technical stakeholders, including writing technical reports and giving presentations.\n-Students learn about emerging technologies and their potential impact on organizations and society, preparing them to be innovative and responsible technology professionals.\n-Finally, Information Systems students develop skills in teamwork and collaboration, as well as leadership and management, to prepare them for careers in various fields such as business, healthcare, and government.206:T80d,"])</script><script>self.__next_f.push([1,"The University of Utah is located on a picturesque campus in Salt Lake City. Utah creates global leaders by placing a strong emphasis on entrepreneurship, innovation, and quality of life. The Utah College of Engineering - ranked #61 in Undergraduate Engineering by U.S. News \u0026 World Report (2020) - prepares students to improve the productivity, health, safety, and enjoyment of human life through leading-edge research and tech development.\n-An undergraduate degree in Information Systems teaches students how to design, develop, and manage information systems that support business processes and decision-making.\n-Students learn about the principles of project management, including planning, scheduling, and budgeting.\n-They study the analysis and design of information systems, using techniques such as data modeling and process mapping.\n-Information Systems students learn about databases, including design, implementation, and management of database systems.\n-They study enterprise resource planning (ERP) systems, which integrate business processes and functions across different departments and areas of an organization.\n-Students learn about the principles of data analytics, including data mining, machine learning, and statistical analysis, and their applications in business decision-making.\n-They also learn about the legal and ethical issues surrounding the use of information systems in organizations, including privacy, security, and intellectual property.\n-An undergraduate degree in Information Systems teaches students how to communicate technical information to non-technical stakeholders, including writing technical reports and giving presentations.\n-Students learn about emerging technologies and their potential impact on organizations and society, preparing them to be innovative and responsible technology professionals.\n-Finally, Information Systems students develop skills in teamwork and collaboration, as well as leadership and management, to prepare them for careers in various fields such as business, healthcare, and government."])</script><script>self.__next_f.push([1,"207:T740,- #147 National Universities - U.S. News \u0026 World Report, 2019\n- A true campus experience just minutes from the cultural and financial capital of the world\n- 240+ major companies recruit on campus Apple, IBM, AIG, Pepsi and Merrill Lynch\n-An undergraduate degree in Information Systems teaches students how to design, develop, and manage information systems that support business processes and decision-making.\n-Students learn about the principles of project management, including planning, scheduling, and budgeting.\n-They study the analysis and design of information systems, using techniques such as data modeling and process mapping.\n-Information Systems students learn about databases, including design, implementation, and management of database systems.\n-They study enterprise resource planning (ERP) systems, which integrate business processes and functions across different departments and areas of an organization.\n-Students learn about the principles of data analytics, including data mining, machine learning, and statistical analysis, and their applications in business decision-making.\n-They also learn about the legal and ethical issues surrounding the use of information systems in organizations, including privacy, security, and intellectual property.\n-An undergraduate degree in Information Systems teaches students how to communicate technical information to non-technical stakeholders, including writing technical reports and giving presentations.\n-Students learn about emerging technologies and their potential impact on organizations and society, preparing them to be innovative and responsible technology professionals.\n-Finally, Information Systems students develop skills in teamwork and collaboration, as well as leadership and management, to prepare them for careers in various fields such as business, healthcare, and government."])</script><script>self.__next_f.push([1,"31:[\"$\",\"$L39\",\"2\",{\"title\":\"Veeam\",\"topic\":\"Information Technology\",\"categories\":[{\"productType\":\"Certificate\",\"categoryLabel\":\"Certificates\",\"products\":[{\"productUuid\":\"6fcfceea-c85e-45e1-9319-af55bb739e41\",\"productName\":\"Information Technology (IT) Support PC\",\"productSlug\":\"certificates/professional-certificate/ibm-information-technology-support\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6fcfceea-c85e-45e1-9319-af55bb739e41-f654753399d3.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"Develop key technical knowledge and up-to-date skills in preparation for a rewarding career in IT and technical support.,Demonstrate in-demand hardware and software skills that help users select, install, and configure their devices, operating systems, and applications.,Build essential computer networking, cybersecurity, and cloud computing skills that IT Support and Helpdesk specialists need to be successful.,Practice customer service and troubleshooting skills through hands-on labs, demos, and interactive exercises to become job-ready.\",\"shortDescription\":\"\",\"productOverview\":\"$3a\",\"objectId\":\"program-6fcfceea-c85e-45e1-9319-af55bb739e41\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":7,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"75f70b19-b26d-41bf-81a2-36fb8dded8f4\",\"productName\":\"C Programming with Linux\",\"productSlug\":\"certificates/professional-certificate/dartmouth-imtx-c-programming-with-linux\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/75f70b19-b26d-41bf-81a2-36fb8dded8f4-e5d0ed35edf2.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Dartmouth College\",\"IMT\"],\"partnerKeys\":[\"DartmouthX\",\"IMTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/faaf3d47-e4af-4da6-8cb8-c7051d7b1572-0d113e57e4e4.png\",\"fullDescription\":\"Develop and debug code in the C programming language,Discover the foundations of computer programming and Linux, manipulate the command line, manage processes, files and memory, and compile C code with Linux,Interpret, analyze, and implement important computer algorithms,Observe, manipulate, and optimize computer memory using pointers in the C programming language\",\"shortDescription\":\"Learn C Programming and Linux. Get instant feedback on your code, and unlock doors to careers in computer engineering.\",\"productOverview\":\"$3b\",\"objectId\":\"program-75f70b19-b26d-41bf-81a2-36fb8dded8f4\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":7,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"766605fa-f946-4289-b34a-59db00f618b3\",\"productName\":\"IT Project Management\",\"productSlug\":\"certificates/professional-certificate/uwashingtonx-it-project-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/766605fa-f946-4289-b34a-59db00f618b3-14fdb95f84c6.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"Why IT organizations use project management to deliver business value and how organizational culture can influence the role of the PM and individual projects;,How to describe and distinguish among the major project management methodologies and project lifecycles as applied to IT and to identify strategies for managing distributed teams;,The purpose of a Project Management Office (PMO), high-level strategies to set up, maintain, and close a PMO, and how it can work within your organization;,Techniques to intake, prioritize, and select projects and programs so that they align with an organization's overall business strategy; and,Which personal and performance competencies are necessary for project management in IT, and strategies for developing those skills.\",\"shortDescription\":\"Conquer the challenges of managing diverse and distributed IT projects and teams by applying the latest PM techniques and strategies.\",\"productOverview\":\"\u003cp\u003eAre you an IT professional new to project management or a manager who wants to develop more robust project management skills? Perhaps you are looking to forge a career as a full-time project manager (PM). This program will introduce you to the fundamentals of project management, specifically as they apply to the field of information technology (IT).\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eThis program will help you select project management techniques and strategies that best fit your IT project or organization. You’ll also explore how project management offices are organized and how they develop a project portfolio. Throughout the program, you’ll come to understand some of the challenges of the field, including management of diverse teams and projects that are potentially based anywhere in the world. By the end, you’ll determine your own competencies as an IT project manager and will have developed core skills required for this role.\u003c/p\u003e\",\"objectId\":\"program-766605fa-f946-4289-b34a-59db00f618b3\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"25987501-fe7f-4186-b689-00a1cad44fa5\",\"productName\":\"IT Fundamentals for Business Professionals\",\"productSlug\":\"certificates/professional-certificate/upvalenciax-it-fundamentals-for-business-professionals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/25987501-fe7f-4186-b689-00a1cad44fa5-d50e760d5c20.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"How Information Technology is used in organizations.,An overview of how computers and communications networks work.,Basic concepts of software development and project management.,Fundamental concepts of computer programming.,Computer threats, hackers, antivirus and information security.,Social and ethical implications of IT.\",\"shortDescription\":\"Learn the basic concepts of Information Systems and their application and the terminology used in IT to advance your career\",\"productOverview\":\"$3c\",\"objectId\":\"program-25987501-fe7f-4186-b689-00a1cad44fa5\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"35fce70d-33b0-4708-bba8-5f303ef4de18\",\"productName\":\"Transforming Your Company’s Data Analytics: Championing the Digital Enterprise\",\"productSlug\":\"certificates/professional-certificate/usmx-championing-the-digital-enterprise\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/35fce70d-33b0-4708-bba8-5f303ef4de18-00aa5cb17a5e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"Vision - What does a Digital Enterprise look like? How does it work?,Roadmap - How do we get there? What’s the pathway to change?,Process - What can we do with the data? New processes? New values?,Communication – How can we lead digital teams at scale?,Culture - How can we prepare the organization, the employees, and the leadership for optimizing digital technologies and processes?\",\"shortDescription\":\"Champion your company’s transformation to a digital enterprise with data analytics and technologies that deliver business agility\",\"productOverview\":\"$3d\",\"objectId\":\"program-35fce70d-33b0-4708-bba8-5f303ef4de18\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"50b3f5a7-d521-4c69-985b-d064755c545c\",\"productName\":\"Healthcare Administration\",\"productSlug\":\"masters/micromasters/doanex-healthcare-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/50b3f5a7-d521-4c69-985b-d064755c545c-9cf3b5efa394.webp\",\"productType\":\"MicroMasters\",\"attributes\":[\"Business \u0026 Management\",\"Medicine\",\"Law\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Doane University\"],\"partnerKeys\":[\"DoaneX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e9e90c9f-85ec-4ae5-bea8-2ecae2258446-85b6b8c0a212.png\",\"fullDescription\":\"$3e\",\"shortDescription\":\"Develop the skills as a leader to navigate and lead your organization to success by mastering complex challenges in today’s healthcare.\",\"productOverview\":\"$3f\",\"objectId\":\"program-50b3f5a7-d521-4c69-985b-d064755c545c\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ea4b6eda-84e6-4bfa-8666-ce95fa7e19b6\",\"productName\":\"Undergraduate Certificate in Data Science\",\"productSlug\":\"certificate/maryville-university-undergraduate-certificate-in-data-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ea4b6eda-84e6-4bfa-8666-ce95fa7e19b6-ac2487032d71.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$40\",\"objectId\":\"program-ea4b6eda-84e6-4bfa-8666-ce95fa7e19b6\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"abedd13a-643b-428d-bd1e-ab1a71a4dbc3\",\"productName\":\"Post-Baccalaureate Certificate in Big Data\",\"productSlug\":\"certificate/maryville-university-post-baccalaureate-certificate-in-big-data\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/abedd13a-643b-428d-bd1e-ab1a71a4dbc3-f29c0b34556c.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$41\",\"objectId\":\"program-abedd13a-643b-428d-bd1e-ab1a71a4dbc3\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f54fde6b-748c-4d54-b2b2-a129f18714fd\",\"productName\":\"Fundamentos TIC para profesionales de negocios\",\"productSlug\":\"certificates/professional-certificate/upvalenciax-fundamentos-tic-para-profesionales-de-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f54fde6b-748c-4d54-b2b2-a129f18714fd-790df4f2d1dd.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"Cómo se utiliza la tecnología de la información y las comunicaciones en las organizaciones modernas.,Una visión general de cómo funcionan los ordenadores y las redes de comunicaciones.,Conceptos básicos de desarrollo de software y gestión de proyectos.,Conceptos básicos de programación.,Las implicaciones sociales y éticas de las TIC.,Las amenazas y riesgos, los hackers y la seguridad informática.,Conceptos que permitirán trabajar e interactuar de forma efectiva con las personas de informática.\",\"shortDescription\":\"Aprende los conceptos básicos de los sistemas de información y su aplicación y la terminología utilizada en las TIC para progresar en tu carrera profesional.\",\"productOverview\":\"$42\",\"objectId\":\"program-f54fde6b-748c-4d54-b2b2-a129f18714fd\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8ac6657e-a06a-4a47-aba7-5c86b5811fa1\",\"productName\":\"Cybersecurity\",\"productSlug\":\"masters/micromasters/ritx-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8ac6657e-a06a-4a47-aba7-5c86b5811fa1-0801b0375fc9.png\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"How to setup and secure basic computer systems and networks,Information security risk management framework and methodologies,How to implement network security solutions and detect intrusions,How to conduct a digital forensics investigation admissible to a court\",\"shortDescription\":\"Launch your career in a high demand industry that projects 2 million new jobs annually by earning a Cybersecurity MicroMasters® program credential from RIT.\",\"productOverview\":\"\u003cp\u003e\u003cimg style=\\\"max-height:175px\\\" align=\\\"right\\\" alt=\\\"\\\" src=\\\"https://www.edx.org/sites/default/files/edx-prize-logo-2018-nominee.png\\\"/\u003eGain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments. \u003c/p\u003e \\r\\n \u003cp\u003eIn this Cybersecurity MicroMasters program, you will learn: \\r\\n\u003cul\u003e\u003cli\u003eFundamentals of networks;\u003c/li\u003e \\r\\n\u003cli\u003eSystems administration;\u003c/li\u003e \\r\\n\u003cli\u003eHow to protect computer networks and other systems by mitigating vulnerabilities and monitoring intrusions;\u003c/li\u003e \u003cli\u003eHow to perform digital forensic analysis of cybercrime by gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization;\u003c/li\u003e \\r\\n\u003cli\u003eTechniques of risk analysis;\u003c/li\u003e \\r\\n\u003cli\u003eRisk assessment and vulnerability assessment. \u003c/li\u003e\u003c/ul\u003e\u003c/p\u003e\",\"objectId\":\"program-8ac6657e-a06a-4a47-aba7-5c86b5811fa1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"41c66c10-27fc-4e09-9b5a-29cf3257aabe\",\"productName\":\"Business Excellence in a knowledge-driven Industry 4.0 world\",\"productSlug\":\"certificates/professional-certificate/hkpolyux-business-excellence-in-a-knowledge-driven-industry-40-world\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/41c66c10-27fc-4e09-9b5a-29cf3257aabe-f2dc9199e716.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Social Sciences\",\"Data Analysis \u0026 Statistics\",\"Computer Science\",\"Engineering\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"The power of 21st century digitalized networks,To leverage data, knowledge and the right expertise to excel.,To develop smart services, systems and products.,To use the Cloud as a canvas for orchestrating services, innovation and collaborations.\",\"shortDescription\":\"This program is designed to help managers and consultants from a non-technical background decide where to invest and design their digital transformation strategies in connected, networked societies, and develop smart products, services, systems...\",\"productOverview\":\"$43\",\"objectId\":\"program-41c66c10-27fc-4e09-9b5a-29cf3257aabe\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c42c39d4-82e2-49bb-a623-05df3e437bc9\",\"productName\":\"Post-Baccalaureate Certificate in Cybersecurity Incident Response\",\"productSlug\":\"certificate/maryville-university-post-baccalaureate-certificate-in-cybersecurity-incident-response\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c42c39d4-82e2-49bb-a623-05df3e437bc9-82c85a662dee.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Build the skills you need to build strong defense infrastructures and manage cyber risks across your organization.\",\"objectId\":\"program-c42c39d4-82e2-49bb-a623-05df3e437bc9\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"914c4c2a-ed45-4c53-9d83-4057085a6c53\",\"productName\":\"Geographic Information Systems (GIS) Essentials\",\"productSlug\":\"certificates/professional-certificate/alaskax-geographic-information-systems-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/914c4c2a-ed45-4c53-9d83-4057085a6c53-ad2d9f430dd4.jpeg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Engineering\",\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"Build proficiency in ESRI’s ArcGIS Pro software, the industry standard.,Use geoprocessing tools for spatial analysis and problem solving.,Communicate spatial analysis results through maps, graphs and ArcGIS story maps.,Use 3D geoprocessing tools for landscape analysis and watershed delineation, and ArcScene for 3D visualization.,Learn image processing and analysis in ArcGIS Pro to assess vegetation health, wildfire burn severity, and flood impacts. Use image classification to map land use and land cover.\",\"shortDescription\":\"\",\"productOverview\":\"$44\",\"objectId\":\"program-914c4c2a-ed45-4c53-9d83-4057085a6c53\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f9033b0d-01cd-4aea-828e-f1e1844846cc\",\"productName\":\"Big Data Technology\",\"productSlug\":\"masters/micromasters/hkustx-big-data-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f9033b0d-01cd-4aea-828e-f1e1844846cc-1b33b5bac7e5.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\",\"Math\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"Identify, explain, and use Big Data infrastructure.,Solve Big Data integration and storge problems.,Perform various data analytics tasks using Big Data management and computing techniques.,Investigate existing problems on Big Data and conduct original Big Data research.\",\"shortDescription\":\"This program covers the fundamental facets of big data and how it is used in the real world, including data processing infrastructure, data integration, storage, modeling and management, computing systems, analytics, and data mining.\",\"productOverview\":\"\u003cP\u003eThis program integrates a variety of topics to allow students to learn the fundamental facets of big data and how it is used in the real world. Topics include mathematical foundations (convex/non-convex optimization and computational methods), data analytics (from data collection, integration, cleansing, mining, machine learning, to business intelligence), and data processing infrastructures (MapReduce, Hadoop, Apache Spark, SQL).\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eThe courses in this program are offered by renowned faculty members from the Computer Science and Engineering Department and the Mathematics Department at HKUST. HKUST ranks at the 30th in Computer Science and Information Systems and 36th in Mathematics according to 2021 QS World University Rankings by Subject.\u003c/p\u003e\",\"objectId\":\"program-f9033b0d-01cd-4aea-828e-f1e1844846cc\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f40a88e5-6e1e-4933-866b-aa2e6976e0c4\",\"productName\":\"Instructional Design and Technology\",\"productSlug\":\"masters/micromasters/usmx-umgc-instructional-design-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f40a88e5-6e1e-4933-866b-aa2e6976e0c4-a69a0519d586.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"Apply learning theory, instructional design models, curriculum design techniques, and the assessment of learning to create innovative learning experiences.,Integrate multimedia and technology tools effectively to enhance learning experiences.,Apply principles of user experience (UX) and user interface (UI) design in the creation of learner-friendly interfaces and interactions.,Apply information literacy, accessibility, and ethical practice to the design of learning experiences.,Critically evaluate trends, issues, practices, and methodologies that influence the field of learning design.\",\"shortDescription\":\"Learn how to design and operate the learning platforms of the future.\",\"productOverview\":\"$45\",\"objectId\":\"program-f40a88e5-6e1e-4933-866b-aa2e6976e0c4\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0ce5e1b0-0695-4647-9bab-7272addebaea\",\"productName\":\"Quantum Technology: Computing and Sensing\",\"productSlug\":\"masters/micromasters/purduex-quantum-technology-computing-and-sensin\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/0ce5e1b0-0695-4647-9bab-7272addebaea-8eb9a382d3d2.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Engineering\",\"Science\",\"Electronics\",\"Physics\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"How to design and incorporate quantum detectors in various systems.,Quantum networking and sensing technologies.,Engineering challenges of quantum computation.,How to formulate and apply basic quantum algorithms.,How to analyze various quantum computing architectures.\",\"shortDescription\":\"Learn the fundamentals of emerging quantum computing, sensing and detector technology.\",\"productOverview\":\"$46\",\"objectId\":\"program-0ce5e1b0-0695-4647-9bab-7272addebaea\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f3369650-9717-434c-924c-64ac17f99e07\",\"productName\":\"Quantum 301: Quantum Computing with Semiconductor Technology\",\"productSlug\":\"certificates/professional-certificate/delftx-quantum-301-quantum-computing-with-semiconductor-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f3369650-9717-434c-924c-64ac17f99e07-38c3d2583c1f.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Physics\",\"Computer Science\",\"Electronics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"Understand the physics behind Germanium qubits and their advantages and challenges.,Learn how Germanium qubits can be controlled and how this process can be automatized using machine learning.,Familiarize yourself with different companies in the semiconducting industry and their facilities.,Identify how quantum algorithms and quantum error correction can be performed using Germanium qubits.,Understand the utility of machine learning in tuning of semiconductor qubits.,Develop and implement in Python machine learning prototypes for semiconductor qubit tuning tasks.,Assess the suitability of machine learning in experimental quantum computing workflows.\",\"shortDescription\":\"Unravel the physics behind Germanium qubits, their fabrication process, control, and applications. Learn about machine learning for semiconductor quantum devices, and specifically how to apply it for auto-tuning.\",\"productOverview\":\"$47\",\"objectId\":\"program-f3369650-9717-434c-924c-64ac17f99e07\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"38eaf9b2-ac0a-4df0-8d8f-7bb371b4007b\",\"productName\":\"Geographic Information Systems (GIS)\",\"productSlug\":\"masters/micromasters/dux-geographic-information-systems-gis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/38eaf9b2-ac0a-4df0-8d8f-7bb371b4007b-ff95a5153d4f.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"The components of Geographic Information Systems.,The importance of digital maps for decision making and sustainability.,How to create vector, choropleth, and isarithimic maps from data classification techniques and symbology.,How to render a digital elevation models into a 3D images for viewshed and line of sight calculations.,How to communicate information through digital mapping.\",\"shortDescription\":\"This program explores the theory and art of map making, transformed by computer technology.\",\"productOverview\":\"$48\",\"objectId\":\"program-38eaf9b2-ac0a-4df0-8d8f-7bb371b4007b\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"98ad6cea-24a1-4926-8fc0-13de8dc1c1d1\",\"productName\":\"Statistics and Data Science (General Track)\",\"productSlug\":\"masters/micromasters/mitx-statistics-and-data-science-general-track\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/98ad6cea-24a1-4926-8fc0-13de8dc1c1d1-ca65fc53ddde.jpeg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Computer Science\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"Master the foundations of data science, data analysis, statistics, and machine learning.,Analyze big data and make data-driven predictions through probabilistic modeling and statistical inference; identify and deploy appropriate modeling and methodologies in order to extract meaningful information for decision making.,Develop and build machine learning algorithms to extract meaningful information from seemingly unstructured data; learn popular unsupervised learning methods, including clustering methodologies and supervised methods such as deep neural networks.,Understand the interplay between statistics and computation for the analysis of real data.,Finishing this MicroMasters program will prepare you for job titles such as: Data Scientist, Data Analyst, Business Intelligence Analyst, Systems Analyst, Data Engineer.\",\"shortDescription\":\"Master the skills needed to become an informed and effective practitioner of data science who adds value to your organization across industries.\",\"productOverview\":\"$49\",\"objectId\":\"program-98ad6cea-24a1-4926-8fc0-13de8dc1c1d1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"98ed1558-ab27-46d6-9d98-31b32fb3f592\",\"productName\":\"Statistics and Data Science (Methods Track)\",\"productSlug\":\"masters/micromasters/mitx-statistics-and-data-science-methods-track\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/98ed1558-ab27-46d6-9d98-31b32fb3f592-d82350317fae.jpeg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Computer Science\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"Master the foundations of data science, statistics, time series with interventions, and machine learning.,Analyze big data and make data-driven predictions through probabilistic modeling and statistical inference; identify and deploy appropriate modeling and methodologies in order to extract meaningful information for decision making.,Develop and build machine learning algorithms to extract meaningful information from seemingly unstructured data; learn popular unsupervised learning methods, including clustering methodologies and supervised methods such as deep neural networks.,Learn the methods for harnessing and analyzing data to answer questions of cultural, social, economic, and policy interest, and then assess that knowledge.,Finishing this MicroMasters program will prepare you for job titles such as: Data Scientist, Data Analyst, Business Intelligence Analyst, Systems Analyst, Data Engineer.\",\"shortDescription\":\"Master different data science methods such as time series analysis and machine learning that will enable you to conduct rigorous analysis, inform decision-making processes, and contribute to evidence-based practices across industries.\",\"productOverview\":\"$4a\",\"objectId\":\"program-98ed1558-ab27-46d6-9d98-31b32fb3f592\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"94340239-561b-49ce-b1fc-991a1ed4f227\",\"productName\":\"Statistics and Data Science (Social Sciences Track)\",\"productSlug\":\"masters/micromasters/mitx-statistics-and-data-science-social-sciences-track\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/94340239-561b-49ce-b1fc-991a1ed4f227-fe6eb31d8efc.jpeg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Computer Science\",\"Science\",\"Social Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"Master the foundations of data science, statistics, time series with interventions, and machine learning.,Analyze big data and make data-driven predictions through probabilistic modeling and statistical inference; identify and deploy appropriate modeling and methodologies in order to extract meaningful information for decision making.,Develop and build machine learning algorithms to extract meaningful information from seemingly unstructured data; learn popular unsupervised learning methods, including clustering methodologies and supervised methods such as deep neural networks.,Learn the methods for harnessing and analyzing data to answer questions of cultural, social, economic, and policy interest, and then assess that knowledge.,Finishing this MicroMasters program will prepare you for job titles such as: Data Scientist, Data Analyst, Business Intelligence Analyst, Systems Analyst, Data Engineer.\",\"shortDescription\":\"Master the skills needed to extract meaningful insights from social, cultural, economic, and policy-related data and equip you to tackle complex real-world problems and contribute to cutting-edge advancements.\",\"productOverview\":\"$4b\",\"objectId\":\"program-94340239-561b-49ce-b1fc-991a1ed4f227\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8a3643f1-b2a9-4e8c-9e27-1cd2d644867c\",\"productName\":\"Statistics and Data Science (Time Series and Social Sciences Track)\",\"productSlug\":\"masters/micromasters/mitx-statistics-and-data-science-time-series-and-social-sciences-track\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8a3643f1-b2a9-4e8c-9e27-1cd2d644867c-0f1ef3aab9d0.jpeg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Computer Science\",\"Social Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$4c\",\"shortDescription\":\"Master the skills needed to analyze the impact of interventions on time series data and their application roles where understanding temporal dynamics is crucial for informed decision-making and policy formulation.\",\"productOverview\":\"$4d\",\"objectId\":\"program-8a3643f1-b2a9-4e8c-9e27-1cd2d644867c\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2fc3236d-78a9-45a1-8c0c-fc290e74259e\",\"productName\":\"Supply Chain Management\",\"productSlug\":\"masters/micromasters/mitx-supply-chain-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/2fc3236d-78a9-45a1-8c0c-fc290e74259e-f3b970b5cd3a.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"To apply core methodologies (probability, statistics, optimization) used in supply chain modeling and analysis.,To understand and use fundamental models to make trade-offs between forecasting, inventory, and transportation.,To design supply chain networks as well as financial and information flows.,To understand how supply chains act as systems and interact.,How technology is used within supply chains from fundamentals to packaged software systems.,End to end supply chain management.\",\"shortDescription\":\"Earn a MicroMasters credential from MIT’s #1 ranked Supply Chain Management Program to advance your career.\",\"productOverview\":\"$4e\",\"objectId\":\"program-2fc3236d-78a9-45a1-8c0c-fc290e74259e\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":6,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"452d5bbb-00a4-4cc9-99d7-d7dd43c2bece\",\"productName\":\"Principles of Manufacturing\",\"productSlug\":\"masters/micromasters/mitx-principles-manufacturing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/452d5bbb-00a4-4cc9-99d7-d7dd43c2bece-7fa11c859de9.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Math\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"A new perspective for design and operational decision making at all levels of manufacturing, in the context of volume manufacturing, where rate, quality, cost and flexibility are the key metrics,How to operate and control unit processes to ensure maximum quality using basic and advanced statistical and feedback control methods,How to design and operate systems of processes with optimal capacity, resilience and inventory,How to design and operate optimal supply chain systems,The financial underpinnings of a manufacturing enterprise, including new ventures\",\"shortDescription\":\"Learn the principles of manufacturing: process control, production flow, supply chain and basic finance, from the world’s #1 ranked Mechanical Engineering department.\",\"productOverview\":\"$4f\",\"objectId\":\"program-452d5bbb-00a4-4cc9-99d7-d7dd43c2bece\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":8,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"18ff3b25-81ca-4324-b3da-425277a9ee02\",\"productName\":\"Data Analysis for Decision-Making\",\"productSlug\":\"certificates/professional-certificate/ritx-data-analysis-for-decision-making\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/18ff3b25-81ca-4324-b3da-425277a9ee02-bdfbb53cac23.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"How to apply critical thinking skills when working with data,How to use Microsoft Excel to organize and clean data and create a data analysis plan,Use Tableau to create meaningful tables and graphical representations to organize and visually present data,Identify key take away points from data analysis and integrate them with other important information,Critically assess graphical representations for accuracy and misrepresentation of data\",\"shortDescription\":\"\",\"productOverview\":\"$50\",\"objectId\":\"program-18ff3b25-81ca-4324-b3da-425277a9ee02\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"22afef9c-be9f-4e38-895e-80edaae17053\",\"productName\":\"Quantum 101: Quantum Computing \u0026 Quantum Internet\",\"productSlug\":\"certificates/professional-certificate/delftx-quantum-computing-and-quantum-internet\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/22afef9c-be9f-4e38-895e-80edaae17053-98bf9c3a9c9e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Physics\",\"Computer Science\",\"Engineering\",\"Science\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"The basics of four different physical implementations of qubits, the building blocks of a quantum computer: Silicon spin qubits, diamond NV center qubits, superconducting qubits, and topological qubits.,How best to interface classical control circuitry with a quantum processor.,Micro-architectures, compilers, and programming languages for a quantum processor.,Quantum error-correction for fault-tolerant quantum computing.,Quantum algorithms that can be run on a quantum processor (e.g. Grover's algorithm).,The quantum internet and its applications.\",\"shortDescription\":\"Learn how quantum computer works. Explore the scientific principles behind a quantum computer, and the software that operates it.\",\"productOverview\":\"$51\",\"objectId\":\"program-22afef9c-be9f-4e38-895e-80edaae17053\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4917ed9c-1095-43e6-bf6b-9c891ca8b979\",\"productName\":\"Sensor Fusion and Multi-Object Tracking\",\"productSlug\":\"certificates/professional-certificate/chalmersx-sensor-fusion-and-multi-object-tracking\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/4917ed9c-1095-43e6-bf6b-9c891ca8b979-0dd5585d0220.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Chalmers University of Technology\"],\"partnerKeys\":[\"ChalmersX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6233178f-b703-4c85-bcea-3b3c55ef9289-8c26535e6e82.png\",\"fullDescription\":\"Model common sensors, and their measurements.,Implement key nonlinear filters, to solve problems with motion and/or sensor models.,Principles, theory and algorithms in modern Multi-Object Tracking.,Solving various Multi-Object Tracking problems in practice.\",\"shortDescription\":\"Learn how to accurately position objects in traffic and how to track them, for self-driving vehicle applications.\",\"productOverview\":\"$52\",\"objectId\":\"program-4917ed9c-1095-43e6-bf6b-9c891ca8b979\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c32e3815-48b2-4dcb-8a7c-f8c937b75e98\",\"productName\":\"Side Channel Security – Transient Execution and Fault Attacks\",\"productSlug\":\"certificates/professional-certificate/tugrazx-side-channel-security-transient-execution-and-fault-attacks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c32e3815-48b2-4dcb-8a7c-f8c937b75e98-8d120a787e0d.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"Ability to find software and hardware design patterns that may expose secrets via transient execution.,Understand risks associated with transient-execution attacks and how these can be mitigated.,How hardware faults can be used in attacks.,How fault attacks on modern computers can be mitigated.\",\"shortDescription\":\"\",\"productOverview\":\"$53\",\"objectId\":\"program-c32e3815-48b2-4dcb-8a7c-f8c937b75e98\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f61408d0-7ecc-4067-aeaa-70593e6a4b7d\",\"productName\":\"Side Channel Security – Caches and Physical Attacks\",\"productSlug\":\"certificates/professional-certificate/tugrazx-side-channel-security-caches-and-physical-attacks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f61408d0-7ecc-4067-aeaa-70593e6a4b7d-df42d5197de2.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"Ability to spot side channels in hardware and software.,Ability to leak information with hardware and software side channels.,Understanding of concrete mitigation strategies in hardware and software.,In-depth knowledge of state-of-the-art cache side channels.\",\"shortDescription\":\"\",\"productOverview\":\"$54\",\"objectId\":\"program-f61408d0-7ecc-4067-aeaa-70593e6a4b7d\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e95de421-7f6c-4148-b2df-94d894160096\",\"productName\":\"Side Channel Security Basics\",\"productSlug\":\"certificates/professional-certificate/tugrazx-side-channel-security-basics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/e95de421-7f6c-4148-b2df-94d894160096-6bbccccb482c.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"Ability to spot side channels.,Ability to utilize side channels to leak information.,Understand how side channels can be mitigated.,High-level overview of side channel attacks in the real world and in computers.\",\"shortDescription\":\"\",\"productOverview\":\"$55\",\"objectId\":\"program-e95de421-7f6c-4148-b2df-94d894160096\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8b926013-4b68-482a-bf92-a0628fb344f1\",\"productName\":\"Probability/Random Variables\",\"productSlug\":\"certificates/professional-certificate/gtx-probability-random-variables\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8b926013-4b68-482a-bf92-a0628fb344f1-8f0cd49296ea.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Engineering\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"Review Bootcamp lessons based on set theory and calculus.,Understand underlying probability axioms.,Apply elementary probability counting rules, including permutations and combinations.,Become familiar with the concepts of independence and conditional probability.,Learn how to update probabilities via Bayes Rule.,Get introduced to discrete and continuous random variables.,Learn about the properties of random variables, including the expected value, variance, and moment generating function.,Study functions of random variables, and how they can be used in computer simulation applications.,Recognize joint(two-dimensional) random variables and how to extract marginal(one-dimensional) and conditional information from them.,Study the concepts of independence and correlation.,Work with the R statistical package.\",\"shortDescription\":\"Learn probability concepts that can be applied in your career\",\"productOverview\":\"$56\",\"objectId\":\"program-8b926013-4b68-482a-bf92-a0628fb344f1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f247e007-f92d-4748-944a-cef95ae95ac0\",\"productName\":\"Health Informatics on FHIR\",\"productSlug\":\"certificates/professional-certificate/gtx-health-informatics-on-fhir\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f247e007-f92d-4748-944a-cef95ae95ac0-f259d5deb3e7.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Health \u0026 Safety\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"The unique challenges of healthcare delivery in the US and the developed world,The potential of informatics based tools and systems to help solve these challenges,The impediments that have long existed to informatics adoption,The potential impact, technical details and current adoption of HL7’s new FHIR API including specific examples of its use for physicians and their patients; population and public health and research\",\"shortDescription\":\"Learn how web-based technologies are transforming the applications of informatics to patient care.\",\"productOverview\":\"$57\",\"objectId\":\"program-f247e007-f92d-4748-944a-cef95ae95ac0\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"51388127-01dd-4678-80c5-bbab5a8a69c2\",\"productName\":\"Food, Nutrition and Health\",\"productSlug\":\"certificates/professional-certificate/wageningenx-food-nutrition-and-health\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/51388127-01dd-4678-80c5-bbab5a8a69c2-0ef6676b35f0.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Food \u0026 Nutrition\",\"Health \u0026 Safety\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"How nutrition impacts health,Introduction to the field of nutrition and food,Basic chemistry and composition of food, their role in the body and their impact on health,How to better weigh and interpret the information overload about nutrition and health,Skills needed to effectively assess, design and implement dietary strategies and nutritional therapy at a basic level.\",\"shortDescription\":\"Learn the truth about food and nutrition to better assess, analyze and implement strategies to improve overall health.\",\"productOverview\":\"$58\",\"objectId\":\"program-51388127-01dd-4678-80c5-bbab5a8a69c2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5931b9af-b058-4612-9108-2301741a0740\",\"productName\":\"Essentials of Cybersecurity\",\"productSlug\":\"certificates/professional-certificate/uwashingtonx-essentials-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/5931b9af-b058-4612-9108-2301741a0740-925ffcadccf5.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"Describe the vast array of roles and sectors within the Cybersecurity industry;,Explain the relationship between management and technology in cybersecurity protection;,Identify appropriate types of security controls to the actions of different and evolving threat actors;,Apply terminology and basic concepts of cybersecurity;,Assess own knowledge, skill, and abilities toward identifying a career path in cybersecurity.\",\"shortDescription\":\"An introduction to the expanding world of cybersecurity and the opportunity to find your niche in this exciting, in-demand field.\",\"productOverview\":\"$59\",\"objectId\":\"program-5931b9af-b058-4612-9108-2301741a0740\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"83dea070-4bd4-423b-b500-1782185b5041\",\"productName\":\"Synthetic Aperture Radar (SAR): Applications\",\"productSlug\":\"certificates/professional-certificate/alaskax-synthetic-aperture-radar-sar-applications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/83dea070-4bd4-423b-b500-1782185b5041-7a95ab6491d2.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Physics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"Gain an intuitive understanding of SAR image and phase information.,The role of wavelength and signal polarization on SAR image content.,Use of interferometric SAR techniques to measure cm-scale surface deformation.,Analyze ecosystem parameters using polarimetric information.,Pick the optimal sensor wavelength and polarization for your application.,Use of SAR images and time series analysis to map hazards such as flooding and deforestation.,Use of interferometric SAR techniques to measure cm-scale surface deformation related to volcanic activity and landslides.,Use SAR data to map and monitor agriculture extent.,Apply SAR to map and assess forest degradation activities.,Techniques to measure above-ground forest biomass from spaceborne SAR observations.,Properties of different SAR sensor types.\",\"shortDescription\":\"Foundational knowledge of Synthetic Aperture Radar (SAR) remote sensing and earth observation including SAR imaging, SAR interferometry, and the concepts of polarimetric SAR.\",\"productOverview\":\"$5a\",\"objectId\":\"program-83dea070-4bd4-423b-b500-1782185b5041\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"88428e30-85ca-4478-91ae-a4980b8928c5\",\"productName\":\"Fintech: The Future of Finance\",\"productSlug\":\"certificates/professional-certificate/utaustinx-fintech-the-future-of-finance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/88428e30-85ca-4478-91ae-a4980b8928c5-774f0a9ea184.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"The University of Texas at Austin\"],\"partnerKeys\":[\"UTAustinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\",\"fullDescription\":\"After the completion of this certificate program, you will be an expert in the intersection of financial and technology.,How financial institutions create value and build competitive advantage using technology.,What machine learning is, and how it is used in finance.,What blockchain technology is, and how distributed ledgers will change financial markets.,The exciting world of APIs in finance, the latest hot area of fintech.\",\"shortDescription\":\"\",\"productOverview\":\"$5b\",\"objectId\":\"program-88428e30-85ca-4478-91ae-a4980b8928c5\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"14d282ad-3bae-4a42-94a9-8e39d239a978\",\"productName\":\"Telehealth: Strategy, Implementation, and Optimization\",\"productSlug\":\"xseries/stanfordonline-telehealth-strategy-implementation-and-optimization\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/14d282ad-3bae-4a42-94a9-8e39d239a978-1b4e78173fbf.jpg\",\"productType\":\"XSeries\",\"attributes\":[\"Health \u0026 Safety\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"Develop practical strategies and approaches to implementing telehealth in your organization.,Build an understanding of the clinical, operational, financial, and legal factors of telehealth delivery and utilization.,Enhance your ability to identify and overcome the risks and barriers of telehealth solutions, while exploring its potential.,Gain skills to effectively empower your organization in successfully implementing and optimizing telehealth delivery.\",\"shortDescription\":\"Empower your organization’s telehealth integration.\",\"productOverview\":\"$5c\",\"objectId\":\"program-14d282ad-3bae-4a42-94a9-8e39d239a978\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"149ce8de-48c4-4a33-9860-9f0f63cbfd4d\",\"productName\":\"Making a Difference\",\"productSlug\":\"certificates/professional-certificate/taux-making-a-difference\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/149ce8de-48c4-4a33-9860-9f0f63cbfd4d-801c785ee137.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Ethics\",\"Economics \u0026 Finance\",\"Health \u0026 Safety\"],\"partnerName\":[\"Tel Aviv University\"],\"partnerKeys\":[\"TAUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e337af8-3643-496e-be9e-fb91274a505d-19990d293b60.png\",\"fullDescription\":\"Analytical tools for evaluating what works and what doesn’t.,Frameworks for prioritizing different options for making a difference.,Concrete opportunities in promising cause areas you can contribute to.,Insights from philosophy, public health, economics, psychology, statistics and more.\",\"shortDescription\":\"\",\"productOverview\":\"$5d\",\"objectId\":\"program-149ce8de-48c4-4a33-9860-9f0f63cbfd4d\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"71009dcd-8849-408d-8d89-4d49f2efe577\",\"productName\":\"Fashion Design and Creation\",\"productSlug\":\"certificates/professional-certificate/hkpolyux-fashion-design-and-creation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/71009dcd-8849-408d-8d89-4d49f2efe577-e344f167f20a.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Design\",\"Art \u0026 Culture\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"How to use body measurements to make made to measure clothing,How to make patterns for specific garments,How to assemble garments,How to design fashion garments\",\"shortDescription\":\"Learn how to design and make clothes; pattern cutting and sewing, to a specific body shape, for men and women.\",\"productOverview\":\"$5e\",\"objectId\":\"program-71009dcd-8849-408d-8d89-4d49f2efe577\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e6f230ec-bafa-47d8-8a9a-9725dc772f02\",\"productName\":\"Foundations of Quantum Sensing\",\"productSlug\":\"certificates/professional-certificate/georgetownx-foundations-of-quantum-sensing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/e6f230ec-bafa-47d8-8a9a-9725dc772f02-81ac0e341c5c.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Math\",\"Physics\",\"Science\"],\"partnerName\":[\"Georgetown University\"],\"partnerKeys\":[\"GeorgetownX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/300a9275-e360-4599-92db-8c2222d5f614-712b2867e667.png\",\"fullDescription\":\"How to work with math as a practitioner, not a technician for calculus, vector calculus, complex variables, linear algebra, differential equations, and Fourier series.,What quantum superposition, the principal of complementarity, and quantum measurement are. How entanglement leads to bizarre phenomena, such as seeing something without having photons interact with them.,The formal developments of quantum mechanics employing an operator-based representation-independent formalism and the four fundamental operator identities.,The science behind how quantum mechanics is used to improve the accuracy of the laser interferometer gravitational wave observatory---humankind’s most accurate quantum sensor.\",\"shortDescription\":\"The program teaches the mathematics (in a physics context) needed for quantum mechanics, and the quantum mechanics needed for quantum sensing. It uses a novel approach that greatly reduces the math background needed to do this.\",\"productOverview\":\"\u003cp\u003eQuantum sensing is the most technologically advanced area of quantum information science. It also requires the most advanced prerequisites to enter. These two courses provide a foundation for further work in quantum information science. After completing this sequence (which must be taken in order), you will have the theoretical background for working in quantum sensing. The material is at the undergraduate level. It is condensed in two courses to allow you prepare faster for quantum sensing than other options currently available.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eThe material culminates in a description of the quantum mechanical ideas needed to make make laser interferometry gravitational observatory (LIGO) work---the most advanced quantum sensor in the world.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003e\u003ci\u003eThe program image is an Image of Peter Turk’s lecture at Imperial College courtesy of Geraldine Cox.\u003c/p\u003e\u003c/i\u003e\",\"objectId\":\"program-e6f230ec-bafa-47d8-8a9a-9725dc772f02\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f1f388ae-652f-4beb-baed-9b4f6e7375e2\",\"productName\":\"Unlocking Information Security\",\"productSlug\":\"certificates/professional-certificate/taux-unlocking-information-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f1f388ae-652f-4beb-baed-9b4f6e7375e2-d9ccd0e22070.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Tel Aviv University\",\"IsraelX\"],\"partnerKeys\":[\"TAUx\",\"IsraelX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e337af8-3643-496e-be9e-fb91274a505d-19990d293b60.png\",\"fullDescription\":\"The main concepts and technologies in the field of Information Security,A vast array of design, implementation and operational vulnerabilities,The principles of secure computer systems,Ways to take part in the design and implementation of secure computer systems,How to identify situations that should involve information security considerations and make informed decisions about them\",\"shortDescription\":\"When it comes to cyber attacks, the best medicine is prevention. Learn the fundamentals of vulnerabilities, exploits, cryptography, network and web offense and defense.\",\"productOverview\":\"$5f\",\"objectId\":\"program-f1f388ae-652f-4beb-baed-9b4f6e7375e2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9e795e05-0baf-420a-8bdf-63fba1e91a82\",\"productName\":\"Análisis y Visualización de Datos con Excel\",\"productSlug\":\"certificates/professional-certificate/delftx-analisis-y-visualizacion-de-datos-con-excel\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/9e795e05-0baf-420a-8bdf-63fba1e91a82-23d2b26fd719.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Computer Science\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"Dominar las principales tareas del análisis de datos requerido por las organizaciones conducidas por los datos,Superar los desafíos del análisis de datos aprendiendo técnicas y métodos avanzados en Excel,Visualizar datos y crear tableros en vivo que respondan a las preguntas de la organización,Cómo obtener información valiosa basada en los datos que pueda ser usada en la toma de decisiones dentro de una organización,Implementar herramientas y técnicas de análisis de datos usadas para la toma de decisiones,Maximizar los beneficios de las planillas de cálculo para la visualización y el análisis de datos\",\"shortDescription\":\"Aprende a efectuar análisis de datos usando Excel. Domina las principales tareas del análisis de datos requeridas por las organizaciones para la toma de decisiones.\",\"productOverview\":\"$60\",\"objectId\":\"program-9e795e05-0baf-420a-8bdf-63fba1e91a82\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ad919488-848b-42a2-938d-1b88792699f2\",\"productName\":\"Data Analysis for Life Sciences\",\"productSlug\":\"certificates/professional-certificate/harvardx-data-analysis-for-life-sciences\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ad919488-848b-42a2-938d-1b88792699f2-0e48ae6ac307.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Biology \u0026 Life Sciences\",\"Science\",\"Math\",\"Computer Science\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"Basic statistical concepts and R programming skills for analyzing data in the life sciences.,The underlying math of linear models useful for data analysis in the life sciences.,The techniques used to perform statistical inference on high-throughput and high-dimensional data.,Several techniques widely used in the analysis of high-dimensional data.\",\"shortDescription\":\"Learn how to analyze life sciences data using the R programming language.\",\"productOverview\":\"$61\",\"objectId\":\"program-ad919488-848b-42a2-938d-1b88792699f2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b130a119-fa23-4b75-8b0f-c3d3fff6d0c2\",\"productName\":\"Developing Blockchain-Based Identity Applications\",\"productSlug\":\"certificates/professional-certificate/linuxfoundationx-developing-blockchain-based-identity-applications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/b130a119-fa23-4b75-8b0f-c3d3fff6d0c2-e981de6747f2.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"Understand the problems with existing Internet identity/trust mechanisms today and learn how a distributed ledger, such as Hyperledger Indy, can be used for identity.,Discuss the purpose, scope, and relationship between Aries, Indy, and Ursa and understand how these open source blockchain technologies provide reliable self-sovereign identity solutions that add a necessary layer of trust to the Internet.,Understand the Aries architecture and its components, as well as the DIDComm protocol for peer-to-peer messages.,Deploy instances of Aries agents and establish a connection between two or more Aries agents.,Create from scratch or extend Aries agents to add business logic and understand the possibilities available through the implementation of Aries agents.\",\"shortDescription\":\"Create identity-focused blockchain applications that will enhance user privacy and data protection, and make the Internet safer.\",\"productOverview\":\"$62\",\"objectId\":\"program-b130a119-fa23-4b75-8b0f-c3d3fff6d0c2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"db95c932-e043-4651-99a0-70e9b3813053\",\"productName\":\"Post-Baccalaureate Certificate in Cybersecurity Penetration Testing\",\"productSlug\":\"certificate/maryville-university-post-baccalaureate-certificate-in-cybersecurity-penetration-testing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/db95c932-e043-4651-99a0-70e9b3813053-1042bddc2271.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Gain a comprehensive understanding of effective and ethical cybersecurity regulations, policies, and best practices to keep your organization’s most critical information secure.\",\"objectId\":\"program-db95c932-e043-4651-99a0-70e9b3813053\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a01fd02d-701f-4d4f-8626-79ce5447d9d9\",\"productName\":\"Undergraduate Certificate in Cybersecurity\",\"productSlug\":\"certificate/maryville-university-undergraduate-certificate-in-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/a01fd02d-701f-4d4f-8626-79ce5447d9d9-27c111b659dc.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$63\",\"objectId\":\"program-a01fd02d-701f-4d4f-8626-79ce5447d9d9\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6df6ba68-faa1-407f-b985-58035a2b85ef\",\"productName\":\"Undergraduate Certificate in User Experience\",\"productSlug\":\"certificate/maryville-university-undergraduate-certificate-in-user-experience\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6df6ba68-faa1-407f-b985-58035a2b85ef-6a2eddbc384a.jpg\",\"productType\":\"Certificate\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$64\",\"objectId\":\"program-6df6ba68-faa1-407f-b985-58035a2b85ef\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8108acb8-930f-41d9-aa2b-a5ff607d9bcc\",\"productName\":\"Essential quantitative business skills\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-essential-quantitative-business-skills\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8108acb8-930f-41d9-aa2b-a5ff607d9bcc-7572bc14706f.jpeg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\",\"Language\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"You will develop your capacity for quantitative analysis to solve optimization problems.,You will use statistical techniques for data analysis and forecasting of variables in the business environment.,You will analyze the performance of a company from the information contained in its financial statements.,You will gain knowledge about data science and how to apply it in business as a business analyst.\",\"shortDescription\":\"Gain a solid foundation of essential quantitative skills in math, financial accounting, statistics, and data analysis to succeed as a successful decision maker in your professional career\",\"productOverview\":\"$65\",\"objectId\":\"program-8108acb8-930f-41d9-aa2b-a5ff607d9bcc\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d11f12b5-6373-4a27-8057-139e85a08bdd\",\"productName\":\"Human-Computer Interaction\",\"productSlug\":\"certificates/professional-certificate/gtx-human-computer-interaction\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d11f12b5-6373-4a27-8057-139e85a08bdd-e57a2f67508e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$66\",\"shortDescription\":\"Learn the principles and methods behind good user interface and experience design through human-computer interaction.\",\"productOverview\":\"$67\",\"objectId\":\"program-d11f12b5-6373-4a27-8057-139e85a08bdd\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4ba65623-8afb-4383-92f8-7b7d8774c364\",\"productName\":\"English for Doing Business in Asia\",\"productSlug\":\"certificates/professional-certificate/hkustx-english-for-doing-business-in-asia\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/4ba65623-8afb-4383-92f8-7b7d8774c364-dba6f0606411.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Humanities\",\"Business \u0026 Management\",\"Language\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"Use a range of vocabulary and expressions that are commonly used in business English and in business communication.,Plan, research, and structure written and spoken texts appropriate to the needs of specific audiences.,Prepare informative and persuasive written and spoken texts relevant to a business context in Asia.,Develop an understanding of cross-cultural issues, style, and genre for business communication purposes.\",\"shortDescription\":\"Introducing strategies for developing your spoken and written English communication skills in the context of doing business in Asia.\",\"productOverview\":\"$68\",\"objectId\":\"program-4ba65623-8afb-4383-92f8-7b7d8774c364\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"51330509-72dd-45dd-a0f9-d5afdebd84b8\",\"productName\":\"Water \u0026 Drainage in Agriculture\",\"productSlug\":\"certificates/professional-certificate/wageningenx-water-and-drainage-in-agriculture\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/51330509-72dd-45dd-a0f9-d5afdebd84b8-860eee8b804a.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Environmental Studies\",\"Energy \u0026 Earth Sciences\",\"Engineering\",\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"Understand to include various water users and uses and their respective spatial levels, from farm, to scheme, to river basin, both upstream and downstream.,Explain the allocation, distribution, governance and use of both groundwater and surface water and apply the basic principles of estimating irrigation water requirements.,Understand the relation between water technologies, management, governance \u0026 policy.,Analyse the interrelations between institutional and infrastructural designs for sustainable water management in agriculture.,Understand the concept of drainage and its role in agricultural water management and design drainage systems that enable more operational control.\",\"shortDescription\":\"Want to help prepare your community in feeding the growing population in spite of the changing climate? Join the #1 Agricultural University and learn to optimise water governance and technologies for effective irrigation \u0026 drainage systems in agriculture.\",\"productOverview\":\"$69\",\"objectId\":\"program-51330509-72dd-45dd-a0f9-d5afdebd84b8\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ea3337d3-765d-4129-9d5b-d8e9a88cef49\",\"productName\":\"Fundamentos de la Construcción 4.0\",\"productSlug\":\"certificates/professional-certificate/javerianax-fundamentos-de-la-construccion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ea3337d3-765d-4129-9d5b-d8e9a88cef49-41460cd501d4.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\",\"Architecture\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"A reconocer las tecnologías y metodologías aplicadas a la industria AECO que vienen transformando los procesos en las distintas fases del ciclo de vida de los proyectos constructivos.,Adopción de un pensamiento crítico y un conocimiento más amplio frente a la toma de decisiones que involucren nuevas tecnologías y metodologías en proyectos constructivos en el contexto internacional.,A explorar e identificar el significado y los desafíos de la implementación e inmersión en una cultura digital para la industria de la construcción.\",\"shortDescription\":\"Aprende los conceptos básicos del impacto y la transformación que la cuarta revolución industrial trae para la Industria AECO.\",\"productOverview\":\"$6a\",\"objectId\":\"program-ea3337d3-765d-4129-9d5b-d8e9a88cef49\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"50be63a5-57f3-4bec-aa26-a9e53bd0ca45\",\"productName\":\"Design et Évaluation UX\",\"productSlug\":\"masters/micromasters/hecmontrealx-design-et-evaluation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/50be63a5-57f3-4bec-aa26-a9e53bd0ca45-0d52fb1c4135.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Computer Science\",\"Design\",\"Social Sciences\",\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Math\",\"Business \u0026 Management\"],\"partnerName\":[\"HEC Montréal\"],\"partnerKeys\":[\"HECMontrealX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/79da26e5-dbaf-400a-906c-33c51b87ea83-d1826ad9c521.png\",\"fullDescription\":\"Concevoir des interfaces professionnelles offrant des expériences utilisateur de qualité;,Développer de l'empathie et des connaissances fortes (“insights”) à l'aide du Web analytique et des méthodes qualitatives et quantitatives;,Tirer parti des “insights” tirés des données afin de proposer des recommandations empiriques;,Produire des prototypes de maquettes low-tech et des interfaces interactives de haute fidélité; et,Exécuter des évaluations formelles en laboratoire pour tous les tests utilisateurs, y compris les tests de conformité.\",\"shortDescription\":\"Apprenez à concevoir, prototyper et tester des expériences numériques centrées sur l'utilisateur, et propulsez votre carrière avec l'un des domaines d'expertise les plus en demande aujourd'hui!\",\"productOverview\":\"$6b\",\"objectId\":\"program-50be63a5-57f3-4bec-aa26-a9e53bd0ca45\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":7,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"225e0f8d-0c1c-4307-8e72-aa4cb2ccece9\",\"productName\":\"Python aplicado a la Ciencia de Datos\",\"productSlug\":\"certificates/professional-certificate/anahuacx-python-aplicado-a-la-ciencia-de-datos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/225e0f8d-0c1c-4307-8e72-aa4cb2ccece9-48ce5cced01e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\",\"Economics \u0026 Finance\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"Aprenderás a utilizar el lenguaje Python para la recolección, limpieza, preparación y visualización de datos.,Comprenderás el uso de diferentes algoritmos y métodos matemáticos para realizar modelos que te llevarán a analizar mejor un conjunto de datos.,Aprenderás los conceptos de redes neuronales, así como su construcción y entrenamiento para identificar y clasificar datos de manera autónoma.\",\"shortDescription\":\"\",\"productOverview\":\"$6c\",\"objectId\":\"program-225e0f8d-0c1c-4307-8e72-aa4cb2ccece9\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6867dd98-bd65-441a-9067-39553f12d1e1\",\"productName\":\"Fundamentos de Ciberseguridad: Protección de Datos\",\"productSlug\":\"certificates/professional-certificate/anahuacx-fundamentos-de-ciberseguridad\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6867dd98-bd65-441a-9067-39553f12d1e1-aab2c3c14405.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"Reconocerás la historia y los conceptos fundamentales de la ciberseguridad.,Aplicarás buenas prácticas para identificar vulnerabilidades en los sistemas informáticos.,Conocerás las diferentes prácticas para gestionar el control de acceso, autenticación, cortafuegos y detección de amenazas.,Entenderás los fundamentos de criptografía para la protección de datos.,Ampliarás tu perspectiva del futuro de la ciberseguridad y la vinculación de nuevas tecnologías.\",\"shortDescription\":\"Aprende las estrategias y herramientas de vanguardia utilizadas para la seguridad de la información de las organizaciones contra los diversos tipos de ciberataques.\",\"productOverview\":\"$6d\",\"objectId\":\"program-6867dd98-bd65-441a-9067-39553f12d1e1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ff8009d5-e1fb-4976-b7e5-fd6667d308fe\",\"productName\":\"Herramientas TIC para la educación\",\"productSlug\":\"certificates/professional-certificate/upvalenciax-herramientas-tic-para-la-educacion\",\"productImageUrl\":\"https://images.ctfassets.net/ii9ehdcj88bc/52uE0Uf9yvAs84lgLxGkRH/3b42362ddddbb286f87e1c6e5ee00273/Herramientas_TIC_para_la_educacio__n__1_.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Social Sciences\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"A encontrar contenidos disponibles en Internet que permiten crear nuevas experiencias de enseñanza-aprendizaje y fomentar el trabajo colaborativo gracias al uso de las herramientas educativas en el proceso de aprendizaje.,Te daremos las pautas para crear una comunicación increíblemente eficaz, tanto profesor-alumno como alumno-alumno.,El aprendizaje con tecnología es multi-plataforma y multi-dispositivo, y se extiende más allá del aula, incluso de una forma global y en este certificado te mostraremos algunos ejemplos de ello.,Aprenderás a buscar en Internet de forma eficaz.,Te enseñaremos a diseñar presentaciones eficaces con PowerPoint de Microsoft.\",\"shortDescription\":\"Conoce las herramientas tecnológicas que te permitirán crear nuevas experiencias de enseñanza-aprendizaje y crear una comunicación increíblemente eficaz en el proceso educativo.\",\"productOverview\":\"$6e\",\"objectId\":\"program-ff8009d5-e1fb-4976-b7e5-fd6667d308fe\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c8967abd-af1d-432e-822e-315561332bc2\",\"productName\":\"Docencia digital\",\"productSlug\":\"certificates/professional-certificate/anahuacx-docencia-digital\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c8967abd-af1d-432e-822e-315561332bc2-26ea6b7f9969.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"A identificar las competencias digitales indispensables para tu práctica docente, además de reconocer la estructura y características de las principales modalidades de educación mediada por tecnología.,Diseñar una planeación didáctica por competencias.,Los principios básicos del diseño instruccional en línea.,Reconocer la aplicación con fines didácticos de herramientas tecnológicas emergentes (realidad virtual, realidad aumentada, redes sociales, whatsapp y podcast, entre otras).,Diseñar e implementar cursos y materias en línea, además reconocer los procesos de gestión de un entorno virtual de aprendizaje.\",\"shortDescription\":\"Aprende a conceptualizar, planificar y diseñar tus cursos incorporando en tu práctica docente, estrategias, medios y recursos propios de la educación mediada por tecnología.\",\"productOverview\":\"$6f\",\"objectId\":\"program-c8967abd-af1d-432e-822e-315561332bc2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"32dfc869-b599-46d6-9272-fe467a5862f2\",\"productName\":\"E-Leadership: liderazgo en la Era Virtual\",\"productSlug\":\"certificates/professional-certificate/anahuacx-e-leadership-liderazgo-en-la-era-virtual\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/32dfc869-b599-46d6-9272-fe467a5862f2-bfedd6f80e8f.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Social Sciences\",\"Business \u0026 Management\",\"Humanities\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"Conocerás las teorías clásicas del liderazgo, su contexto histórico, características e implicaciones.,Comprenderás el liderazgo digital desde sus orígenes, así como definiciones, elementos y principales características.,Aprenderás a identificar los principales medios que intervienen en el ejercicio del liderazgo a través de medios virtuales.,Entenderás cómo la motivación, la comunicación y los medios usados juegan un papel importante en el ejercicio del E-Leadership.,Identificarás los retos y capitalizarás las oportunidades de adaptabilidad que se abren en el mundo digital post-CoVid19 que está generando nuevos modelos de negocio.\",\"shortDescription\":\"Este programa contempla cursos que le permitirán al estudiante hacer un recorrido descriptivo por las principales corrientes del liderazgo, sus definiciones y características, para comprender sus alcances y aplicaciones.\",\"productOverview\":\"$70\",\"objectId\":\"program-32dfc869-b599-46d6-9272-fe467a5862f2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c31378a9-5d2d-4d16-ad3c-72984c425881\",\"productName\":\"e-Learning: crea actividades y contenidos para la enseñanza virtual\",\"productSlug\":\"masters/micromasters/galileox-e-learning-crea-actividades-y-contenidos-para-la-ensenanza-virtual\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c31378a9-5d2d-4d16-ad3c-72984c425881-6d536c69549b.jpg\",\"productType\":\"MicroMasters\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Humanities\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"Diseñar experiencias e-Learning innovadoras apoyadas y enriquecidas por el uso de tecnología, centradas en el proceso de aprendizaje del estudiante.,Diseñar y producir recursos de enseñanza virtual de forma profesional.,Utilizar herramientas web 2.0 para generar cursos online y los diferentes métodos y técnicas para introducir estos recursos en tus cursos de formación e-Learning.,Crear tus propios recursos multimedia interactivos para apoyar el proceso de formación o capacitación virtual en instituciones educativas o empresas.,Utilizar las técnicas y herramientas de creación rápida de contenidos (Rapid Learning) líderes en la industria de producción de contenidos educativos digitales.,Aplicar el uso de innovadoras Tecnologías educativas en contextos de aprendizaje y formación, para poder crear recursos y contenidos de apoyo para clases presenciales.\",\"shortDescription\":\"Haz eLearning efectivo para capacitación en organizaciones; educación superior y educación media.\",\"productOverview\":\"$71\",\"objectId\":\"program-c31378a9-5d2d-4d16-ad3c-72984c425881\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c94bbd5a-3cb5-41ba-adcf-6777a222180e\",\"productName\":\"Gestión de la protección de datos personales en línea\",\"productSlug\":\"certificates/professional-certificate/javerianax-gestion-de-la-proteccion-de-datos-personales-en-linea\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c94bbd5a-3cb5-41ba-adcf-6777a222180e-dd364f2c2e04.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Engineering\",\"Computer Science\",\"Communication\",\"Law\",\"Business \u0026 Management\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"Historia, principios, posiciones y aproximaciones a la protección de datos y nociones fundamentales de privacidad y protección de datos.,Interrelación entre la protección de datos personales y privacidad y Protección de datos personales en el ecosistema digital.,Conceptos básicos y elementos comunes de las leyes de protección de datos aplicados a la tecnología.,Concepto de gobernanza de protección de datos personales y temas y cuestiones clave de protección de datos para quienes formulan políticas públicas en el entorno online.,Desafíos de quienes aplican las normas de protección de datos.,Aspectos corporativos y organizacionales de la gobernanza de datos personales para abordar los desafíos que las organizaciones enfrentan al momento de cumplir con leyes y regulaciones locales.,Tendencias y tenciones de la protección de datos en la era digital.\",\"shortDescription\":\"Con este programa entenderá los conceptos de privacidad y protección de datos, además de los principios para el tratamiento de datos personales.\",\"productOverview\":\"$72\",\"objectId\":\"program-c94bbd5a-3cb5-41ba-adcf-6777a222180e\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9eb749a7-01fb-40e6-9c89-8beab32dcc0c\",\"productName\":\"Calidad de información para sus productos\",\"productSlug\":\"certificates/professional-certificate/logycax-calidad-de-informacion-para-sus-productos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/9eb749a7-01fb-40e6-9c89-8beab32dcc0c-04c177bb5ed6.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\",\"Engineering\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"Trazabilidad: podrá conocer y aplicar el estándar global de identificación de productos y servicios.,Comunicación: entenderá la importancia de la alineación y sincronización de información con sus socios de negocio.,Tecnología: conocerá tendencias de captura y gestión automática de la información.,Ventas: alineará la información de sus productos para comerciar en grandes superficies.\",\"shortDescription\":\"Este programa permite conocer el uso del código de barras para comercializar a nivel global sus productos. La captura de atributos y la incorporación del modelo global de datos mejorando la calidad de la información logística para aumentar ventas.\",\"productOverview\":\"$73\",\"objectId\":\"program-9eb749a7-01fb-40e6-9c89-8beab32dcc0c\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8d6cc219-5806-4c11-b010-c3cc14a6181c\",\"productName\":\"Habilidades cuantitativas esenciales en finanzas, negocios y ciencia de datos\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-habilidades-cuantitativas-esenciales-en-finanzas-negocios-y-ciencia-de-datos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/8d6cc219-5806-4c11-b010-c3cc14a6181c-38a5532fc491.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Economics \u0026 Finance\",\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"Desarrollarás tu capacidad de análisis cuantitativo para la solución de problemas de optimización.,Utilizarás técnicas estadísticas para el análisis de datos, inferencia y pronóstico de variables en el entorno empresarial.,Analizarás el desempeño de una empresa a partir de la información contenida en sus estados financieros.,Obtendrás conocimientos sobre la ciencia de datos y cómo aplicarla en los negocios.\",\"shortDescription\":\"Habilidades cuantitativas esenciales en finanzas, negocios y ciencia de datos\",\"productOverview\":\"$74\",\"objectId\":\"program-8d6cc219-5806-4c11-b010-c3cc14a6181c\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f0e8972d-b442-487b-920e-c2a8b0bcac1d\",\"productName\":\"Ciencia de Datos\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-ciencia-de-datos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f0e8972d-b442-487b-920e-c2a8b0bcac1d-a5fa0d1b73ce.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"Comprender y analizar los diferentes tipos de sistemas de información y datos usados en las organizaciones.,Aplicar metodologías para la analítica de datos y ciencia de datos para apoyar la inteligencia de negocios en la organización.,Proponer soluciones apoyadas en los datos, adecuadas a las necesidades específicas de la organización para la mejor utilización y optimización de los recursos de la empresa.,Consolidar las habilidades de análisis de información; manejo de bases de datos y visualización de datos y storytelling aplicando técnicas de vanguardia para desarrollar una propuesta de inteligencia de negocios para una organización.\",\"shortDescription\":\"Aprende cómo los datos, denominados el nuevo oro negro, están transformando la estrategia en los negocios. Conoce cómo aplicar la ciencia de datos dentro de las organizaciones.\",\"productOverview\":\"$75\",\"objectId\":\"program-f0e8972d-b442-487b-920e-c2a8b0bcac1d\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cd7cbe53-bc35-479f-921a-d04c3896c1b1\",\"productName\":\"Sustentabilidad energética y la smart grid\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-sustentabilidad-energetica-y-la-smart-grid\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/cd7cbe53-bc35-479f-921a-d04c3896c1b1-2372ad9464f7.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Science\",\"Engineering\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"Aprende los fundamentos de la energía eléctrica.,Sustentabilidad energética y la smart grid.,Aplicar, en un circuito eléctrico, los conceptos básicos de la energía.,Comprobar el funcionamiento de los circuitos eléctricos.,Analizar la manera en que la energía eléctrica puede ser transportada a través de la red general de transmisión.,Examinar la transmisión de energía a través de casos típicos, diseños y parámetros predefinidos de líneas de transmisión.,Distinguir las características básicas que conforman una smart grid en sus principales etapas.,Analizar la topología de una red eléctrica convencional y una red inteligente desde la generación hasta el consumo de energía; para que comprendas cómo se administra una red inteligente con sistemas de comunicaciones, control y monitoreo remoto.,Aplicar las bases teóricas de las redes eléctricas inteligentes a partir de cálculos experimentales de generación de energía convencional, eólica y solar; para que comprendas el funcionamiento de una red inteligente.\",\"shortDescription\":\"Aprende fundamentos de la energía eléctrica, su impacto en el cambio climático y el futuro del sector con la smart grid.\",\"productOverview\":\"$76\",\"objectId\":\"program-cd7cbe53-bc35-479f-921a-d04c3896c1b1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"969d24c9-a916-4718-83ea-45ad2400bd7a\",\"productName\":\"Habilidades cuantitativas esenciales en economía y estadística\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-habilidades-cuantitativas-esenciales-en-economia-y-estadistica\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/969d24c9-a916-4718-83ea-45ad2400bd7a-75d47b4ca7ad.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"Analizarás e interpretarás los principales componentes del pensamiento económico aplicados al ambiente global de negocios y que soportan los procesos de toma de decisiones basados en los resultados obtenidos a lo largo del tiempo.,Aprenderás los fundamentos del pensamiento algorítmico, estructuras de datos y los principios básicos de programación con aplicación a los negocios.,Desarrollarás la habilidad de construir modelos de regresión lineal y de pronósticos aplicados al entorno de los negocios y su toma de decisiones usando técnicas estadísticas.\",\"shortDescription\":\"Obtén una base sólida en habilidades cuantitativas esenciales en pensamiento económico, algorítmica básica y modelos de regresión lineal y pronósticos, para tener éxito como un mejor tomador de decisiones en tu trayectoria profesional.\",\"productOverview\":\"$77\",\"objectId\":\"program-969d24c9-a916-4718-83ea-45ad2400bd7a\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ec0dd14f-8003-4eb6-992f-6ec256fd1ccc\",\"productName\":\"Transformación digital como estrategia de negocios e innovación\",\"productSlug\":\"certificates/professional-certificate/tecdemonterreyx-transformacion-digital-como-estrategia-de-negocios-e-innovacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ec0dd14f-8003-4eb6-992f-6ec256fd1ccc-23792a0009ff.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"Ampliar tus conocimientos sobre el entorno y retos que enfrentan las industrias actualmente y cómo están haciéndole frente para prosperar.,Identificaras estrategias y las grandes tendencias de innovación tecnológica que están ayudando a las empresas a lograr su transformación digital.,Desarrollarás las competencias necesarias para hacerle frente a los cambios tecnológicos en la actualidad.,Diagnosticar tu estado actual y hoja de ruta que permitirá identificar el estado actual y el deseado ante la necesidad de transformarte digitalmente.\",\"shortDescription\":\"Identifica nuevas oportunidades para trasformar tu organización mediante la incorporación de tendencias digitales innovadoras\",\"productOverview\":\"$78\",\"objectId\":\"program-ec0dd14f-8003-4eb6-992f-6ec256fd1ccc\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cdba015c-7433-409b-ad01-f5dd8b9fc151\",\"productName\":\"Diseño de prototipos digitales para proyectos sociales\",\"productSlug\":\"xseries/urosariox-diseno-de-prototipos-digitales-para-proyectos-sociales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/cdba015c-7433-409b-ad01-f5dd8b9fc151-dc898b021630.jpeg\",\"productType\":\"XSeries\",\"attributes\":[\"Design\",\"Social Sciences\",\"Business \u0026 Management\",\"Electronics\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"Establecer una ruta de prototipado para consolidar tus estrategias con enfoque social.,Aplicar técnicas basadas en Protothinking®️ para definir, empatizar, explorar, validar y levar tus ideas a la acción.,Comprender las tecnologías de punta en el contexto de la revolución 4.0 e identificar la gestión de proyectos tecnológicos.,Identificar el uso enfocado de la plataforma Glide para el desarrollo de aplicaciones celulares, Build, la tarjeta de desarrollo Photon, y Google Sheets como base de datos básica para desarrollar prototipos funcionales en IoT.,Integrar las diferentes plataformas para la implementación de una solución integral IoT.\",\"shortDescription\":\"Crea soluciones tecnológicas a través de Protothinking ® y la implementación de prototipos funcionales, genera valor a tus proyectos sociales e influye positivamente en las personas y sus comunidades.\",\"productOverview\":\"$79\",\"objectId\":\"program-cdba015c-7433-409b-ad01-f5dd8b9fc151\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d36c6584-ee92-4e61-be62-af148d7aa9fd\",\"productName\":\"Comunicación estratégica para negocios digitales\",\"productSlug\":\"certificates/professional-certificate/anahuacx-comunicacion-estrategica-para-negocios-digitales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d36c6584-ee92-4e61-be62-af148d7aa9fd-230c571926fc.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Communication\",\"Business \u0026 Management\",\"Computer Science\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"Identificar los elementos que intervienen en la comunicación digital interactiva a partir del análisis del público objetivo de cada espacio de interactividad digital así como del comportamiento del usuario.,Implementar planes de trabajo interdisciplinario a partir de integrar una visión entre el desarrollo web, la comunicación estratégica y el marketing digital.,Diseñar campañas digitales que integren planificación de la imagen corporativa, desarrollo de Kpis, plan de marketing y relaciones públicas para beneficio de SEO en los motores de búsqueda web y de redes sociales.,Elaborar proyectos para la construcción de modelos de negocio digitales como el e-commerce, basado en la atención y la necesidad sociocultural.\",\"shortDescription\":\"\",\"productOverview\":\"$7a\",\"objectId\":\"program-d36c6584-ee92-4e61-be62-af148d7aa9fd\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"46e80c69-7bcb-4db4-974d-c49a4b678581\",\"productName\":\"Fundamentos de investigación en ciencias de la salud\",\"productSlug\":\"masters/micromasters/rosariox-fundamentos-de-investigacion-en-ciencias-de-la-salud\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/46e80c69-7bcb-4db4-974d-c49a4b678581-0ed2bd3c646a.png\",\"productType\":\"MicroMasters\",\"attributes\":[\"Medicine\",\"Data Analysis \u0026 Statistics\",\"Math\",\"Ethics\",\"Biology \u0026 Life Sciences\",\"Science\",\"Social Sciences\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"Identificar paradigmas de investigación para la formulación de un proyecto de investigación en áreas de la medicina y ciencias de la salud.,Conocer y aplicar métodos de investigación cualitativos y cuantitativos.,Identificar estándares éticos de práctica profesional y del ejercicio investigativo, evidenciando valores, principios, conocimiento legales y virtudes.\",\"shortDescription\":\"Aprenda de una forma flexible competencias para plantear y desarrollar un proyecto de investigación en el que participan personas y comunidades, y comparta la visión del proceso investigativo aplicado a las ciencias de la salud.\",\"productOverview\":\"$7b\",\"objectId\":\"program-46e80c69-7bcb-4db4-974d-c49a4b678581\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":5,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7e42795f-4c1c-4413-ad26-f07105a70aba\",\"productName\":\"Análisis de datos para la toma de decisiones empresariales\",\"productSlug\":\"certificates/professional-certificate/galileox-analisis-de-datos-para-la-toma-de-decisiones-empresariales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/7e42795f-4c1c-4413-ad26-f07105a70aba-9cb1e9050b66.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"Fortalecer tus capacidad de análisis, interpretación, y manejo de información para tomar decisiones empresariales y obtener mejores resultados,Realizar un análisis aplicado de datos en Microsoft Excel e interpretar los resultados a través de las diferentes gráficas generadas,Aplicar la técnica de análisis factorial para la segmentación de mercados,Comprender el análisis conjunto considerando características multi atributos para diseñar productos,Interpretar los fenómenos que ocurren en las empresas y prever los que ocurrirán para apoyar la gestión general de esta, proporcionándole una ventaja competitiva\",\"shortDescription\":\"Aprende a interpretar datos estadísticos para la toma de decisiones empresariales utilizando las herramientas Excel y SPSS.\",\"productOverview\":\"$7c\",\"objectId\":\"program-7e42795f-4c1c-4413-ad26-f07105a70aba\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"247dc6ed-9d56-4230-8188-1222ed831ae2\",\"productName\":\"Logística para micro y pequeñas empresas - MYPES\",\"productSlug\":\"certificates/professional-certificate/logycax-logistica-para-micro-y-pequenas-empresas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/247dc6ed-9d56-4230-8188-1222ed831ae2-8891ec20b7d1.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"Por qué pensar en logística es primordial para la gestión de la cadena de suministro y el desarrollo de mi empresa a largo plazo.,uáles son las metodologías para diseñar y planear procesos de almacenamiento, gestión de compras, control de inventarios, transporte y marketing de mi empresa.,Cómo ejecutar de manera eficiente e innovadora el flujo de información, materias primas y buenas prácticas logísticas sostenibles para la venta de productos terminados.,Cómo distribuir productos a menor costo posible y con la calidad requerida.\",\"shortDescription\":\"Aprende cómo hacer tu empresa exitosa a través de procesos logísticos efectivos. Al emprender y gerenciar una micro y pequeña empresa - MYPE, necesitarás entender la importancia de la logística.\",\"productOverview\":\"$7d\",\"objectId\":\"program-247dc6ed-9d56-4230-8188-1222ed831ae2\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6fc75bf5-7447-4aec-9aa4-e418bca52d26\",\"productName\":\"Introducción a la programación en C\",\"productSlug\":\"certificates/professional-certificate/uamx-introduccion-a-la-programacion-en-c\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6fc75bf5-7447-4aec-9aa4-e418bca52d26-b6f52d792d2b.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Science\"],\"partnerName\":[\"Universidad Autónoma de Madrid\"],\"partnerKeys\":[\"UAMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/daf114d3-0909-4991-8dc0-10c319ee8687-cfb543208a6c.png\",\"fullDescription\":\"Declarar variables, trabajar con caracteres y utilizar operadores,Declarar tablas, definir estructuras y trabajar con cadenas de caracteres,Utilizar condiciones y bucles para modificar el flujo de control de los programas,Leer y escribir información en archivos de texto,Definir funciones, declarar funciones, utilizar argumentos para hacer programas modulares y bien estructurados,Resolver problemas genéricos de programación\",\"shortDescription\":\"Aprende a programar en C, uno de los lenguajes más utilizados a nivel empresarial para crear software de sistemas y aplicaciones.\",\"productOverview\":\"$7e\",\"objectId\":\"program-6fc75bf5-7447-4aec-9aa4-e418bca52d26\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"406e6acd-3c72-46b0-80f0-13b3038095ae\",\"productName\":\"Programa Profesional en Logística 4.0. Fundamentos y Aplicaciones en Python\",\"productSlug\":\"certificates/professional-certificate/javieranax-programa-profesional-en-logistica-40-fundamentos-y-aplicaciones-en-python\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/406e6acd-3c72-46b0-80f0-13b3038095ae-55fc07831c1e.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"Entender los principales conceptos, tecnologías y aplicaciones asociados a la logística 4.0 y cómo esta ha evolucionado a lo largo de los últimos años impactando a diversas industrias.,Identificar las tecnologías que integran la logística 4.0 y sus aplicaciones en el contexto empresarial.,Diseñar un modelo que permita medir la madurez de una organización para implementar tecnologías de la logística 4.0.,Aprender marcos de referencia asociados a la gestión de cambio que debe ser desarrollada a nivel empresarial para apalancar un programa de transformación digital.,Conocer y usar los elementos fundamentales de la programación en Python para la aplicación de analítica de negocios.\",\"shortDescription\":\"\",\"productOverview\":\"$7f\",\"objectId\":\"program-406e6acd-3c72-46b0-80f0-13b3038095ae\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1e166246-f690-42ea-a286-38788785a462\",\"productName\":\"Model-Based Systems Engineering - MBSE\",\"productSlug\":\"certificates/professional-certificate/israelx-model-based-systems-engineering\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/1e166246-f690-42ea-a286-38788785a462-f9c64a3c4281.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Engineering\",\"Science\"],\"partnerName\":[\"IsraelX\",\"Technion\"],\"partnerKeys\":[\"IsraelX\",\"Technion\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"Identifying and defining objects, processes, and states in a system and the structural and procedural relations among them,Modeling the system’s top-level diagram with its function, beneficiary, benefit, stakeholders, and enables - agents and instruments,Modeling various kinds of systems, including technological, natural, and complex socio-technical systems,Managing system complexity by using refinement-abstraction mechanisms of in-zooming - out-zooming, unfolding - folding, and state expression - suppression\",\"shortDescription\":\"Tame product complexity with Model-Based Systems Engineering\",\"productOverview\":\"$80\",\"objectId\":\"program-1e166246-f690-42ea-a286-38788785a462\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"32d1dede-a945-4c6b-beac-14fef3dd7179\",\"productName\":\"Epidemics-Origins, Spread, Control and Communication\",\"productSlug\":\"certificates/professional-certificate/hku-epidemics-origins-spread-control-and-communication\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/32d1dede-a945-4c6b-beac-14fef3dd7179-51d73e4373a5.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\",\"Science\"],\"partnerName\":[\"The University of Hong Kong\"],\"partnerKeys\":[\"HKUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5024b547-2d68-4bfd-9e9e-1e5f96c13375-c9b5e39fb8af.png\",\"fullDescription\":\"Demonstrate knowledge of the origins, spread and control of infectious disease epidemics.,Demonstrate understanding of the importance of effective communication about epidemics.,Demonstrate understanding of key contemporary issues relating to epidemics from a global perspective.\",\"shortDescription\":\"\",\"productOverview\":\"$81\",\"objectId\":\"program-32d1dede-a945-4c6b-beac-14fef3dd7179\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":4,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f7a3edfa-9de6-4471-bc8d-b87e4cb0f05e\",\"productName\":\"Liderazgo y Comunicación en Equipos híbridos y remotos\",\"productSlug\":\"certificates/professional-certificate/upvalenciax-liderazgo-y-comunicacion-en-equipos-hibridos-y-remotos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f7a3edfa-9de6-4471-bc8d-b87e4cb0f05e-b735f3bd7e7a.png\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"Comprender cómo los entornos digitales afectan a las etapas de construcción de los equipos.,Cooperar activamente con otras personas en los espacios remotos.,Aplicar diferentes estilos de liderazgo en entornos digitales adaptados al perfil de colaboradores.,Ser capaz de crear representaciones del conocimiento (p.e. mapas mentales, diagramas, “rich pictures” y modelos visuales) utilizando medios digitales.,Decidir cuándo y cómo dar feedback/feedforward en entornos digitales.\",\"shortDescription\":\"Mejora tus habilidades para trabajar en equipo y liderarlo en un entorno remoto.\",\"productOverview\":\"$82\",\"objectId\":\"program-f7a3edfa-9de6-4471-bc8d-b87e4cb0f05e\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"04e59d90-d7a3-48bb-a1f6-603982989153\",\"productName\":\"Internet de las cosas (IoT), Big Data y sus aplicaciones\",\"productSlug\":\"certificates/professional-certificate/urosariox-internet-de-las-cosas-iot-big-data-y-sus-aplicaciones\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/04e59d90-d7a3-48bb-a1f6-603982989153-7520b8752338.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Health \u0026 Safety\",\"Computer Science\",\"Engineering\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"Qué es internet de las cosas, estructura general y aplicación en el ámbito industrial,Entender y utilizar tarjetas de programación, sensores para obtener información de los objetos u/o ambientes cotidianos y el manejo de actuadores de forma remota,Configuración de plataformas de desarrollo gráfico y principales protocolos de comunicación,Almacenamiento y Gestión de información por medio de diferentes gestores y tipos de bases de datos,Desarrollar aplicaciones bajo la tecnología de IoT que impactan la industria\",\"shortDescription\":\"Aprende a diseñar, construir y programar soluciones IoT con el uso del Big Data. Fortalece tu perfil profesional de una manera integral, aprenderás a desarrollar sistemas IoT completos y escalables con una perspectiva global.\",\"productOverview\":\"$83\",\"objectId\":\"program-04e59d90-d7a3-48bb-a1f6-603982989153\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"390dba30-75d7-4b57-859c-30abd1433885\",\"productName\":\"Inteligencia de negocios\",\"productSlug\":\"certificates/professional-certificate/galileox-inteligencia-de-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/390dba30-75d7-4b57-859c-30abd1433885-e7dfae347f13.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"Cómo usar Excel y Power BI para análisis de datos,Cómo recuperar, extraer y manejar data valiosa para transformarla en datos de valor e información relevante,Cómo visualizar, depurar, interpretar, analizar y usar datos (datos puros y gráficas),Cuál es el proceso de decision making y cómo usar un sistema de soporte de decisiones,Comprender herramientas, procesos y técnicas de análisis de datos y tecnologías asociadas a la Inteligencia empresarial,Aplicar estadística descriptiva e inferencial e las empresas y estimar intervalos de confianza en una empresa o negocio y entender la mecánica del análisis de regresión,Calcular y aplicar las medidas estadísticas de tendencia central y aplicar la distribución de probabilidad continua\",\"shortDescription\":\"Aprende a transformar big data en decisiones empresariales acertadas. Aprende sobre Business Intelligence. Usa herramientas como Excel y Power BI para la toma de decisiones empresariales.\",\"productOverview\":\"$84\",\"objectId\":\"program-390dba30-75d7-4b57-859c-30abd1433885\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5efc18db-7453-4d4f-a67b-a7113c97eeb1\",\"productName\":\"Desarrollo y gestión de proyectos informáticos\",\"productSlug\":\"certificates/professional-certificate/uamx-desarrollo-y-gestion-de-proyectos-informaticos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/5efc18db-7453-4d4f-a67b-a7113c97eeb1-ae37590c4df5.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Business \u0026 Management\"],\"partnerName\":[\"Universidad Autónoma de Madrid\"],\"partnerKeys\":[\"UAMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/daf114d3-0909-4991-8dc0-10c319ee8687-cfb543208a6c.png\",\"fullDescription\":\"Conceptos básicos y principios de la Ingeniería del Software. Métodos y herramientas. Fundamentos de actividades y técnicas de gestión y desarrollo que cubren el ciclo de vida de sistemas. Notaciones, técnicas, métodos y herramientas para realizarlo.,Destrezas para reducir el coste y mejorar la calidad de los procesos y productos software.,A identificar los motivos más frecuentes de fracasos de proyectos software y aprender técnicas y métodos para prevenirlos. Capacidad de identificar, evaluar y gestionar los riesgos potenciales asociados que pudieran presentarse.,Habilidades para liderar y motivar a un grupo, cooperar en un equipo de trabajo y comunicarse transmitiendo los conceptos y mensajes deseados. Coordinarse eficazmente para conseguir el éxito del proyecto y la satisfacción de los involucrados.,Comunicar tanto en forma escrita como en forma oral, con propiedad y corrección, las ideas propias y las reflexiones particulares y grupales, así como los resultados de un proyecto informático.\",\"shortDescription\":\"Aprende a gestionar de manera eficiente y a participa con éxito en cualquier fase de desarrollo de un proyecto informático\",\"productOverview\":\"$85\",\"objectId\":\"program-5efc18db-7453-4d4f-a67b-a7113c97eeb1\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6cadc23a-e2f5-4a89-bb9c-7ce90d4f9554\",\"productName\":\"Inteligencia Artificial aplicada a los negocios\",\"productSlug\":\"certificates/professional-certificate/anahuacx-inteligencia-artificial-aplicada-a-los-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/6cadc23a-e2f5-4a89-bb9c-7ce90d4f9554-891351386061.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"Aprenderás qué es la inteligencia artificial mediante diferentes ejemplos abordando casos de negocios.,Conocerás las nuevas metodologías para encontrar el propósito de tu negocio y aplicar las soluciones de IA adecuadas.,Entenderás la importancia de los datos para el desarrollo e implementación de tecnologías como ciencia de datos e inteligencia artificial en tu industria.,Implementarás herramientas de la inteligencia artificial que ejemplificarán su uso en los negocios.\",\"shortDescription\":\"\",\"productOverview\":\"$86\",\"objectId\":\"program-6cadc23a-e2f5-4a89-bb9c-7ce90d4f9554\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":2,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ad6dc919-ed21-460d-a539-cf0c0d0bcff3\",\"productName\":\"Fundamentos de Inteligencia Artificial\",\"productSlug\":\"certificates/professional-certificate/ibm-fundamentos-de-inteligencia-artificial\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ad6dc919-ed21-460d-a539-cf0c0d0bcff3-4a7277430835.jpg\",\"productType\":\"Professional Certificate\",\"attributes\":[\"Computer Science\",\"Design\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"Comprender los conceptos básicos de la Inteligencia Artificial (IA), sus aplicaciones y casos de uso, y cómo está transformando nuestras vidas.,Identificar varios servicios de inteligencia artificial de Watson de IBM y para qué se pueden utilizar.,Describir cómo funciona la tecnología del chatbot con inteligencia artificial y sus aplicaciones.,Experimentar interacciones prácticas con varios entornos y aplicaciones de IA.,Crear e implementar un chatbot habilitado para IA en un sitio web, sin ningún tipo de codificación.\",\"shortDescription\":\"\",\"productOverview\":\"$87\",\"objectId\":\"program-ad6dc919-ed21-460d-a539-cf0c0d0bcff3\",\"productSource\":\"edX\",\"productCategory\":\"Program\",\"activeRunKey\":null,\"childCoursesCount\":3,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null}]},{\"productType\":\"Course\",\"categoryLabel\":\"Courses\",\"products\":[{\"productUuid\":\"1d806edf-67a7-47c1-aa89-012702eba0d8\",\"productName\":\"Information Technology (IT) Fundamentals for Everyone\",\"productSlug\":\"learn/computer-science/ibm-information-technology-it-fundamentals-for-everyone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1d806edf-67a7-47c1-aa89-012702eba0d8-a5fc18765bdd.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$88\",\"shortDescription\":\"\u003cp\u003eBuild the job-ready IT and non-technical IT skills in just six weeks. Plus, gain practical experience you can discuss in the interviews. No prior IT experience is required.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eJob-ready IT skills non-technical project professionals need in just 6 weeks, supported by practical experience employers look for on a resume and an industry-recognized credential. \u003c/li\u003e\\n\u003cli\u003eThe essentials of operating systems, computer components, programming concepts, databases, and the difference between commercial and open software. \u003c/li\u003e\\n\u003cli\u003eThe importance of computer networks, including wired and wireless connections; explore network resources and storage types in MS Windows. \u003c/li\u003e\\n\u003cli\u003eHow to protect against security threats, address public browsing security concerns, and list password management best practices. \u003c/li\u003e\\n\u003cli\u003eThe benefits of cloud computing and an understanding of the cloud infrastructure layer, virtual machines, and the features of ticketing systems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1d806edf-67a7-47c1-aa89-012702eba0d8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0110EN+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"14933db8-d32f-4eb5-bb77-f62aa5363e00\",\"productName\":\"Introduction to Information Technology and AWS Cloud\",\"productSlug\":\"learn/computer-science/amazon-web-services-introduction-to-information-technology-and-aws-cloud\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/14933db8-d32f-4eb5-bb77-f62aa5363e00-fa7759aac86e.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Amazon Web Services\"],\"partnerKeys\":[\"AWS\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/31705519-3082-4c18-aa23-1caf9a038b1c-21ab36bd68bc.png\",\"fullDescription\":\"\u003cp\u003eTechnology is omnipresent, but how did we get here? And what does the future hold for a world that's increasingly connected, mobile and data-rich? This course is to give learners enough technical context to understand how to build solutions in the cloud starting from zero technical knowledge. Before diving into the cloud, we will cover the basics of: how do computers work (including software and operating systems), an introduction to information technology, the basics of modern IT infrastructure, and the cloud careers that will be increasingly in-demand. We will then move into the world of internet connected networks (the Internet), covering local hosts, web servers, web applications, web security, the interworkings of a Website and the differences between static and dynamic content. We'll close the course by introducing Cloud Computing; it's role in our world, the differences between public, private and hybrid and why APIs are so important.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eTechnology is omnipresent, but how did we get here? And what does the future hold for a world that's increasingly connected, mobile and data-rich? This course is to give learners enough technical context to understand how to build solutions in the cloud starting from zero technical knowledge.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eGain a foundational understanding of how computers work\u003c/li\u003e\\n\u003cli\u003eLearn how computers talk to each other to exchange data\u003c/li\u003e\\n\u003cli\u003eReview how companies run their business by networking computers together to solve problems\u003c/li\u003e\\n\u003cli\u003eUnderstand the basics of modern IT infrastructure\u003c/li\u003e\\n\u003cli\u003eDescribe traditional IT roles\u003c/li\u003e\\n\u003cli\u003eOperating Systems, including software file systems, processes and threads\u003c/li\u003e\\n\u003cli\u003eDescribe how virtualization works and the different types\u003c/li\u003e\\n\u003cli\u003eThe connectedness of networking and the Internet\u003c/li\u003e\\n\u003cli\u003eExplain the different types of environments (dev, prod, and test)\u003c/li\u003e\\n\u003cli\u003eMaster web servers, applications and the anatomy of a website\u003c/li\u003e\\n\u003cli\u003eLearn DNS and Internet Security basics\u003c/li\u003e\\n\u003cli\u003eBecome familiar with cloud computing, including IaaS, PaaS, and SaaS\u003c/li\u003e\\n\u003cli\u003eReview the AWS Cloud and why APIs are important\u003c/li\u003e\\n\u003cli\u003eKnow the in-demand cloud roles and the skills required to start a career in information technology\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-14933db8-d32f-4eb5-bb77-f62aa5363e00\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AWS+CTC-IT-Basics+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"61161cb7-c3b1-49e5-b5f0-d9e57b16b6f2\",\"productName\":\"VITARA - Information Technology and Data Management\",\"productSlug\":\"learn/economics-finance/the-international-monetary-fund-vitara-information-technology-and-data-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/61161cb7-c3b1-49e5-b5f0-d9e57b16b6f2-c7540eecf71c.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"The International Monetary Fund\"],\"partnerKeys\":[\"IMFx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a655d538-b1e8-4f66-a99d-cf4682d2c17b-111a45d036cc.png\",\"fullDescription\":\"\u003cp\u003eThis module opens by explaining how information technology (IT) can help achieve a tax administration's goals and the role of executives in managing and overseeing IT resources. The module highlights the evolution of IT from a back-office function to a strategic driver of reforms and modernization. Among other concepts, it explores digital transformation and the automation of an integrated business process model. The module provides tools for integrating IT into reform planning and prioritizing IT investments, and includes broad overviews of contemporary IT operations, governance arrangements, and management practices. Building from insights into IT, the module explains how to understand, manage, and use data to improve tax administration performance. The module closes with an overview of information security.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis module opens by explaining how information technology (IT) can help achieve a tax administration's goals and the role of executives in managing and overseeing IT resources.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon completion of this course, participants should be able to: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExplain why IT is important in tax administration and how it can help to achieve goals. \u003c/li\u003e\\n\u003cli\u003eRecognize practical concepts and tools to help shape IT strategies and deliver reforms. \u003c/li\u003e\\n\u003cli\u003eIdentify modern digital principles and important features of digital tax administration. \u003c/li\u003e\\n\u003cli\u003eDefine aspects of tax administration IT governance and key IT management practices. \u003c/li\u003e\\n\u003cli\u003eRecognize the importance of data in tax administration and data management practices. \u003c/li\u003e\\n\u003cli\u003eDescribe information security concepts, typical challenges, and mitigation measures.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-61161cb7-c3b1-49e5-b5f0-d9e57b16b6f2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IMFx+ITDx+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"08750473-e8bc-4a52-bb8a-22d1274a2696\",\"productName\":\"IT Fundamentals for Business Professionals: Enterprise Systems\",\"productSlug\":\"learn/information-systems/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-enterprise-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/08750473-e8bc-4a52-bb8a-22d1274a2696-c72ada93cafe.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$89\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn the fundamentals of Information Systems in a corporate environment\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course you'll learn: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eFundamentals of office packages (word processor, spreadsheet, presentations and database manager)\u003c/li\u003e\\n\u003cli\u003eThe basic technical aspects of e-mail and conference systems.\u003c/li\u003e\\n\u003cli\u003eOperating System fundamentals\u003c/li\u003e\\n\u003cli\u003eOperation of web browsers and Internet technologies\u003c/li\u003e\\n\u003cli\u003eBasic description of various business applications (Business Intelligence, ERP, CRM, GIS, SCM, DMS, EDI ....)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-08750473-e8bc-4a52-bb8a-22d1274a2696\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d4aa0e1a-a7b2-402b-9540-091e974f6151\",\"productName\":\"IT Fundamentals for Business Professionals: Cybersecurity and social implications\",\"productSlug\":\"learn/cybersecurity/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-cybersecurity-and-social-implications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d4aa0e1a-a7b2-402b-9540-091e974f6151-8282c60294a9.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$8a\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn about cybersecurity, careers, and social implications of IT\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course you will learn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe effects of ICT in processes such as globalization, e-commerce, business strategy, competition and outsourcing, among others\u003c/li\u003e\\n\u003cli\u003eCybersecurity concepts related to intellectual property, privacy, hackers; threats and how to defend us against them.\u003c/li\u003e\\n\u003cli\u003eThe phenomenon of Web 2.0 and social networks\u003c/li\u003e\\n\u003cli\u003eThe different professional careers that can be chosen in the world of IT\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d4aa0e1a-a7b2-402b-9540-091e974f6151\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.5x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6b450c1e-d803-4140-82a8-a0a4006c34ab\",\"productName\":\"IT Fundamentals for Business Professionals: Hardware\",\"productSlug\":\"learn/information-technology/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-hardware\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6b450c1e-d803-4140-82a8-a0a4006c34ab-d5d1e2bf4aa5.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$8b\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn the fundamentals of hardware in Information Systems\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eYou will learn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComputer peripherals and telecommunications and network devices\u003c/li\u003e\\n\u003cli\u003eFunctions carried out by computer hardware, communications hardware and network hardware\u003c/li\u003e\\n\u003cli\u003eClient /server architectures\u003c/li\u003e\\n\u003cli\u003eWireless communication devices (mobile, satellite, GPS)\u003c/li\u003e\\n\u003cli\u003eDigital representation of information (text, numbers, multimedia) and use of the binary system\u003c/li\u003e\\n\u003cli\u003eLocal and Enterprise Area Network Architectures\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6b450c1e-d803-4140-82a8-a0a4006c34ab\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8fc64063-9b8e-4c8e-ab00-aae7898a7d9f\",\"productName\":\"IT Fundamentals for Business Professionals: Software development\",\"productSlug\":\"learn/software-development/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-software-development\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8fc64063-9b8e-4c8e-ab00-aae7898a7d9f-9942e0522d27.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$8c\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn the fundamentals of software development\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eYou will learn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eTools and methods for software development\u003c/li\u003e\\n\u003cli\u003eConcepts about the life cycle in systems development.\u003c/li\u003e\\n\u003cli\u003eRoles and functions in the management of software projects\u003c/li\u003e\\n\u003cli\u003eDifferent methods for the processing of information (lots, real time ...)\u003c/li\u003e\\n\u003cli\u003eDesign of user interfaces.\u003c/li\u003e\\n\u003cli\u003eDevelopment and motivation of standards in software.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8fc64063-9b8e-4c8e-ab00-aae7898a7d9f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.3x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f30fbd27-46af-4ce3-935a-104fe2c6b9c8\",\"productName\":\"IT Fundamentals for Business Professionals: Programming\",\"productSlug\":\"learn/computer-programming/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-programming\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f30fbd27-46af-4ce3-935a-104fe2c6b9c8-1c4459a85331.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$8d\",\"shortDescription\":\"\u003cp\u003eWorking with Information Technology (IT) without the necessary background? Learn the fundamentals of software programming\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eYou will learn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe syntax and programming structures (pseudo code)\u003c/li\u003e\\n\u003cli\u003eThe logic behind the creation of computer programs\u003c/li\u003e\\n\u003cli\u003eHow Object-Oriented Programming works\u003c/li\u003e\\n\u003cli\u003eThe most important types and data structures\u003c/li\u003e\\n\u003cli\u003eWhat are the most common file types\u003c/li\u003e\\n\u003cli\u003eHow databases are managed\u003c/li\u003e\\n\u003cli\u003eThe bases of the SQL language\u003c/li\u003e\\n\u003cli\u003eWhat are data warehousing and data mining\u003c/li\u003e\\n\u003cli\u003eBasics of web technologies (HTML, XML, CSS, javascript)\u003c/li\u003e\\n\u003cli\u003eBasic design and analysis guidelines in web pages development\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f30fbd27-46af-4ce3-935a-104fe2c6b9c8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+ISC101.4x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"11748849-1cf7-44fb-9d08-6ca7bf8f6c72\",\"productName\":\"Global Media, War, and Technology\",\"productSlug\":\"learn/war-and-conflict/the-university-of-queensland-global-media-war-and-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/11748849-1cf7-44fb-9d08-6ca7bf8f6c72-11a2923c55df.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Social Sciences\"],\"partnerName\":[\"The University of Queensland\"],\"partnerKeys\":[\"UQx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8554749f-b920-4d7f-8986-af6bb95290aa-f336c6a2ca11.png\",\"fullDescription\":\"$8e\",\"shortDescription\":\"\u003cp\u003eExplore the intersection of information technology, violent conflict, and resistance.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe history and evolution of global media technology as it relates to conflict\u003c/li\u003e\\n\u003cli\u003eThe major themes and trends of global media in times of war\u003c/li\u003e\\n\u003cli\u003eApplication of the history and major themes of global media to current issues\u003c/li\u003e\\n\u003cli\u003eSkills to be a critical media consumer\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-11748849-1cf7-44fb-9d08-6ca7bf8f6c72\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UQx+MEDIAWARx+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5aedd74e-bd8c-4828-8b10-4bdab15df7d3\",\"productName\":\"Cyber Risk Supervision\",\"productSlug\":\"learn/economics/the-international-monetary-fund-cyber-risk-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5aedd74e-bd8c-4828-8b10-4bdab15df7d3-b8543912f234.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"The International Monetary Fund\"],\"partnerKeys\":[\"IMFx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a655d538-b1e8-4f66-a99d-cf4682d2c17b-111a45d036cc.png\",\"fullDescription\":\"\u003cp\u003eAs the reliance of the financial sector on Information Technology and the interconnectedness of systems continue to rise, cybersecurity has become a financial stability risk. Financial supervisors need to understand the nature of the risk, learn the essential concepts of cyber risk management, and acquire basic skills needed for effective regulation and supervision.\u003c/p\u003e\\n\u003cp\u003eTo this end, the course will lay out the cyber risk landscape for financial institutions, core principles of sound risk management based on the understanding of IT architectures, and approaches to regulations and effective supervisory practices. Course developed with the financial support of the Financial Sector Stability Fund (FSSF) and the Government of Japan.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAs the reliance of the financial sector on Information Technology and the interconnectedness of systems continue to rise, cybersecurity has become a financial stability risk. Financial supervisors need to understand the nature of the risk, learn the essential concepts of cyber risk management, and acquire basic skills needed for effective regulation and supervision.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon completion of this course, participants should be able to: Demonstrate an understanding of the cyber threat landscape Identify key drivers of cyber risk Explain approaches to cyber risk management Assess risk management practices Understand the concepts in framing cyber risk regulations Learn elements of cyber risk supervision Identify key situations that require expert supervision\u003c/p\u003e\",\"objectId\":\"course-5aedd74e-bd8c-4828-8b10-4bdab15df7d3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IMFx+CRSx+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"04736418-d7e3-4063-89d6-42e7704f9bb1\",\"productName\":\"Data Analytics and Visualization in Health Care\",\"productSlug\":\"learn/data-analysis/rochester-institute-of-technology-data-analytics-and-visualization-in-health-care\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/04736418-d7e3-4063-89d6-42e7704f9bb1-b506fd9a42c3.jpg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\",\"Medicine\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"$8f\",\"shortDescription\":\"\u003cp\u003eLearn best practices in data analytics, informatics, and visualization to gain literacy in data-driven, strategic imperatives that affect all facets of health care.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify current forces disrupting today's health care industry\u003c/li\u003e\\n\u003cli\u003eSummarize current health care trends and their impact on cost, quality, and patient engagement\u003c/li\u003e\\n\u003cli\u003eDescribe health informatics' role in clinical workflow and patient engagement\u003c/li\u003e\\n\u003cli\u003eIdentify components of health information technology\u003c/li\u003e\\n\u003cli\u003eExplain the importance interoperability in health care analytics\u003c/li\u003e\\n\u003cli\u003eSummarize data collection, processing, and analysis best practices\u003c/li\u003e\\n\u003cli\u003eExplore the implications of artificial intelligence on extraction and analysis of complex data sets\u003c/li\u003e\\n\u003cli\u003eInterpret data analysis results from a visualization example\u003c/li\u003e\\n\u003cli\u003eIdentify visualization best practices\u003c/li\u003e\\n\u003cli\u003ePrepare a simple data visualization using health care data\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-04736418-d7e3-4063-89d6-42e7704f9bb1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+DVH600x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a808ea9e-4c95-4f66-b134-8552bb069364\",\"productName\":\"Teach kids computing: Computing systems and networks\",\"productSlug\":\"learn/teacher-training/raspberry-pi-foundation-teach-kids-computing-computing-systems-and-networks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a808ea9e-4c95-4f66-b134-8552bb069364-cc4781117e85.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Computer Science\"],\"partnerName\":[\"Raspberry Pi Foundation\"],\"partnerKeys\":[\"RaspberryPiFoundation\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0d58600d-bb5f-4036-b222-b770d238331a-f11f10a8cbbc.png\",\"fullDescription\":\"$90\",\"shortDescription\":\"\u003cp\u003eIncrease your knowledge of computing systems and networks, and plan how you will teach young people about them in this course from the Raspberry Pi Foundation.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOver the following 3 weeks, you will learn the basics of computing systems and networks and how to teach the concepts and skills involved to young people.\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIn week 1, you will explore how you can help young learners identify information technology and how to introduce them to the input–process–output (IPO) model of computer systems, which describes how data moves through a system.\u003c/li\u003e\\n\u003cli\u003eIn week 2, you will investigate how computers can be connected to networks, including the internet, and why the internet and the web are different things. You'll also think about how you can relate networks to your learners' everyday lives.\u003c/li\u003e\\n\u003cli\u003eIn week 3, you will analyse computer systems that consist of many devices working together. You'll also discover how you can help your learners to use the internet safely as responsible digital citizens.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a808ea9e-4c95-4f66-b134-8552bb069364\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RaspberryPiFoundation+RPFPCSN+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"16ec8ca9-4679-4a8d-af80-862cd278f1a3\",\"productName\":\"Innovation and Technology Management in Tourism and Hospitality\",\"productSlug\":\"learn/tourism-management/the-hong-kong-polytechnic-university-innovation-and-technology-management-in-tourism-and-hospitality\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/16ec8ca9-4679-4a8d-af80-862cd278f1a3-0a0e781e974c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"\u003cp\u003eGain an in-depth understanding of the strategic applications of ICT (information and communication technologies) innovations in the hospitality and tourism industry.\u003c/p\u003e\\n\u003cp\u003eYou will learn about the roles of ICT infrastructures and tools in shaping business environment, business models, marketing practices, revenue strategies, and customer services.\u003c/p\u003e\\n\u003cp\u003eWe will also discuss the dynamics that is generated in the development of ICTs and its impact on hospitality and tourism organizations.\u003c/p\u003e\\n\u003cp\u003eNote that this course is priced at USD $278.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn about information and communication technologies [ICTs] and innovations in the hotel and tourism industries.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDevelop a holistic view of the various knowledge and theories of ICT and innovation management applicable to the hospitality and tourism industry\u003c/li\u003e\\n\u003cli\u003eAppraise, analyze and evaluate the general impact and applications of ICTs on various sectors in the hospitality and tourism industry\u003c/li\u003e\\n\u003cli\u003eCritically assess the relationship between the hospitality and tourism industry and its technological macro-environment\u003c/li\u003e\\n\u003cli\u003eIdentify and provide leadership at work in relation to information, technology and innovation management\u003c/li\u003e\\n\u003cli\u003eEvaluate and implement appropriate ICT and innovation management theories to support hospitality and tourism organizations in enhancing their business\u003c/li\u003e\\n\u003cli\u003eCommunicate and react proactively to industry stakeholders including staff, travelers, government and commercial organizations in the area of ICTs and innovation\u003c/li\u003e\\n\u003cli\u003eUnderstand the application of big data analytics for better decision-making in the context of hospitality and tourism industry.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-16ec8ca9-4679-4a8d-af80-862cd278f1a3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+HTM540x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a7f1e3cc-898d-4ee0-90d2-2f0b489e2346\",\"productName\":\"Health Informatics for better and safer healthcare\",\"productSlug\":\"learn/health-informatics/israelx-health-informatics-for-better-and-safer-healthcare\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a7f1e3cc-898d-4ee0-90d2-2f0b489e2346-a610d27ba35a.jpg\",\"productType\":\"Course\",\"attributes\":[\"Health \u0026 Safety\",\"Medicine\",\"Computer Science\"],\"partnerName\":[\"IsraelX\"],\"partnerKeys\":[\"IsraelX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"\u003cp\u003eHealthcare providers around the globe (e.g., doctors, nurses, physical or occupational therapists, etc.) are increasingly relying on health information technology, like electronic health records, for their daily routine tasks. Although using health information technology holds tremendous promises (like personalized and precision medicine to all) it can also result in unforeseen consequences leading to patients’ harm. To fulfill the promise of better and safer carethrough information technology, health providers need to learn about the existing systems design and capabilities while technical experts (e.g., computer programmers) need to understand the complex healthcare needs and processes. This course aims to bridge the current gaps in health informatics education and introduce the major aspects of the field to novice and advanced clinical and technical audiences. Health \u0026amp; Safety, Medicine, Computer Science\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn when and how Informatics is used in different fields of healthcare, what the benefits are and the challenges that still lie ahead.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eWhat kinds of careers are out there in Health Information Technology? \u003c/p\u003e\\n\u003cp\u003eWhat are the core disciplines on which Health Information technology is built? \u003c/p\u003e\\n\u003cp\u003eHow does Clinical Decision Support work? \u003c/p\u003e\\n\u003cp\u003eWhat is the Electronic Health Record comprised of, and how does it work? \u003c/p\u003e\\n\u003cp\u003eWhat do we need Health Terminologies for? \u003c/p\u003e\\n\u003cp\u003eHow is Text and Data Mining used in Healthcare? \u003c/p\u003e\\n\u003cp\u003eWhat type of Image Processing is used to make health imagery usable? \u003c/p\u003e\\n\u003cp\u003eWhat happens when Health Information Systems have low usability? \u003c/p\u003e\\n\u003cp\u003eHow is patient’s safety warranted by Health Information Systems?\u003c/p\u003e\",\"objectId\":\"course-a7f1e3cc-898d-4ee0-90d2-2f0b489e2346\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+Bhealthcare+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b468d306-f1d5-4fe8-af38-95ccc6ebe6d3\",\"productName\":\"Freedom of Expression and Information in the Time of Globalization: Advanced Course\",\"productSlug\":\"learn/globalization/columbia-university-freedom-of-expression-and-information-in-the-time-of-globalization-advanced-course\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b468d306-f1d5-4fe8-af38-95ccc6ebe6d3-d7ec2c55f9b4.jpg\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Social Sciences\"],\"partnerName\":[\"Columbia University\"],\"partnerKeys\":[\"ColumbiaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\",\"fullDescription\":\"$91\",\"shortDescription\":\"Learn about the diverse challenges to freedom of expression and access to information brought about by the technology revolution of the last two decades.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eThe impact of the Information technology revolution on the exercise of, and the global standards related to, freedom of expression and information.\u003c/li\u003e\\r\\n\u003cli\u003eThe most recent legal and policy developments in response to challenges to freedom of expression and information, including those related to security, religion and technology.\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-b468d306-f1d5-4fe8-af38-95ccc6ebe6d3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ColumbiaX+GFOE2+2T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8ac6f7ff-0ff9-4894-a5f3-cc34fc5768fa\",\"productName\":\"Introduction to Web Accessibility\",\"productSlug\":\"learn/web-accessibility/the-world-wide-web-consortium-w3c-introduction-to-web-accessibility\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8ac6f7ff-0ff9-4894-a5f3-cc34fc5768fa-8357c71f5fa0.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The World Wide Web Consortium (W3C)\"],\"partnerKeys\":[\"W3Cx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e3c306a5-f985-4c36-a157-a947aec040e8-0862b784a2b0.png\",\"fullDescription\":\"$92\",\"shortDescription\":\"\u003cp\u003eGet a strong foundation in digital accessibility to make your websites and apps work well for people with disabilities, meet international standards, and provide a better user experience for everyone.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e• What accessibility means, and how it’s essential for some people and useful for all \u003cbr /\u003e\\n• The scope of web accessibility, and how it applies to a wide range of people and situations \u003cbr /\u003e\\n• The business case, including how accessibility can expand market reach, demonstrate social responsibility, drive innovation, and minimize legal risk \u003cbr /\u003e\\n• The W3C Web Content Accessibility Guidelines (WCAG) and other international standards for accessibility \u003cbr /\u003e\\n• The principles of accessibility: Perceivable, Operable, Understandable, and Robust (POUR) \u003cbr /\u003e\\n• How you can check web pages for some basic accessibility issues and improve accessibility \u003cbr /\u003e\\n• Approaches for planning managing accessibility in your project and in your organization \u003cbr /\u003e\\n• Where to find W3C resources for developers and designers to implement accessibility\u003c/p\u003e\",\"objectId\":\"course-8ac6f7ff-0ff9-4894-a5f3-cc34fc5768fa\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:W3Cx+WAI0.1x+3T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1d8dc871-ee1b-40c2-8428-c725a96a809f\",\"productName\":\"Technical Support Basics for Everyone\",\"productSlug\":\"learn/technology/ibm-technical-support-basics-for-everyone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1d8dc871-ee1b-40c2-8428-c725a96a809f-7267b8a4e922.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$93\",\"shortDescription\":\"\u003cp\u003eGain the daily work skills and knowledge you’ll need for IT Technical Support career success. This course, part of the IBM Technical Support Professional Certificate, is designed for beginners with no prior IT experience or formal degree.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eDefine technical support, IT support, customer support, the various levels of IT support, and the escalation matrix.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDevelop both the soft skills and technical skills required to launch a career in technical support.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eExplore the features and benefits of ticketing systems.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDescribe the various methodologies and frameworks popular in technical support.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1d8dc871-ee1b-40c2-8428-c725a96a809f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0121EN+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"eb555371-21db-4e14-a44f-400bb572da10\",\"productName\":\"Hardware and Operating Systems\",\"productSlug\":\"learn/operating-systems/ibm-hardware-and-operating-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/eb555371-21db-4e14-a44f-400bb572da10-6a96fce4e247.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$94\",\"shortDescription\":\"\u003cp\u003eThis course will help you develop the skills to install and set up an operating system and gain expertise on hardware components, including motherboard, CPU, hard drives and more.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDemonstrate an understanding of operating systems fundamentals.\u003c/li\u003e\\n\u003cli\u003eRecognize desktop and laptop hardware components and devices.\u003c/li\u003e\\n\u003cli\u003eIdentify commonly used interfaces and peripherals.\u003c/li\u003e\\n\u003cli\u003eDescribe workstation setup practices, operating system settings, and good troubleshooting practices.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-eb555371-21db-4e14-a44f-400bb572da10\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0111EN+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"38b1571e-2183-476e-a59c-f8383c3e519d\",\"productName\":\"GIS Foundations\",\"productSlug\":\"learn/gis-geographic-information-systems/university-of-alaska-fairbanks-gis-foundations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/38b1571e-2183-476e-a59c-f8383c3e519d-0193919517e9.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$95\",\"shortDescription\":\"\u003cp\u003eLearn foundations of GIS concepts and geospatial technology to view, understand, query, visualize, and interpret geospatial data to reveal patterns and relationships for effective problem-solving and better decision making.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUse ArcGIS Pro software efficiently\u003c/li\u003e\\n\u003cli\u003eExplore, create and analyze geospatial data in ArcGIS Pro software\u003c/li\u003e\\n\u003cli\u003eCreate and share new GIS data\u003c/li\u003e\\n\u003cli\u003eUse ArcGIS geoprocessing tools for data preparation, building workflows and spatial analysis\u003c/li\u003e\\n\u003cli\u003eCreate informative visualizations in the form of maps, graphs and charts\u003c/li\u003e\\n\u003cli\u003ePerform spatial analyses on points, lines, and polygons data to gain deeper insight into data, patterns and relationships\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-38b1571e-2183-476e-a59c-f8383c3e519d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+GIS1x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7ef41442-5fa3-42f3-b338-126ae68a8e2c\",\"productName\":\"C Programming: Language Foundations\",\"productSlug\":\"learn/c-programming/dartmouth-college-c-programming-language-foundations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7ef41442-5fa3-42f3-b338-126ae68a8e2c-f9de346160d8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Dartmouth College\",\"IMT\"],\"partnerKeys\":[\"DartmouthX\",\"IMTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/faaf3d47-e4af-4da6-8cb8-c7051d7b1572-0d113e57e4e4.png\",\"fullDescription\":\"$96\",\"shortDescription\":\"\u003cp\u003eMaster foundational concepts in the C programming language such as logical statements and arrays.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eUse logical conditions to control the flow of a program via branch statements (if-else), repetition (for or while loop) and nesting of these structures\u003c/li\u003e\\r\\n\u003cli\u003eCreate and modify arrays to store integer and floating point numbers and explain how arrays are organized in memory\u003c/li\u003e\\r\\n\u003cli\u003eCreate null-terminated arrays of characters to store and modify strings (of characters)\u003c/li\u003e\\r\\n\u003cli\u003eSort and search arrays of numbers and characters using bubble sort, selection sort, linear search and bisection\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-7ef41442-5fa3-42f3-b338-126ae68a8e2c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:Dartmouth_IMTx+DART.IMT.C.02+1T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ebc77e49-de08-453f-bc83-dbc966847c4b\",\"productName\":\"Software, Programming, and Database Basics\",\"productSlug\":\"learn/software-development/ibm-software-programming-and-database-basics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ebc77e49-de08-453f-bc83-dbc966847c4b-10d5ba258f6d.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$97\",\"shortDescription\":\"\u003cp\u003eThis course introduces the fundamentals of software, programming languages, web browsers, cloud computing and database concepts.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eClassify, install, configure and manage software including mobile platforms.\u003c/li\u003e\\n\u003cli\u003eDiscuss cloud computing and web browser concepts.\u003c/li\u003e\\n\u003cli\u003eExplain software development models, techniques, and concepts.\u003c/li\u003e\\n\u003cli\u003eDescribe fundamental database management concepts.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ebc77e49-de08-453f-bc83-dbc966847c4b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0151EN+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c4cd77f1-9d1f-4478-bb4a-45f90fcd71d4\",\"productName\":\"IT Support Case Studies\",\"productSlug\":\"learn/it-support/ibm-it-support-case-studies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c4cd77f1-9d1f-4478-bb4a-45f90fcd71d4-1f2c082b917c.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$98\",\"shortDescription\":\"\u003cp\u003eThis Capstone course provides a series of case studies for demonstrating skills to perform in a Technical Support role. It also includes a practice exam to help you prepare for the CompTIA IT Fundamentals (ITF+) Certification Exam.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eArticulate processes and information related to IT fundamentals in the context of providing technical support.\u003c/li\u003e\\n\u003cli\u003eDemonstrate systematic and effective troubleshooting and problem-solving skills.\u003c/li\u003e\\n\u003cli\u003eApply customer service skills and a customer support mindset, including conflict mitigation and de-escalation skills.\u003c/li\u003e\\n\u003cli\u003ePractice for the CompTIA IT Fundamentals Certification by completing the final exam.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c4cd77f1-9d1f-4478-bb4a-45f90fcd71d4\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CC0340EN+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"30d92064-85eb-4f5a-8840-fceda52cb050\",\"productName\":\"Strengthening Geospatial Information Management: Using the Integrated Geospatial Information Framework (Virtual Knowledge Exchange)\",\"productSlug\":\"learn/gis-geographic-information-systems/world-bank-group-strengthening-geospatial-information-management-using-the-integrated-geospatial-information-framework-virtual-knowledge-exchange\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/30d92064-85eb-4f5a-8840-fceda52cb050-526d0e402699.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":[\"World Bank Group\"],\"partnerKeys\":[\"WBGx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3ca455dc-4c90-4097-9203-d647e3e70771-af804add6293.png\",\"fullDescription\":\"\u003cp\u003eIn the digital era, geospatial information technology has emerged as a major contributor to economic transformation for many countries. Every decision we make, every event or daily activity we do occurs at a geographic location. Geospatial information is used across different sectors to solve complex problems such as hazard risk management, integrated transportation, sustainable land administration and management, health services, urban policy and planning, and much more. \u003c/p\u003e\\n\u003cp\u003eInnovative geospatial information technologies are “disrupting” conventional ways for addressing the development and management of different sectors, transitioning the culture, education and institutional frameworks along with its evolution. From navigating closest restaurants to tracking logistics and planning optimal delivery routes, the transforming digital services built on geospatial information, GPS and base maps have gradually become part of our daily routine.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course is based on the World Bank’s “Strengthening Geospatial Information Management: Using the Integrated Geospatial Information Framework (IGIF)”. This course builds on work to e-package global learning and innovation for leveraging sustainable development and contribute to socio-economic improvements. It will include the efforts of governments, the private sector and academia to address: Governance, Technology, People and Benefits.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThe objective of this course is to raise awareness and share practical experiences of using the IGIF to strengthen the use of integrated geospatial information technologies to enhance resiliency and sustainable development through its application.\u003c/p\u003e\",\"objectId\":\"course-30d92064-85eb-4f5a-8840-fceda52cb050\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WBGx+IGIF01x+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"efb2fa56-1c0b-481a-a16f-de59a7c2f44b\",\"productName\":\"Managing People with Power Skills\",\"productSlug\":\"learn/soft-skills/the-university-of-maryland-college-park-managing-people-with-power-skills\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/efb2fa56-1c0b-481a-a16f-de59a7c2f44b-6e6953afab04.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$99\",\"shortDescription\":\"\u003cp\u003ePeople are an essential part of every project. But their role can be unclear and misunderstood. Learn how to communicate with others, find a common goal and encourage everyone to work together towards the goals of the project.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the project management course, learners will gain the prerequisites to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eReview the key interpersonal skills necessary to effectively manage projects\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDefine who are the stakeholders and how we interact with them in predictive environment vs. adaptive environment\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eApply techniques used to effectively handle conflicts and inform stakeholders in the context of risk management\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAnalyze the factors of resource planning and project team management\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eRecognize the key techniques to work with vendors as a part of the procurement process\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDiscover the key elements that make for a strong communications plan\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-efb2fa56-1c0b-481a-a16f-de59a7c2f44b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+PMPREP02+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a2f850c6-c2e2-401c-9e37-8e1ee08927cc\",\"productName\":\"The Superpower Grand Strategies: Winning the Globalization Game\",\"productSlug\":\"learn/economics/university-system-of-maryland-the-superpower-grand-strategies-winning-the-globalization-game\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a2f850c6-c2e2-401c-9e37-8e1ee08927cc-8a4f877bb838.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"University System of Maryland\",\"The University of Maryland, College Park\"],\"partnerKeys\":[\"USMx\",\"UMD\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\",\"fullDescription\":\"$9a\",\"shortDescription\":\"\u003cp\u003eLearn to navigate North-South dynamics and superpower competition for success in a changing world by exploring how climate change, demographics, and the global middle class reshape global economics.\u003c/p\u003e\",\"productOverview\":\"$9b\",\"objectId\":\"course-a2f850c6-c2e2-401c-9e37-8e1ee08927cc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+ANM01x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e719e427-73ae-4a86-8971-5a949238d9d8\",\"productName\":\"Four Facets of Contemporary Japanese Architecture: Humans\",\"productSlug\":\"learn/architecture/the-university-of-tokyo-four-facets-of-contemporary-japanese-architecture-humans\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e719e427-73ae-4a86-8971-5a949238d9d8-8969d702bfca.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Architecture\"],\"partnerName\":[\"The University of Tokyo\"],\"partnerKeys\":[\"UTokyoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/234a2849-1ac0-44fc-a5bd-2ab0e4e077fe-b06b8a3a6bca.png\",\"fullDescription\":\"\u003cp\u003eThis is the fourth course in the “Four Facets of Contemporary Japanese Architecture” series, which focuses on the fourth facet: humans.\u003c/p\u003e\\n\u003cp\u003eEconomic miracle, environmental problems, bubble economy and its collapse, information technology and globalization, earthquakes, population decline, pandemic... The nearly 60 years between the two Tokyo Olympics, 1964 and 2021, was a turbulent time for humans in Japan. During this period, how has architecture changed? And what happened to humans that architecture was supposed to have supported?\u003c/p\u003e\\n\u003cp\u003eThis course on “Humans” will review the works of those architects who have attempted to conceptualize humans through their architecture and examine the changes over the last half century as well as the issues for the future. Hiroshi Hara, Toyo Ito, Osamu Ishiyama, Kengo Kuma, Satoko Shinohara, and Sou Fujimoto visit their buildings to discuss the ideas behind their respective works.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the history, ideas, and concepts behind contemporary Japanese architecture through one facet of Japanese architecture, humans.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDevelopment of contemporary Japanese architecture since the 1964 Tokyo Olympics\u003c/li\u003e\\n\u003cli\u003eFeatures of works of influential Japanese architects\u003c/li\u003e\\n\u003cli\u003eUnique technologies used for contemporary Japanese architecture\u003c/li\u003e\\n\u003cli\u003ePresent concerns and potential future directions for contemporary Japanese architecture\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e719e427-73ae-4a86-8971-5a949238d9d8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UTokyoX+UTokyo012x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e8786c20-869a-43a9-a7da-e1ed6347a4b0\",\"productName\":\"Introduzione all'informatica\",\"productSlug\":\"learn/computer-science/universita-degli-studi-di-napoli-federico-ii-introduzione-all-informatica\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e8786c20-869a-43a9-a7da-e1ed6347a4b0-4621937c2dcd.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$9c\",\"shortDescription\":\"\u003cp\u003eAvvicinati al mondo dell'informatica, apprendi le competenze fondamentali alla base dei linguaggi di programmazione.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIl corso fornisce le competenze teoriche, metodologiche e pratiche fondamentali per la realizzazione di programmi di limitata complessità attraverso linguaggi di programmazione ad alto livello, con particolare riferimento alla programmazione strutturata ed al linguaggio C/C++ . \u003c/p\u003e\\n\u003cp\u003eThe course provides the theory, methods and practice to enable learners to create their own simple programmes using high-level programming language, especially structured programming and C/C++ languages.\u003c/p\u003e\",\"objectId\":\"course-e8786c20-869a-43a9-a7da-e1ed6347a4b0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+Fed.X-32+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7c2053b9-bd99-4c58-bacb-d75f21887bd0\",\"productName\":\"经济学原理(微观部分)\",\"productSlug\":\"learn/economics/tsinghua-university-jing-ji-xue-yuan-li-wei-guan-bu-fen\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7c2053b9-bd99-4c58-bacb-d75f21887bd0-6a961928173f.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"Tsinghua University\"],\"partnerKeys\":[\"TsinghuaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b5714409-b5f4-4c9d-9348-b0fecbaaddd6-780fbb6c72c7.png\",\"fullDescription\":\"$9d\",\"shortDescription\":\"\u003cp\u003ePrinciples of Economics mainly describes the microscopic part of economics principles. Microeconomics is a theoretical model and way of thinking about human actions and cooperation between individuals and society. This course will systematically introduce the basic principles of microeconomics and their applications in real life. By studying this course, you can help you understand the world you live in, use principles to guide economic practice, and inspire yourself to analyze and judge economic phenomena.\u003c/p\u003e\",\"productOverview\":\"$9e\",\"objectId\":\"course-7c2053b9-bd99-4c58-bacb-d75f21887bd0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TsinghuaX+THU2023102601+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bc803718-9c0a-4606-ba3f-6cd5352a00e0\",\"productName\":\"Shifting Your Teaching Online\",\"productSlug\":\"learn/education/tsinghua-university-shifting-your-teaching-online\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bc803718-9c0a-4606-ba3f-6cd5352a00e0-36c0762aba6c.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Tsinghua University\"],\"partnerKeys\":[\"TsinghuaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b5714409-b5f4-4c9d-9348-b0fecbaaddd6-780fbb6c72c7.png\",\"fullDescription\":\"\u003cp\u003eThrough learning this course, teachers who are carrying out or planning to carry out online teaching can further feel the characteristics of online teaching, learn from online teaching experience, master more teaching methods, and enhance the confidence of online teaching.\u003c/p\u003e\\n\u003cp\u003eAt the same time, each teacher in this course will share the teaching design in 20-30 minutes, and then use the rain classroom live or combine with the classroom live to carry out lectures, as well as follow-up customized online discussion between teachers and learners, so that each learner who may also be a teacher, through recorded knowledge and live Knowledge fully feels the learning experience under the joint effect of synchronous and asynchronous online teaching and learning, and deeply considers how to use information technology to increase the interaction between teachers and students, students and students, and enhance learning.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course will help teachers improve their online pedagogy by training online teaching concepts and skills through practical examples at Tsinghua University. The course is co-taught by a number of experienced teachers and includes three sessions, namely, pedagogy of online teaching, practical classroom demonstration, and online interactive discussion.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis course is a training course of online teaching for university teachers all over the world. It is initiated by Yu Xinjie, Professor of the Department of Electrical Engineering, Tsinghua University, and Li Manli, Professor of the Institute of Education, Tsinghua University. Many front-line teachers with rich online teaching experience jointly teach it. Teachers will share teaching methods, classroom organization, teaching interaction and other contents of different disciplines based on rich and real experience of online teaching and solid theory research of education.\u003c/p\u003e\",\"objectId\":\"course-bc803718-9c0a-4606-ba3f-6cd5352a00e0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TsinghuaX+THU20210105+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"90a35a07-2d42-4080-be6d-6e69bf786899\",\"productName\":\"Drones for Agriculture: Prepare and Design Your Drone (UAV) Mission\",\"productSlug\":\"learn/drones/wageningen-university-research-drones-for-agriculture-prepare-and-design-your-drone-uav-mission\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/90a35a07-2d42-4080-be6d-6e69bf786899-3238177efb4f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Energy \u0026 Earth Sciences\",\"Environmental Studies\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$9f\",\"shortDescription\":\"\u003cp\u003eTake a dive and expand your knowledge about drones en drone technology. Learn how to prepare and execute a flight mission with an Unmanned Aerial Vehicle (UAV) and how to use, process and understand the collected drone data for your own applications.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify whether it makes sense to use a drone for your application or challenge.\u003c/li\u003e\\n\u003cli\u003eGive examples about the available airborne technology.\u003c/li\u003e\\n\u003cli\u003eGive an overview what international legislation and regulations are concerning drones.\u003c/li\u003e\\n\u003cli\u003ePerform the required flight preparations and create- and execute a safe mission setup.\u003c/li\u003e\\n\u003cli\u003eDefine a mission planning with the available open source and commercial tools.\u003c/li\u003e\\n\u003cli\u003eDiscuss the potential of image product delivery for different purposes.\u003c/li\u003e\\n\u003cli\u003eExamine drone data and derive information from it.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-90a35a07-2d42-4080-be6d-6e69bf786899\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+DRONE01x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ff568e8d-1311-4fb8-8ef7-aab197e70c81\",\"productName\":\"Health Informatics: A Current and Historical Perspective\",\"productSlug\":\"learn/health-informatics/the-georgia-institute-of-technology-health-informatics-a-current-and-historical-perspective\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ff568e8d-1311-4fb8-8ef7-aab197e70c81-9aee60a4ca20.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Health \u0026 Safety\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$a0\",\"shortDescription\":\"\u003cp\u003eBackground on US healthcare, the key current applications of informatics in healthcare delivery\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe major challenges facing healthcare delivery systems around the world\u003c/li\u003e\\n\u003cli\u003eThe key issue of chronic disease and the critical role informatics can play in managing it\u003c/li\u003e\\n\u003cli\u003eThe potential of electronic health records (EHRs)\u003c/li\u003e\\n\u003cli\u003eThe challenges to the design and usability EHRs\u003c/li\u003e\\n\u003cli\u003eThe twin challenges of EHR adoption and data sharing\u003c/li\u003e\\n\u003cli\u003eThe critical role of patient engagement\u003c/li\u003e\\n\u003cli\u003eThe technologies and tools historically used to achieve that engagement\u003c/li\u003e\\n\u003cli\u003eContemporary approaches to patient engagement\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ff568e8d-1311-4fb8-8ef7-aab197e70c81\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HI2018xI+1T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a5967716-5b63-4745-861f-9168fd198795\",\"productName\":\"Innovation Strategies for Electric Mobility: The StreetScooter Case\",\"productSlug\":\"learn/innovation/rwth-aachen-university-innovation-strategies-for-electric-mobility-the-streetscooter-case\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a5967716-5b63-4745-861f-9168fd198795-bfb8a681c6f9.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"RWTH Aachen University\"],\"partnerKeys\":[\"RWTHx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8607c85e-2a12-4c51-8906-3a67848cf2a7-3e0a310f77c3.png\",\"fullDescription\":\"$a1\",\"shortDescription\":\"\u003cp\u003eHelp your organization develop the strategies needed to become a front-runner of innovation in electric mobility and beyond.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eTo understand how current mega-trends challenge extant approaches from the domains of Marketing, Innovation, and Entrepreneurship.\u003c/li\u003e\\n\u003cli\u003eTo adjust innovation processes to the technological and environmental imperatives of the twenty-first century.\u003c/li\u003e\\n\u003cli\u003eTo translate the previously gained knowledge into market-ready products for electric mobility and beyond.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a5967716-5b63-4745-861f-9168fd198795\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RWTHx+ISEMx+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"551a02a8-cba0-4918-8efc-b0b92d3b3bf0\",\"productName\":\"Innovation and IT Management\",\"productSlug\":\"learn/information-technology/indian-institute-of-management-bangalore-innovation-and-it-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/551a02a8-cba0-4918-8efc-b0b92d3b3bf0-ef627e2d5900.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Indian Institute of Management Bangalore\"],\"partnerKeys\":[\"IIMBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c2e6b3f5-9c1f-41f0-b692-f2173d05a256-7729f0b9d72b.png\",\"fullDescription\":\"$a2\",\"shortDescription\":\"Learn key decision-making skills to better manage and implement IT and innovation in your workplace.\",\"productOverview\":\"\u003cp\u003eManaging IT and Innovation requires subtle decision-making skills. You will learn how to make decisions related to:\u003c/p\u003e\\n\\n\u003cul\u003e\u003cli\u003eCompeting with IT\u003c/li\u003e\\n\\t\u003cli\u003eManaging digital networks and security\u003c/li\u003e\\n\\t\u003cli\u003eMaking sense of the evolving IT landscape\u003c/li\u003e\\n\\t\u003cli\u003eDeveloping software and managing projects\u003c/li\u003e\\n\\t\u003cli\u003eManaging crowd innovation\u003c/li\u003e\\n\\t\u003cli\u003eSocial and ethical aspects of IT. \u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-551a02a8-cba0-4918-8efc-b0b92d3b3bf0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IIMBx+IS110x+1T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"633b558d-9c96-4b94-a4ba-bca5ac84e9d2\",\"productName\":\"Digital Ecosystem Infrastructure\",\"productSlug\":\"learn/business-administration/indiana-university-digital-ecosystem-infrastructure\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/633b558d-9c96-4b94-a4ba-bca5ac84e9d2-3d1aad134eb2.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Indiana University\"],\"partnerKeys\":[\"IUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8946fb40-f288-4e05-9275-9e9b4689bda8-e58c545e2296.png\",\"fullDescription\":\"\u003cp\u003eCloud computing is a foundational capability for success in business information systems. To be adaptable in the digital environment, businesses need agility, scale, and operating flexibility. Cloud computing applications can fulfill these needs. In this course, you will explore components of network architecture, virtualization, cloud computing models, deployment on the cloud, and the Internet of Things (IoT). Enroll now to learn the advantages of cloud computing in a business environment and the impact of cloud computing on information technology. \u003c/p\u003e\\n\u003cp\u003eVerified Learners will need to purchase a textbook in order to successfully complete the course. See the FAQ for details.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of cloud computing and its impact on IT and business.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow cloud computing is impacting IT in organizations\u003c/li\u003e\\n\u003cli\u003eFundamentals of network and application architecture\u003c/li\u003e\\n\u003cli\u003eFundamentals of various cloud-computing service and deployment models including Software as a Service (SaaS)\u003c/li\u003e\\n\u003cli\u003eSecurity, risk, and governance challenges related to cloud computing\u003c/li\u003e\\n\u003cli\u003eInternet of Things (IoT) and its potential for business impact\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-633b558d-9c96-4b94-a4ba-bca5ac84e9d2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IUx+BUKD-X592+2T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d4c7cc7d-aa4a-4e74-849c-d17417e0a649\",\"productName\":\"Introduction to Management Information Systems (MIS): A Survival Guide\",\"productSlug\":\"learn/information-systems/universidad-carlos-iii-de-madrid-introduction-to-management-information-systems-mis-a-survival-guide\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d4c7cc7d-aa4a-4e74-849c-d17417e0a649-fa9c75a8bc1f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Engineering\"],\"partnerName\":[\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ffbbf698-c445-4595-9466-b7cf8564a74f-329c8bde00db.png\",\"fullDescription\":\"$a3\",\"shortDescription\":\"\u003cp\u003eGain the skills and knowledge needed to succeed in an MIS-dominated corporate world.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand Management Information Systems (MIS) and their role in today’s organizations\u003c/li\u003e\\n\u003cli\u003eIdentify how MIS shapes and controls current (or prospective) jobs and how to use this insight to improve your own job performance and satisfaction and and enhance your career prospects\u003c/li\u003e\\n\u003cli\u003eBecome familiar with the major trends in MIS and MIS infrastructures (Cloud, Big Data, ERPs, outsourcing) and how these evolutions will affect workplaces and business strategies\u003c/li\u003e\\n\u003cli\u003eBridge the MIS-related second “digital gap” that exists, after basic computer literacy, in most professional jobs\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d4c7cc7d-aa4a-4e74-849c-d17417e0a649\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UC3Mx+IM.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2c7051ee-6c29-4c90-921c-92112bcfa866\",\"productName\":\"Fundamentos TIC para profesionales de negocios: Desarrollo de Software\",\"productSlug\":\"learn/software-development/universitat-politecnica-de-valencia-fundamentos-tic-para-profesionales-de-negocios-desarrollo-de-software\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2c7051ee-6c29-4c90-921c-92112bcfa866-dc5f47865a5c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$a4\",\"shortDescription\":\"\u003cp\u003e¿Tienes que trabajar con las Tecnologías de la Información y te faltan conocimientos? Aprende los fundamentos básicos del desarrollo de software.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAprenderás sobre:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eHerramientas y métodos para el desarrollo de software\u003c/li\u003e\\n\u003cli\u003eConceptos sobre el ciclo de vida en el desarrollo de sistemas.\u003c/li\u003e\\n\u003cli\u003eRoles y funciones en la gestión de proyectos de software\u003c/li\u003e\\n\u003cli\u003eDiferentes métodos para el procesado de información (lotes, tiempo real …)\u003c/li\u003e\\n\u003cli\u003eDiseño de la interfaz de usuario.\u003c/li\u003e\\n\u003cli\u003eDesarrollo y motivación de los estándares en software.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2c7051ee-6c29-4c90-921c-92112bcfa866\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+SIC101.3x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ea0a9dfe-7d94-4419-8801-44c7603b1cbc\",\"productName\":\"Fundamentos TIC para profesionales de negocios: Ciberseguridad e Implicaciones sociales\",\"productSlug\":\"learn/cybersecurity/universitat-politecnica-de-valencia-fundamentos-tic-para-profesionales-de-negocios-ciberseguridad-e-implicaciones-sociales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ea0a9dfe-7d94-4419-8801-44c7603b1cbc-b2878d7eba35.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$a5\",\"shortDescription\":\"\u003cp\u003e¿Tienes que trabajar con las Tecnologías de la Información y te faltan conocimientos? Profundiza en las implicaciones sociales de las TIC, como la Ciberseguridad, la ergonomía o los puestos de trabajo relacionados.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAprenderás sobre:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eConceptos relacionados con la ciberseguridad, la propiedad intelectual, la privacidad, los hackers; las amenazas informáticas y cómo defenderse de ellas\u003c/li\u003e\\n\u003cli\u003eEfectos de las TIC en procesos como la globalización, el comercio electrónico, la estrategia de negocios, la competencia y el outsourcing, entre otros\u003c/li\u003e\\n\u003cli\u003eEl fenómeno de la Web 2.0 y las redes sociales\u003c/li\u003e\\n\u003cli\u003eLas distintas carreras profesionales por las que se puede optar en el mundo de las TIC\u003c/li\u003e\\n\u003cli\u003eConceptos como la ergonomía y el cloud computing\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ea0a9dfe-7d94-4419-8801-44c7603b1cbc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+sic101.5x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"68dadac5-5048-43ee-ae7b-e36bd8c559bc\",\"productName\":\"Fundamentos TIC para profesionales de negocios: Programación\",\"productSlug\":\"learn/computer-programming/universitat-politecnica-de-valencia-fundamentos-tic-para-profesionales-de-negocios-programacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/68dadac5-5048-43ee-ae7b-e36bd8c559bc-dc18ccb9920c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$a6\",\"shortDescription\":\"\u003cp\u003e¿Tienes que trabajar con las Tecnologías de la Información y te faltan conocimientos? Conoce los fundamentos de la programación software.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAprenderás sobre:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLa sintaxis y estructuras de programación (pseudo código)\u003c/li\u003e\\n\u003cli\u003eLa lógica que hay detrás de la creación de programas de ordenador\u003c/li\u003e\\n\u003cli\u003eCómo funciona la programación orientada a objetos\u003c/li\u003e\\n\u003cli\u003eLos tipos y estructuras de datos más importantes\u003c/li\u003e\\n\u003cli\u003eCuáles son los tipos de fichero más comunes\u003c/li\u003e\\n\u003cli\u003eCómo se gestionan las bases de datos\u003c/li\u003e\\n\u003cli\u003eLas bases del lenguaje SQL\u003c/li\u003e\\n\u003cli\u003eQué son data warehousing y data mining\u003c/li\u003e\\n\u003cli\u003eConceptos básicos de tecnologías web (HTML, XML,CSS, javascript)\u003c/li\u003e\\n\u003cli\u003eDirectrices básicas de diseño y análisis en el desarrollo de páginas web\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-68dadac5-5048-43ee-ae7b-e36bd8c559bc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+SIC101.4x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2fe1e8be-b1cc-4898-ad30-5908465fc20c\",\"productName\":\"Fundamentos TIC para profesionales de negocios: Aplicaciones empresariales\",\"productSlug\":\"learn/information-systems/universitat-politecnica-de-valencia-fundamentos-tic-para-profesionales-de-negocios-aplicaciones-empresariales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2fe1e8be-b1cc-4898-ad30-5908465fc20c-ab74f02398d0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$a7\",\"shortDescription\":\"\u003cp\u003e¿Tienes que trabajar con las Tecnologías de la Información y te faltan conocimientos? Conoce los fundamentos de los sistemas de información para la empresa.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eEn este curso aprenderás:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eFuncionamiento de paquetes ofimáticos (procesador de texto, hoja de cálculo, presentaciones y gestor de bases de datos). \u003c/li\u003e\\n\u003cli\u003eFuncionamiento básico de e-mail y sistemas de conferencia.\u003c/li\u003e\\n\u003cli\u003eAspectos básicos de sistemas operativos\u003c/li\u003e\\n\u003cli\u003eFuncionamiento de navegadores web y tecnologías de Internet.\u003c/li\u003e\\n\u003cli\u003eDescripción básica de diversas aplicaciones empresariales (Business Intelligence, ERP, CRM, GIS, SCM, DMS, EDI....)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2fe1e8be-b1cc-4898-ad30-5908465fc20c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+SIC101.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8e170f29-f244-4fc1-879b-80bf51326245\",\"productName\":\"Fundamentos TIC para profesionales de negocios: Hardware\",\"productSlug\":\"learn/computer-programming/universitat-politecnica-de-valencia-fundamentos-tic-para-profesionales-de-negocios-hardware\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8e170f29-f244-4fc1-879b-80bf51326245-41a44f2d695b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$a8\",\"shortDescription\":\"\u003cp\u003e¿Tienes que trabajar con las Tecnologías de la Información y te faltan conocimientos? Aprende las bases hardware de los Sistemas de Información y las Redes de Comunicaciones.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAprenderás sobre:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eFunciones llevadas a cabo por el hardware del ordenador, el de comunicaciones y el de red\u003c/li\u003e\\n\u003cli\u003eArquitecturas cliente/servidor\u003c/li\u003e\\n\u003cli\u003eDispositivos de comunicaciones inalámbricas (móvil, satélite, GPS)\u003c/li\u003e\\n\u003cli\u003eRepresentación digital de la información (texto, números, multimedia) y uso del sistema binario\u003c/li\u003e\\n\u003cli\u003eArquitecturas de red de área local y empresarial\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8e170f29-f244-4fc1-879b-80bf51326245\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+SIC101.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1c3b834f-aa6d-462b-9242-0dc046ebb4c0\",\"productName\":\"Strategic Applications of IT Project \u0026 Program Management\",\"productSlug\":\"learn/project-management/university-of-washington-strategic-applications-of-it-project-program-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1c3b834f-aa6d-462b-9242-0dc046ebb4c0-da28482c7f7e.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"\u003cp\u003e\u003cstrong\u003eThis course will soon be retired. Last day to enroll is April 1st 2025 at 00:00 UTC.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eThis course has a focus on learning the most commonly used project management methodologies in the IT field, and why they are effective. This course introduces you to project management standards and frameworks that increase efficiency and deliver tangible business benefits to IT projects.\u003c/p\u003e\\n\u003cp\u003eTopics include:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eRelationships among projects, programs and portfolios\u003c/li\u003e\\n\u003cli\u003eOrganizational culture and project management roles\u003c/li\u003e\\n\u003cli\u003eProject management methods and lifecycles and their applications\u003c/li\u003e\\n\u003c/ul\u003e\",\"shortDescription\":\"\u003cp\u003eIn this course you will learn project management standards and frameworks that increase efficiency and deliver tangible business benefits.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExplain why organizations use project management to deliver business value;\u003c/li\u003e\\n\u003cli\u003eDescribe the relationships among projects, programs and portfolios;\u003c/li\u003e\\n\u003cli\u003eDefine the differences between predictive, iterative and Agile-based lifecycles;\u003c/li\u003e\\n\u003cli\u003eAnalyze different project management roles -- project manager, sponsor, stakeholder, ScrumMaster, product owner and developer;\u003c/li\u003e\\n\u003cli\u003eUnderstand how organizational culture can influence the role of the project manager\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1c3b834f-aa6d-462b-9242-0dc046ebb4c0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+PM-IT-001x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8e2a73f8-6dae-4c06-b75a-861273e95959\",\"productName\":\"Information and Communication Technology (ICT) Accessibility\",\"productSlug\":\"learn/information-technology/the-georgia-institute-of-technology-information-and-communication-technology-ict-accessibility\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8e2a73f8-6dae-4c06-b75a-861273e95959-337a6a6cf7ff.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Humanities\",\"Education \u0026 Teacher Training\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$a9\",\"shortDescription\":\"Learn how to identify issues and design solutions for information and communication technology (ICT) accessibility for customers and employees with disabilities.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eFoundations of ICT accessibility.\u003c/li\u003e\\n\\t\u003cli\u003ePrinciples of accessible ICT design.\u003c/li\u003e\\n\\t\u003cli\u003eIdentify the uses of assistive technology.\u003c/li\u003e\\n\\t\u003cli\u003eCreate accessible documents and multimedia.\u003c/li\u003e\\n\\t\u003cli\u003eEvaluate and repair websites for accessibility.\u003c/li\u003e\\n\\t\u003cli\u003eIdentify components of ICT accessibility operations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8e2a73f8-6dae-4c06-b75a-861273e95959\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+ICT100x+3T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9ff9b63d-f504-424c-978a-be0b6fab8e96\",\"productName\":\"Network Security\",\"productSlug\":\"learn/network-security/rochester-institute-of-technology-network-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9ff9b63d-f504-424c-978a-be0b6fab8e96-8f0e4620200d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eIn this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.\u003c/p\u003e\\n\u003cp\u003eThe issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.\u003c/p\u003e\\n\u003cp\u003eYou will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.\u003c/p\u003e\\n\u003cp\u003eYou will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.\u003c/p\u003e\\n\u003cp\u003eThis course is a part of the RITx Cybersecurity MicroMasters Program.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to identify when attacks are happening inside networks\u003c/li\u003e\\n\u003cli\u003eHow to collect evidence of network intrusions\u003c/li\u003e\\n\u003cli\u003eHow to test networks and systems for vulnerabilities\u003c/li\u003e\\n\u003cli\u003eHow to prepare for and defend against network attacks\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9ff9b63d-f504-424c-978a-be0b6fab8e96\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER504x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a699c889-39b2-49df-aaac-33df54ad9e7b\",\"productName\":\"Knowledge Management and Big Data in Business\",\"productSlug\":\"learn/knowledge-management/the-hong-kong-polytechnic-university-knowledge-management-and-big-data-in-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a699c889-39b2-49df-aaac-33df54ad9e7b-35b97726c24f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Social Sciences\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"$aa\",\"shortDescription\":\"\u003cp\u003eLearn about the integrative power of knowledge management, Big Data and Cloud Computing, and how they impact the new business era.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the role of Knowledge Management (KM) practitioners in creating business value\u003c/li\u003e\\n\u003cli\u003eBecome familiar with the techniques and tools for capturing, processing, classifying and organizing knowledge\u003c/li\u003e\\n\u003cli\u003eHow to analyze large quantities of data and information through analytics\u003c/li\u003e\\n\u003cli\u003eHow to use Cloud Services to derive new values and business models\u003c/li\u003e\\n\u003cli\u003eUnderstand the role of social media and technologies in innovating new business services\u003c/li\u003e\\n\u003cli\u003eApply the principles you have learnt to company-based business projects\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a699c889-39b2-49df-aaac-33df54ad9e7b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+ISE101x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a7d4760b-c921-48cf-adb9-1d64f86969db\",\"productName\":\"Manage the cyber threat for finance professionals\",\"productSlug\":\"learn/cybersecurity/acca-manage-the-cyber-threat-for-finance-professionals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a7d4760b-c921-48cf-adb9-1d64f86969db-57ee8b221860.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"ACCA\"],\"partnerKeys\":[\"ACCA\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5f1ba1eb-92e8-4603-a2eb-f259d182b806-da5851943627.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eThis course is designed for accountancy, finance and business \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eprofessional\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003es\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e working in all \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eorganisations\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e from small business, large corporates or financial services or who are just interested in learning more \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eabout \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003ethe \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003evulnerabilities organisations are exposed to and the options available to protect their organisation.\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e With a focus on practical skills throughout, this course provides the ability to apply skills as well as understand them. \u003c/span\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eIn this course, we use \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003escenarios/examples to \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eexamine the threat of a cyber-attack and \u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003egood practices on\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e mitigating\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e the risk.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$ab\",\"objectId\":\"course-a7d4760b-c921-48cf-adb9-1d64f86969db\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ACCA+CS001+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e5345205-f6ca-4ae6-bee1-53469ab79a3f\",\"productName\":\"Medicine in the Digital Age\",\"productSlug\":\"learn/medicine/rice-university-medicine-in-the-digital-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e5345205-f6ca-4ae6-bee1-53469ab79a3f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Business \u0026 Management\",\"Medicine\"],\"partnerName\":[\"Rice University\"],\"partnerKeys\":[\"RICEx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3e0f3544-6626-4373-afb9-b21e0e66a571-9317ec003c4d.png\",\"fullDescription\":\"$ac\",\"shortDescription\":\"The future of healthcare is connected, patient-centered, mobile and social. Are you prepared for what lies ahead?\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eHow to identify the core areas of growth and disruption in digital health.\u003c/li\u003e\\n\\t\u003cli\u003eHow to distinguish between hype and real opportunity in digital health.\u003c/li\u003e\\n\\t\u003cli\u003eHow to identify major challenges facing doctors and patients as medicine transitions from analog to digital.\u003c/li\u003e\\n\\t\u003cli\u003eHow digital health is re-defining the physician.\u003c/li\u003e\\n\\t\u003cli\u003eHow to recognize the emerging role of the e-patient in health care.\u003c/li\u003e\\n\\t\u003cli\u003eHow to critically analyze the risks and opportunities facing individuals and health organizations as they transition to the digital health space.\u003c/li\u003e\\n\\t\u003cli\u003eHow to use Twitter like an expert to leverage public dialogue, both personally and professionally.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e5345205-f6ca-4ae6-bee1-53469ab79a3f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RiceX+MedDigX_+2015T2\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c7dcc77c-6e19-42ae-bb34-7d8416df8149\",\"productName\":\"Global Business in Practice\",\"productSlug\":\"learn/business-administration/georgetown-university-global-business-in-practice\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c7dcc77c-6e19-42ae-bb34-7d8416df8149-8a664065c030.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Social Sciences\"],\"partnerName\":[\"Georgetown University\"],\"partnerKeys\":[\"GeorgetownX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/300a9275-e360-4599-92db-8c2222d5f614-712b2867e667.png\",\"fullDescription\":\"$ad\",\"shortDescription\":\"Get an overall view of the increasingly complex challenges of global business from the insights, perspectives and experience of Georgetown faculty and senior executives currently working in multinational companies.\",\"productOverview\":\"$ae\",\"objectId\":\"course-c7dcc77c-6e19-42ae-bb34-7d8416df8149\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GeorgetownX+GBEX-650-01x+3T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"340701b6-69ec-4311-a5b7-08f86b84b618\",\"productName\":\"Digital Capital Markets\",\"productSlug\":\"learn/finance/queens-university-digital-capital-markets\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/340701b6-69ec-4311-a5b7-08f86b84b618-01d8d763cffa.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"Queen’s University\"],\"partnerKeys\":[\"QueensX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3b50ea24-3c83-4923-82e3-991f67ab355e-490aeea2881f.png\",\"fullDescription\":\"$af\",\"shortDescription\":\"\u003cp\u003eLearn key concepts for evaluating electronic market quality, how trading algorithms work, and the hype around high-frequency trading and dark markets.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAfter completing this course, learners will be able to\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eanalyze the ways in which technology is re-shaping how assets are traded.\u003c/li\u003e\\n\u003cli\u003erecommend how machine learning and data science can be applied to solving financial trading problems. \u003c/li\u003e\\n\u003cli\u003edesign a strategy to evaluate the quality of electronic markets.\u003c/li\u003e\\n\u003cli\u003eassess the importance of intermediaries, investors, regulators, and market operators in the functioning of digital capital markets.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-340701b6-69ec-4311-a5b7-08f86b84b618\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:QueensX+QBUS520x+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2f5692de-8f38-466c-b4fa-3e8fe42df639\",\"productName\":\"Improving Global Health: Focusing on Quality and Safety\",\"productSlug\":\"learn/healthcare/harvard-university-improving-global-health-focusing-on-quality-and-safety\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2f5692de-8f38-466c-b4fa-3e8fe42df639-7fa225befd20.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Medicine\",\"Health \u0026 Safety\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$b0\",\"shortDescription\":\"\u003cp\u003eAn introduction to the emerging field of global healthcare quality.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe relationship between quality and population health\u003c/li\u003e\\n\u003cli\u003eA framework for understanding and thinking about healthcare quality\u003c/li\u003e\\n\u003cli\u003eApproaches to quality measurement\u003c/li\u003e\\n\u003cli\u003eThe role of information and communication technology in assessing and improving quality\u003c/li\u003e\\n\u003cli\u003eTools and contextual knowledge to improve the quality delivered in health systems\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2f5692de-8f38-466c-b4fa-3e8fe42df639\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+PH555x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e5c27c25-96e4-437c-b8b7-063bdf6fb7cf\",\"productName\":\"Citizen Engagement: A Game Changer for Development\",\"productSlug\":\"learn/social-science/world-bank-group-citizen-engagement-a-game-changer-for-development\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e5c27c25-96e4-437c-b8b7-063bdf6fb7cf-7eac328d7bc1.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"World Bank Group\"],\"partnerKeys\":[\"WBGx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3ca455dc-4c90-4097-9203-d647e3e70771-af804add6293.png\",\"fullDescription\":\"\u003cp\u003eGovernment works best when citizens are directly engaged in policymaking and public service delivery.\u003c/p\u003e\\n\u003cp\u003eThis social sciences course explores citizen engagement and the role citizens can play in actively shaping public policy.\u003c/p\u003e\\n\u003cp\u003eThroughout the course, you will learn about cutting edge research and theories related to citizen engagement, and examples of ways citizens and governments are working together in new ways to improve their societies.\u003c/p\u003e\\n\u003cp\u003eThis course was developed in partnership with many individuals and organizations. We have partnered with top experts from a wide range of fields and countries to present this course, creating a truly global faculty.\u003c/p\u003e\\n\u003cp\u003eWe have also partnered with 4 leading institutions – the London School of Economics, Overseas Development Institute, Participedia and CIVICUS – who have taken leading roles in the development of each week’s content.\u003c/p\u003e\",\"shortDescription\":\"Learn about citizen engagement and critically analyze how it can be leveraged most effectively to achieve development results.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eWhat citizen engagement is and why it matters\u003c/li\u003e\\n\\t\u003cli\u003eThe role that citizens can play in actively shaping public policy\u003c/li\u003e\\n\\t\u003cli\u003eHow engaging citizens can improve public service delivery\u003c/li\u003e\\n\\t\u003cli\u003eThe impact of recent innovations in information and communications technology\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e5c27c25-96e4-437c-b8b7-063bdf6fb7cf\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WBGx+CE01x+1T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"505d43ea-8c2b-455b-add3-cf604ef694f5\",\"productName\":\"Big Data for Understanding Urbanizing China | 大数据与城市规划\",\"productSlug\":\"learn/big-data/tsinghua-university-big-data-for-understanding-urbanizing-china-da-shu-ju-yu-cheng-shi-gui-hua\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/505d43ea-8c2b-455b-add3-cf604ef694f5-a02e68a80375.png\",\"productType\":\"Course\",\"attributes\":[\"Architecture\",\"Social Sciences\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Tsinghua University\"],\"partnerKeys\":[\"TsinghuaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b5714409-b5f4-4c9d-9348-b0fecbaaddd6-780fbb6c72c7.png\",\"fullDescription\":\"$b1\",\"shortDescription\":\"\u003cp\u003eIn the past few decades, China's cities have experienced a period of rapid development. Emerging big data and open data have provided new opportunities for urban studies and observers to better observe and understand these changes. This course combines both the new data generated for urban analysis and its research applications. The content ranges from big data acquisition, analysis, visualization and applications in the context of China’s urban planning, to urban modeling methods and typical models, as well as the emerging trend and potential revolution of big data in urban planning.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003elUnderstand current China’s cities, lifestyles of citizensand the country’s urban planning system.\u003c/li\u003e\\n\u003cli\u003elLearn about the new data, method, and practice of recent progresses on big data and their research applications.\u003c/li\u003e\\n\u003cli\u003elGrasp methods ofbig data acquisition, analysis andvisualization to understand urbanizing China.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-505d43ea-8c2b-455b-add3-cf604ef694f5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TsinghuaX+70000662+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e4906cbf-8c51-4af8-8f6d-85a4b95b8def\",\"productName\":\"CS For All: Introduction to Computer Science and Python Programming\",\"productSlug\":\"learn/python/harvey-mudd-college-cs-for-all-introduction-to-computer-science-and-python-programming\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e4906cbf-8c51-4af8-8f6d-85a4b95b8def-a2493d004732.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Harvey Mudd College\"],\"partnerKeys\":[\"HarveyMuddX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ae5c478b-9e19-4868-95be-18c0cc881efa-959a8063f103.png\",\"fullDescription\":\"\u003cp\u003eLooking to get started with computer science while learning to program in Python?\u003c/p\u003e\\n\u003cp\u003eThis computer science course provides an introduction to computer science that’s both challenging and fun. It takes a broad look at the field of computer science through a variety of demonstrations and projects. We’ll cover both low- and high-level concepts, from how the circuits inside a computer represent data to how to design algorithms, as well as how all of this information affects the technology we use today. Additionally, we’ll teach the basics of Python programming, giving us a a way to put our new CS knowledge into practice.\u003c/p\u003e\\n\u003cp\u003eNo need to know any programming before starting the course; we’ll teach everything you need to know along the way. All you need to start is a good grasp of algebra, and you can fall in love with both the concepts and the practice of computer science.\u003c/p\u003e\",\"shortDescription\":\"A fun, fast-paced introduction to solving interesting problems with computer science through Python programming.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eBasic Python Programming\u003c/li\u003e\\n\\t\u003cli\u003eDesign, implementation, documentation, and testing skills\u003c/li\u003e\\n\\t\u003cli\u003eStrategies for solving computational problems\u003c/li\u003e\\n\\t\u003cli\u003eApplications of CS in society and real world context\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e4906cbf-8c51-4af8-8f6d-85a4b95b8def\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarveyMuddX+CS005x+2T2016\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d1a00ae6-f78d-4b91-a0e7-5e0e08049d94\",\"productName\":\"Cognitive Neuroscience Robotics – Part A\",\"productSlug\":\"learn/robotics/osaka-university-cognitive-neuroscience-robotics-part-a\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d1a00ae6-f78d-4b91-a0e7-5e0e08049d94-1b9b70994d09.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Engineering\",\"Medicine\"],\"partnerName\":[\"Osaka University\"],\"partnerKeys\":[\"OsakaUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c4ebe1e6-da7e-4d7e-8cf6-9693c786cbb0-e8bda4292048.png\",\"fullDescription\":\"$b2\",\"shortDescription\":\"Learn how engineering and medicine can combine to create new robotic technology.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eBasic issues in cognitive neuroscience robotics\u003c/li\u003e\\n\\t\u003cli\u003eRecent development and findings in robotics based on cognitive and brain sciences\u003c/li\u003e\\n\\t\u003cli\u003eIdeas and methods in various disciplines relevant to cognitive neuroscience robotics and how they relate to each other\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d1a00ae6-f78d-4b91-a0e7-5e0e08049d94\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:OsakaUx+CNR101x+1T2016\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"59728f01-0073-45ea-a88a-f0c14fc575d9\",\"productName\":\"Data Science for Smart Cities\",\"productSlug\":\"learn/engineering/purdue-university-data-science-for-smart-cities\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/59728f01-0073-45ea-a88a-f0c14fc575d9-d2a33fb4c535.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$b3\",\"shortDescription\":\"\u003cp\u003eLearn various scientific techniques that will allow the analysis, inference and prediction of large-scale data (e.g. GPS vehicular data, social media data, mobile phone data, individual social network data etc.) that are present in city networks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eClassify the different types of data generated by smart cities.\u003c/li\u003e\\n\u003cli\u003eApply the basics of various data mining techniques.\u003c/li\u003e\\n\u003cli\u003eMap the data mining tool that is appropriate for various smart city applications.\u003c/li\u003e\\n\u003cli\u003eCode, apply and solve the data mining algorithms using Python.\u003c/li\u003e\\n\u003cli\u003eInterpret the results from the data mining tools and make connections to policy making as they relate to smart cities applications.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-59728f01-0073-45ea-a88a-f0c14fc575d9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+CE597+1T2021a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2a73cb9d-916f-4ff6-b3c1-ac2198b3ddba\",\"productName\":\"Ideas To Lead - Business Transformation in the Age of AI\",\"productSlug\":\"learn/business-management/wobi-ideas-to-lead-business-transformation-in-the-age-of-ai\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2a73cb9d-916f-4ff6-b3c1-ac2198b3ddba-65497734331f.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"WOBI\"],\"partnerKeys\":[\"WOBI\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/49ad8acd-73ab-46b4-b49f-448299008df9-c8daf30b1efe.png\",\"fullDescription\":\"$b4\",\"shortDescription\":\"\u003cp\u003eIn this course, you will explore the very essence of human progress with influential researchers, business leaders, experts, and practitioners from diverse fields. Learn how to integrate Artificial Intelligence into your company’s culture, enhancing organizational capabilities, and cultivating strong relationships with your customers. Gain deep insights into AI’s impact on business, society, and your own future, and get tools and actionable ideas to stay ahead in a rapidly changing world.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e5 Bite-sized chapters: 15-18 minutes each\u003c/li\u003e\\n\u003cli\u003eA fresh and engaging format\u003c/li\u003e\\n\u003cli\u003e15+ different experts per course\u003c/li\u003e\\n\u003cli\u003e5 Questions for reflection\u003c/li\u003e\\n\u003cli\u003e5 Key takeaways\u003c/li\u003e\\n\u003cli\u003e5 Questions quiz\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2a73cb9d-916f-4ff6-b3c1-ac2198b3ddba\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WOBI+WOBI009+2T2024a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1d64c2f6-8468-45a6-a948-fdbc3581a862\",\"productName\":\"Data Ethics, AI and Responsible Innovation\",\"productSlug\":\"learn/artificial-intelligence/the-university-of-edinburgh-data-ethics-ai-and-responsible-innovation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1d64c2f6-8468-45a6-a948-fdbc3581a862-30d05cecb1cd.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Ethics\"],\"partnerName\":[\"The University of Edinburgh\"],\"partnerKeys\":[\"EdinburghX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc823bd7-b910-4e23-a5fd-ac7283f02c1e-66ced298a065.png\",\"fullDescription\":\"$b5\",\"shortDescription\":\"\u003cp\u003eOur future is here and it relies on data. Medical robots, smart homes and cities, predictive policing, artificial intelligences – all are fuelled by data and all promise new benefits to society. But will these innovations benefit everyone? Who stands to gain and who is put at risk? How can we ensure that data is part of a just and sustainable world?\u003c/p\u003e\\n\u003cp\u003eJoin us on this course as we explore these increasingly important topics further.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDescribe the critical, social, legal, political and ethical issues arising throughout the data lifecycle.\u003c/li\u003e\\n\u003cli\u003eExplain relevant concepts, including: ethics/morality, responsibility, digital rights, data governance, human-data interaction, responsible research and innovation.\u003c/li\u003e\\n\u003cli\u003eIdentify and assess current ethical issues in data science and industry.\u003c/li\u003e\\n\u003cli\u003eApply professional critical judgement and reflexivity to moral problems with no clear solutions.\u003c/li\u003e\\n\u003cli\u003eEvaluate ethical issues you face in your current professional practice.\u003c/li\u003e\\n\u003cli\u003eIdentify and apply ethically driven solutions to those issues.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1d64c2f6-8468-45a6-a948-fdbc3581a862\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EdinburghX+DEI01x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"01506e50-51c0-41e1-afc8-6ff45044b913\",\"productName\":\"Digital Transformation Strategy: Discovering and Reaching New Markets\",\"productSlug\":\"learn/digital-transformation/the-university-of-maryland-college-park-digital-transformation-strategy-discovering-and-reaching-new-markets\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/01506e50-51c0-41e1-afc8-6ff45044b913-572b341e7bc6.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$b6\",\"shortDescription\":\"\u003cp\u003eLearn key concepts of strategy, IT, and Innovation to bring emerging technologies to market through digital channels.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAnalyze how digital technologies are transforming work, organizations, markets, and the economy.\u003c/li\u003e\\n\u003cli\u003eApply strategies about how best to interact with customers through outbound and inbound marketing and social media.\u003c/li\u003e\\n\u003cli\u003eAnalyze the forces impacting incumbents and entrants with new technology.\u003c/li\u003e\\n\u003cli\u003eIdentify traceable and verifiable marketing that work in the digital age.\u003c/li\u003e\\n\u003cli\u003eAnalyze different touchpoints in the marketing and marketing strategy process where digital technologies are having and/or will have a significant impact and evaluate the effectiveness of these touchpoints. \u003c/li\u003e\\n\u003cli\u003eIdentify the process of evaluating the performance of Artificial intelligence and machine learning algorithms.\u003c/li\u003e\\n\u003cli\u003eAnalyze and assess the performance of paid search campaigns, diagnose potential problems, and recommend adjustments to the digital marketing campaign.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-01506e50-51c0-41e1-afc8-6ff45044b913\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+DPBS01+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3cd9489f-d220-4bf9-99e7-e0c85649f919\",\"productName\":\"Semiconductor Fundamentals\",\"productSlug\":\"learn/electronics/purdue-university-semiconductor-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3cd9489f-d220-4bf9-99e7-e0c85649f919-c6ab3b7278e5.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Physics\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$b7\",\"shortDescription\":\"\u003cp\u003eFrom smartphones to satellites, semiconductors are everywhere. Tying together physics, chemistry, and electrical engineering, this easy-to-follow introduction provides the background needed to understand devices such as transistors and solar cells.\u003c/p\u003e\",\"productOverview\":\"$b8\",\"objectId\":\"course-3cd9489f-d220-4bf9-99e7-e0c85649f919\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+69502x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0eec57b5-71b0-43ea-89b0-8c3661c5bdd9\",\"productName\":\"Fiber Optic Communications\",\"productSlug\":\"learn/engineering/purdue-university-fiber-optic-communications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0eec57b5-71b0-43ea-89b0-8c3661c5bdd9-626d4b9d827c.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$b9\",\"shortDescription\":\"\u003cp\u003eLearn about the fundamentals of fiber optic communications, with emphasis on the historical background, current practice, and future directions.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ewave propagation, dispersion, and loss\u003c/li\u003e\\n\u003cli\u003eoptical transmitters and receivers: materials, sources, modulation, speed limitations\u003c/li\u003e\\n\u003cli\u003efundamental concepts in optical communication networks: power, noise, and speed\u003c/li\u003e\\n\u003cli\u003ecurrent optical communication network architectures: TDM, DWDM, QPSK, QAM\u003c/li\u003e\\n\u003cli\u003efuture optical networks: fiber-to-the-home, data centers, quantum key distribution\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0eec57b5-71b0-43ea-89b0-8c3661c5bdd9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+ECE69501X+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e9a7a6a1-1f2b-420f-990c-cda3554537af\",\"productName\":\"Fundamentals of Transistors\",\"productSlug\":\"learn/electronics/purdue-university-fundamentals-of-transistors\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e9a7a6a1-1f2b-420f-990c-cda3554537af-4d7eaf161388.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Engineering\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$ba\",\"shortDescription\":\"\u003cp\u003eThis course develops a simple framework for understanding the essential physics of transistors, including modern nanoscale transistors. Important technology considerations and circuit applications are also discussed.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eMOSFET IV characteristics and device metrics and how to analyze measured transistor characteristics and extract key device parameters.\u003c/li\u003e\\n\u003cli\u003eThe physical operation of transistors and the traditional theory of the MOSFET.\u003c/li\u003e\\n\u003cli\u003e1D/2D/3D MOS electrostatics and the need for advanced MOSFET structures such as the FinFET.\u003c/li\u003e\\n\u003cli\u003eHow modern transport theory (the transmission approach) is applied to nanoscale MOSFETs.\u003c/li\u003e\\n\u003cli\u003eHow other transistors, such as HEMTs and bipolar transistors, operate.\u003c/li\u003e\\n\u003cli\u003eWhat a physics-based compact model is and the role they play in electronic design.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e9a7a6a1-1f2b-420f-990c-cda3554537af\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+69504x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6ff44321-4fbf-4cb3-8d27-39a57b791473\",\"productName\":\"Nanophotonic Modeling\",\"productSlug\":\"learn/engineering/purdue-university-nanophotonic-modeling\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6ff44321-4fbf-4cb3-8d27-39a57b791473-c8adf79cc0e1.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$bb\",\"shortDescription\":\"\u003cp\u003eLearn a comprehensive set of simulation techniques to predict the performance of photonic nanostructures.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ePhotonic bandstructures\u003c/li\u003e\\n\u003cli\u003eTransfer matrices\u003c/li\u003e\\n\u003cli\u003eTime-domain simulations\u003c/li\u003e\\n\u003cli\u003eFinite-element methods\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6ff44321-4fbf-4cb3-8d27-39a57b791473\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+nano540x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a662dad7-cf7e-4bc9-ac3f-ed6dc1aadd2c\",\"productName\":\"Introduction to Quantum Transport\",\"productSlug\":\"learn/electronics/purdue-university-introduction-to-quantum-transport\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a662dad7-cf7e-4bc9-ac3f-ed6dc1aadd2c-20c23ee44744.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Engineering\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$bc\",\"shortDescription\":\"\u003cp\u003eThis course introduces the non-equilibrium Green’s function (NEGF) method widely used to describe quantum effects in nanoscale devices, along with its applications to spintronic devices.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe Schrödinger equation\u003c/li\u003e\\n\u003cli\u003eHow the tight-binding model works\u003c/li\u003e\\n\u003cli\u003eThe concept of bandstructure and E(k) relations\u003c/li\u003e\\n\u003cli\u003eSelf-energy\u003c/li\u003e\\n\u003cli\u003eBroadening\u003c/li\u003e\\n\u003cli\u003eNEGF equations\u003c/li\u003e\\n\u003cli\u003eDephasing\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a662dad7-cf7e-4bc9-ac3f-ed6dc1aadd2c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+69503x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"07d6d8d2-b1e4-4997-a8be-66969c90c770\",\"productName\":\"Fundamentals of Current Flow\",\"productSlug\":\"learn/electronics/purdue-university-fundamentals-of-current-flow\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/07d6d8d2-b1e4-4997-a8be-66969c90c770-319a203ad537.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Engineering\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$bd\",\"shortDescription\":\"\u003cp\u003eGain a new perspective on electron flow in solids with this insightful introduction.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBallistic and diffusive conductance\u003c/li\u003e\\n\u003cli\u003eDensity of states\u003c/li\u003e\\n\u003cli\u003eNumber of modes\u003c/li\u003e\\n\u003cli\u003eConductivity\u003c/li\u003e\\n\u003cli\u003eLandauer formula\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-07d6d8d2-b1e4-4997-a8be-66969c90c770\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+69501x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"406b009a-01ca-40ac-9205-3b3291e86e30\",\"productName\":\"Ethical Principles for Conversational AI\",\"productSlug\":\"learn/artificial-intelligence/the-linux-foundation-ethical-principles-for-conversational-ai\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/406b009a-01ca-40ac-9205-3b3291e86e30-f043f2fa69a8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Communication\",\"Ethics\"],\"partnerName\":[\"The Linux Foundation\"],\"partnerKeys\":[\"LinuxFoundationX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4d254841-5cc9-4174-a28d-5b4f823c0122-51c34231df61.png\",\"fullDescription\":\"$be\",\"shortDescription\":\"\u003cp\u003eLearn about the impact and ethical challenges of conversational/voice AI, while exploring the principles and frameworks needed to help avoid potential harm as humans interact with the technology.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cp dir=\\\"ltr\\\"\u003eExplain how conversational AI/voice technology can empower people to access the digital world and enhance their well-being\u003c/p\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cp dir=\\\"ltr\\\"\u003eDiscuss the ethical issues and implications of conversational/voice AI\u003c/p\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cp dir=\\\"ltr\\\"\u003eUse conversational/voice technology ethically and effectively to improve people's lives and access to the digital world \u003c/p\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cp dir=\\\"ltr\\\"\u003eEvaluate the ethical issues and impact of conversational/voice AI on privacy, data collection, children and other vulnerable users, and cultural biases \u003c/p\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cp dir=\\\"ltr\\\"\u003eUnderstand ethical principles and frameworks to design conversational/voice experiences that avoid harm and create value\u003c/p\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-406b009a-01ca-40ac-9205-3b3291e86e30\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:LinuxFoundationX+LFS118x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"50f4880a-66d9-4b44-ab1b-2cf68dea45a2\",\"productName\":\"Graduate Studies in Japan\",\"productSlug\":\"learn/japanese/tokyo-institute-of-technology-graduate-studies-in-japan\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/50f4880a-66d9-4b44-ab1b-2cf68dea45a2-212c426a7760.png\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$bf\",\"shortDescription\":\"\u003cp\u003eThis course is designed to help you navigate through your journey in graduate school at the Japanese university of your dreams and beyond. The course will introduce you to universities in different regions of Japan and discuss what sets Japanese graduate education apart from the rest of the world. You will also be guided through the application process and necessary decision-making when planning for your stay in Japan. Finally, you will be given some post-graduation career insights from graduates.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of this lesson, you should be able to know more about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eApplication procedure for graduate school in Japan\u003c/li\u003e\\n\u003cli\u003eScholarships, grants, and other financial aids\u003c/li\u003e\\n\u003cli\u003eThings to know before moving to Japan\u003c/li\u003e\\n\u003cli\u003eInternships and job opportunities after graduation\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eYou should also be able to get a feel of the:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDynamics in a research laboratory in Japan\u003c/li\u003e\\n\u003cli\u003eExpectations from graduate students\u003c/li\u003e\\n\u003cli\u003eDaily life in Japan\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-50f4880a-66d9-4b44-ab1b-2cf68dea45a2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+JGrad101x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b0d070e9-c1e2-4878-bd03-e8f0f90427eb\",\"productName\":\"e-Learning course on Innovative Business Models for Expanding Fiber-Optic Networks and Closing the Access Gaps\",\"productSlug\":\"learn/business-model/world-bank-group-e-learning-course-on-innovative-business-models-for-expanding-fiber-optic-networks-and-closing-the-access-gaps\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b0d070e9-c1e2-4878-bd03-e8f0f90427eb-972547e59d8f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Science\",\"Communication\"],\"partnerName\":[\"World Bank Group\"],\"partnerKeys\":[\"WBGx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3ca455dc-4c90-4097-9203-d647e3e70771-af804add6293.png\",\"fullDescription\":\"$c0\",\"shortDescription\":\"\u003cp\u003eThis course is based on the World Bank’s Innovative Business Models for Expanding Fiber-Optic Networks and Closing the Access Gaps report. It reviews and provides guidance on innovative business models and approaches to the deployment of high-speed broadband networks and highlights global trends related to terrestrial spectrum resources that can be leveraged to meet expected future demand and close existing Internet access gaps. The course is intended to help policy makers and regulators assess alternatives for infrastructure deployment and adopt decisions tailored to their country’s circumstances and needs.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eCourse participants will reinforce their knowledge of the importance of broadband access and infrastructure, while learning about business models and technologies that can be employed to improve broadband availability. In particular, participants will be able to more critically consider available business models and technologies that may suit their country’s needs and current situation and to recognize the options to be considered at various decision points. The conclusion of the course is intended to provide participants with a set of key considerations and recommendations for use in evaluation of approaches to expanding broadband infrastructure.\u003c/p\u003e\",\"objectId\":\"course-b0d070e9-c1e2-4878-bd03-e8f0f90427eb\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WBGx+IBMOF2001x+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6566bb2d-8d7d-47f8-b009-6bd160f77cba\",\"productName\":\"Generative AI and its Applications in Finance\",\"productSlug\":\"learn/economics-finance/state-bank-of-india-generative-ai-and-its-applications-in-finance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6566bb2d-8d7d-47f8-b009-6bd160f77cba-75063f3ea967.png\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"State Bank of India\"],\"partnerKeys\":[\"State-Bank-of-India\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6fc80e42-95b2-47c6-a5e8-8d76f104cebd-dd0954c7476b.png\",\"fullDescription\":\"$c1\",\"shortDescription\":\"\u003cp\u003eDiscover how Generative AI transforms financial operations, from risk management to fraud detection. Learn cutting-edge AI techniques to enhance trading strategies and market predictions. Gain competitive insights, adapt swiftly, and stay ahead in global finance. Perfect for forward-thinking professionals!\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this structured course modules, participants will:\u003c/p\u003e\\n\u003cp\u003e✔ \u003cstrong\u003eUnderstand the Foundations of Generative AI in Finance\u003c/strong\u003e – Learn how GANs, VAEs, and Autoregressive Models drive innovation.\u003c/p\u003e\\n\u003cp\u003e✔ \u003cstrong\u003eEnhance Trading \u0026amp; Forecasting Techniques\u003c/strong\u003e – Utilize AI-based tools for market analysis and predictive trading.\u003cbr /\u003e\\n✔ \u003cstrong\u003eStrengthen Risk Management \u0026amp; Fraud Detection\u003c/strong\u003e – Use AI methods to Identify anomalies, assess risks, and mitigate financial fraud effectively.\u003cbr /\u003e\\n✔ \u003cstrong\u003eGenerate \u0026amp; Use Synthetic Financial Data Responsibly\u003c/strong\u003e – Address data scarcity while ensuring privacy compliance.\u003cbr /\u003e\\n✔ \u003cstrong\u003eEthical considerations and regulations\u003c/strong\u003e – Learn best practices for AI governance for responsible and compliant AI usage in finance.\u003c/p\u003e\",\"objectId\":\"course-6566bb2d-8d7d-47f8-b009-6bd160f77cba\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:State-Bank-of-India+SBIIT009x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9a09e075-d750-4882-9b7e-090b6a466af0\",\"productName\":\"Fundamentals of Quantum Information\",\"productSlug\":\"learn/quantum-computing/delft-university-of-technology-fundamentals-of-quantum-information\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9a09e075-d750-4882-9b7e-090b6a466af0-abed87b0f00a.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Electronics\",\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$c2\",\"shortDescription\":\"\u003cp\u003eQuantum information is at the heart of quantum computing: learn how it is mathematically represented via quantum circuits and how to manipulate quantum entanglement with these circuits.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUtilize quantum circuits to represent, manipulate, and measure single/multi-qubit quantum states\u003c/li\u003e\\n\u003cli\u003eCreate entanglement and use it to teleport quantum information\u003c/li\u003e\\n\u003cli\u003eCompile quantum circuits to universal gate sets\u003c/li\u003e\\n\u003cli\u003eUse electron spins to store quantum information in Quantum Inspire, QuTech quantum computing cloud-based platform\u003c/li\u003e\\n\u003cli\u003eUnderstand quantum supremacy and NISQ devices\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9a09e075-d750-4882-9b7e-090b6a466af0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+QTM4x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7b4a9af0-0be1-47a6-9d4d-444740e8ee28\",\"productName\":\"Business and Technology\",\"productSlug\":\"learn/business-administration/acca-business-and-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7b4a9af0-0be1-47a6-9d4d-444740e8ee28-284092c4206f.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"ACCA\"],\"partnerKeys\":[\"ACCA\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5f1ba1eb-92e8-4603-a2eb-f259d182b806-da5851943627.png\",\"fullDescription\":\"$c3\",\"shortDescription\":\"\u003cp\u003eUnderstand the role of accountants in ensuring businesses operate effectively, efficiently and ethically with this ACCA-X course.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eTypes of businesses, their purposes, and their interactions with stakeholders and the external environment\u003c/li\u003e\\r\\n\u003cli\u003eBusiness organisational structure, functions and the role of corporate governance\u003c/li\u003e\\r\\n\u003cli\u003eThe function of accountancy and audit\u003c/li\u003e\\r\\n\u003cli\u003eThe principles of authority, leadership and team management\u003c/li\u003e\\r\\n\u003cli\u003ePersonal effectiveness as the basis for effective team and organisational behaviour\u003c/li\u003e\\r\\n\u003cli\u003eUpholding professional ethics and professional values in business\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-7b4a9af0-0be1-47a6-9d4d-444740e8ee28\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ACCA+FBT-BT-AB+FBT1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"31e8afc6-bb66-4c4a-8722-4e7877ba86d2\",\"productName\":\"Instructional Design and Technology: Learning Theories\",\"productSlug\":\"learn/design/university-of-maryland-global-campus-instructional-design-and-technology-learning-theories\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/31e8afc6-bb66-4c4a-8722-4e7877ba86d2-519f7f72a601.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"$c4\",\"shortDescription\":\"\u003cp\u003eExplore the evolution of learning theories, from traditional behavior-based approaches to the emerging understanding of how social engagement can enhance the learning process.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon successful completion of this course, you will be able to:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003eDescribe how foundational learning theories such as behaviorism, cognitivism, and constructivism inform the design of learning. \u003c/li\u003e\\n\u003cli\u003eIntegrate principles of cultural responsiveness and diversity, equity, and inclusion into the learning design process. \u003c/li\u003e\\n\u003cli\u003eGenerate learner profiles for a group of prospective learners, using generative artificial intelligence (AI) as a thought-partner. \u003c/li\u003e\\n\u003cli\u003eDevelop a lesson plan for a learning experience that displays knowledge and application of learning theories, learner profiles, and related principles. \u003c/li\u003e\\n\u003cli\u003eCreate a professional learning plan for personal development and growth. \u003c/li\u003e\\n\u003cli\u003ePublish an instructional design portfolio framework to showcase work completed throughout the program.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-31e8afc6-bb66-4c4a-8722-4e7877ba86d2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+LDT100x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"08acc095-2ad8-4922-aa5d-7ad909c4de48\",\"productName\":\"Instructional Design: Digital Media, New Tools and Technology\",\"productSlug\":\"learn/design-thinking/university-of-maryland-global-campus-instructional-design-digital-media-new-tools-and-technology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/08acc095-2ad8-4922-aa5d-7ad909c4de48-9d5f73e5f6bd.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"$c5\",\"shortDescription\":\"\u003cp\u003eExplore the design, development and use of digital media and emerging technologies to support online teaching and learning.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eDescribe how different types of media can be used to aid and enhance learning, understanding the cognitive and affective impacts of media on learners. \u003c/li\u003e\\n\u003cli\u003eDesign and develop various digital media, such as images, audio, video, animations, and interactive elements, specifically for enhancing learning experiences. \u003c/li\u003e\\n\u003cli\u003eApply principles of graphic design, visual literacy, and multimedia design in the creation of educational content, ensuring that media effectively supports and enhances learning objectives.s\u003c/li\u003e\\n\u003cli\u003eAssign appropriate licenses adhering to digital and intellectual property rights when designing media. \u003c/li\u003e\\n\u003cli\u003eCreate instructional media accessible to a diverse range of learners, incorporating principles of inclusivity and accessibility to meet all learners' needs.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-08acc095-2ad8-4922-aa5d-7ad909c4de48\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+LDT300x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d5f1842e-f1b4-45be-ae74-80392859030f\",\"productName\":\"Freedom of Expression and Information in the Time of Globalization: Foundational Course\",\"productSlug\":\"learn/international-law/columbia-university-freedom-of-expression-and-information-in-the-time-of-globalization-foundational-course\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d5f1842e-f1b4-45be-ae74-80392859030f-644cb75753d6.png\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Humanities\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"Columbia University\"],\"partnerKeys\":[\"ColumbiaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3d8fc08e-339f-467a-a6c0-2b956ca5d6a0-797c0c6ddbc6.png\",\"fullDescription\":\"$c6\",\"shortDescription\":\"This course examines the norms, institutions and forces that altogether have founded a global system of protection for freedom of expression and information.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eThe principles and values behind the protection of freedom of expression and information\u003c/li\u003e\\r\\n\u003cli\u003eThe international standards and legal tests governing freedom of expression and how courts around the world have implemented them\u003c/li\u003e\\r\\n\u003cli\u003eThe extent and limits to freedom of expression, particularly as applied to political speech, the media, and information held by governments.\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-d5f1842e-f1b4-45be-ae74-80392859030f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ColumbiaX+GFOE1+2T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2e9e2f98-b4b7-49c7-b5b2-861703e938d1\",\"productName\":\"The Computing Technology Inside Your Smartphone\",\"productSlug\":\"learn/computer-programming/cornell-university-the-computing-technology-inside-your-smartphone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2e9e2f98-b4b7-49c7-b5b2-861703e938d1-d4a15f819d6a.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Cornell University\"],\"partnerKeys\":[\"CornellX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/99661642-a500-4988-bd1b-97877bd6e232-6903c8a95279.png\",\"fullDescription\":\"\u003cp\u003eWe use our smartphones to communicate, to organize our lives, to find information, and to entertain ourselves. All of this is possible because a smartphone contains a powerful computer processor, which is the subject of this course. This computer science course starts by moving step-by-step through the fundamental layers of computing technology, from binary numbers to application software, and then covers advanced performance techniques and the details of actual smartphone processors.\u003c/p\u003e\\n\u003cp\u003eLearn about:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDigital logic\u003c/li\u003e\\n\u003cli\u003eComputer organization\u003c/li\u003e\\n\u003cli\u003eInstruction sets\u003c/li\u003e\\n\u003cli\u003eApplication Software\u003c/li\u003e\\n\u003cli\u003eAdvanced performance techniques\u003c/li\u003e\\n\u003cli\u003eActual smartphone processors\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eThis Course also provides students with the technical knowledge and the Jade design tool experience to succeed in the more advanced MITx 6.004 MOOC - Computation Structures course sequence.\u003c/p\u003e\",\"shortDescription\":\"Explore the fundamental computing technology inside smartphones and the advanced techniques that make them run so fast.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eDescribe how a smartphone processor works\u003c/li\u003e\\n\\t\u003cli\u003eExplain computer system design from binary information to programming\u003c/li\u003e\\n\\t\u003cli\u003eDesign a small working computer\u003c/li\u003e\\n\\t\u003cli\u003eDescribe common techniques used to make computers fast\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2e9e2f98-b4b7-49c7-b5b2-861703e938d1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CornellX+ENGRI1210x+2T2016\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c18cce62-5f66-4119-aedd-cf44e37f836e\",\"productName\":\"Understanding Wireless: Technology, Economics, and Policy\",\"productSlug\":\"learn/technology/university-of-notre-dame-understanding-wireless-technology-economics-and-policy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c18cce62-5f66-4119-aedd-cf44e37f836e-b004d2a95178.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\",\"Law\"],\"partnerName\":[\"University of Notre Dame\"],\"partnerKeys\":[\"NotreDameX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2c5210cb-3d23-4ba8-bcfa-edc7f0cfb368-1b48c3164a0a.png\",\"fullDescription\":\"$c7\",\"shortDescription\":\"\u003cp\u003ePursue a verified certificate for a chance to share your final project and receive $5,000 USD to implement your wireless idea to improve your community!\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify the major historical and structural developments in the field of wireless communications\u003c/li\u003e\\n\u003cli\u003eExplore the challenges of wireless technologies present in spectrum allocation, privacy, and net neutrality\u003c/li\u003e\\n\u003cli\u003eExamine wireless technology through the lenses of economics, law, and engineering\u003c/li\u003e\\n\u003cli\u003eExplain how devices and applications relay information wirelessly\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c18cce62-5f66-4119-aedd-cf44e37f836e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:NotreDameX+EG240x+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"23ed8d2e-5ca3-47d4-9971-ec7749c5c18b\",\"productName\":\"Digital Technology and Innovation\",\"productSlug\":\"learn/digital-transformation/indiana-university-digital-technology-and-innovation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-4add34fa66fa.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Indiana University\"],\"partnerKeys\":[\"IUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8946fb40-f288-4e05-9275-9e9b4689bda8-e58c545e2296.png\",\"fullDescription\":\"\u003cp\u003e\u003cstrong\u003eThis course will be retired.\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003eIn developing the digital ecosystem, a CIO adds value by strategically infusing business with innovative digital technologies. This requires an understanding of the range of technologies that are transforming the way business is done. Additionally, a successful CIO must be able to manage the adoption, implementation, and diffusion of tech within an organization. This includes analyzing the role of innovation and executing change strategies.\u003c/p\u003e\\n\u003cp\u003eThis course helps prepare professionals for digital transformation skills at the intersection of business and technology.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLook at digital technology and innovation from the perspective of a chief information officer (CIO). Learn about Agile frameworks, cybersecurity and risk management, IT investments, and vendor management.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe role of the CIO\u003c/li\u003e\\n\u003cli\u003eKey topics in IT management, including management of IT investments, IT portfolios, vendors, talent, and organizational change\u003c/li\u003e\\n\u003cli\u003eIT project management including the role of Agile frameworks\u003c/li\u003e\\n\u003cli\u003eCybersecurity and risk management\u003c/li\u003e\\n\u003cli\u003eEnterprise data management, business analytics, and machine learning\u003c/li\u003e\\n\u003cli\u003eThe role of emerging technologies. such as blockchain and distributed trust, artificial intelligence, and robotic process automation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-23ed8d2e-5ca3-47d4-9971-ec7749c5c18b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IUx+BUKD-X591+2T2023a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"389d5e5e-7679-467e-b5bb-b21c9c86ca1f\",\"productName\":\"Introduction to Biology - The Secret of Life\",\"productSlug\":\"learn/biology/massachusetts-institute-of-technology-introduction-to-biology-the-secret-of-life\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/389d5e5e-7679-467e-b5bb-b21c9c86ca1f-31a7731a68f2.jpg\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Medicine\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$c8\",\"shortDescription\":\"\u003cp\u003eExplore the secret of life through the basics of biochemistry, genetics, molecular biology, recombinant DNA, genomics and rational medicine.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to describe the building blocks of life and how their interactions dictate structure and function in biology\u003c/li\u003e\\n\u003cli\u003eHow to predict genotypes and phenotypes given genetics data\u003c/li\u003e\\n\u003cli\u003eHow to explain the central dogma of molecular biology and convert DNA sequence to RNA sequence to protein sequence\u003c/li\u003e\\n\u003cli\u003eHow to use molecular tools to study biology\u003c/li\u003e\\n\u003cli\u003eHow to describe the principles of early sequencing as well as modern sequencing and the effects of these technologies on the filed of genomics\u003c/li\u003e\\n\u003cli\u003eHow to apply the principles of modern biology to issues in today's society\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-389d5e5e-7679-467e-b5bb-b21c9c86ca1f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.00x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a1199821-4cc5-4c84-a738-b6aff1450e0b\",\"productName\":\"Biochemistry: Biomolecules, Methods, and Mechanisms\",\"productSlug\":\"learn/biochemistry/massachusetts-institute-of-technology-biochemistry-biomolecules-methods-and-mechanisms\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a1199821-4cc5-4c84-a738-b6aff1450e0b-8f0eafb5f67e.jpg\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Chemistry\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$c9\",\"shortDescription\":\"\u003cp\u003eEnhance your scientific thinking and data analysis skills with this in-depth adventure through biochemistry.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to apply the scientific method to pursue research questions.\u003c/li\u003e\\n\u003cli\u003eHow to analyze protein purification schemes.\u003c/li\u003e\\n\u003cli\u003eHow scientists determine the structure of a protein.\u003c/li\u003e\\n\u003cli\u003eHow structure, allostery, and the Bohr effect influence hemoglobin function.\u003c/li\u003e\\n\u003cli\u003eHow to interpret graphs, plot behaviors, and calculate constants related to enzyme function.\u003c/li\u003e\\n\u003cli\u003eHow pumps, transporters, and channels differ to regulate molecule transfer across membranes.\u003c/li\u003e\\n\u003cli\u003eHow G proteins play a key role in signaling.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a1199821-4cc5-4c84-a738-b6aff1450e0b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.05x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"100103b4-353a-457b-927c-4a3f518cecc5\",\"productName\":\"Genetics: The Fundamentals\",\"productSlug\":\"learn/genetics/massachusetts-institute-of-technology-genetics-the-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/100103b4-353a-457b-927c-4a3f518cecc5-f79d63aec87c.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$ca\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about heredity? Enhance your scientific thinking and experimental design skills with this in-depth adventure through genetics.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to appreciate the applications of genetics to everyday life.\u003c/li\u003e\\n\u003cli\u003eHow to apply terminology appropriately to concepts in genetics. \u003c/li\u003e\\n\u003cli\u003eHow to justify the use of specific techniques and methods for answering different genetic questions. \u003c/li\u003e\\n\u003cli\u003eHow to design genetic crosses to make conclusions about genotypes, modes of inheritance, and linkage.\u003c/li\u003e\\n\u003cli\u003eHow to use a quantitative approach to determine different genetic probabilities and calculate genetic distances.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-100103b4-353a-457b-927c-4a3f518cecc5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.03.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bb90d02a-a562-4632-a0af-e72987f27fea\",\"productName\":\"Cybersecurity Fundamentals\",\"productSlug\":\"learn/cybersecurity/rochester-institute-of-technology-cybersecurity-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bb90d02a-a562-4632-a0af-e72987f27fea-8b470ba34e03.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eIn this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.\u003c/p\u003e\\n\u003cp\u003eYou will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.\u003c/p\u003e\\n\u003cp\u003eThis offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eNetwork and system administration fundamentals\u003c/li\u003e\\n\u003cli\u003eInformation assurance fundamentals such as confidentiality, integrity and availability, etc.\u003c/li\u003e\\n\u003cli\u003eBasic cryptography concepts\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bb90d02a-a562-4632-a0af-e72987f27fea\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER501x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1bd027c1-6ac0-43c1-ae01-1d4975597282\",\"productName\":\"Cell Biology: Transport and Signaling\",\"productSlug\":\"learn/cellular-biology/massachusetts-institute-of-technology-cell-biology-transport-and-signaling\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1bd027c1-6ac0-43c1-ae01-1d4975597282-9e134c5fed85.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$cb\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about cells? Enhance your scientific thinking and data analysis skills with this in-depth adventure through cell biology.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to apply biochemical and genetic approaches to address fundamental questions of transport and signaling in the cell.\u003c/li\u003e\\n\u003cli\u003eHow to evaluate the conclusions and models that scientists develop about cell biology from experimental approaches and results.\u003c/li\u003e\\n\u003cli\u003eHow to select specific empirical methods and techniques based on the different kinds of questions scientists ask.\u003c/li\u003e\\n\u003cli\u003eHow to design experiments to answer cell biology experiments with proper controls.\u003c/li\u003e\\n\u003cli\u003eHow to assess biological necessity and sufficiency from experimental results.\u003c/li\u003e\\n\u003cli\u003eHow to compare and contrast protein transport and signaling pathways processes. \u003c/li\u003e\\n\u003cli\u003eHow to identify recurring themes in protein transport and signal transduction.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-1bd027c1-6ac0-43c1-ae01-1d4975597282\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.06.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"40e02c86-a59c-4e18-886a-a6d6e75aa081\",\"productName\":\"Data Representation and Visualization in Tableau\",\"productSlug\":\"learn/data-visualization/rochester-institute-of-technology-data-representation-and-visualization-in-tableau\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/40e02c86-a59c-4e18-886a-a6d6e75aa081-01853eb2d3b4.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"$cc\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eUse Tableau to explore data and discover insights to innovate data-driven decision-making.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eAfter completing this course, learners will be able to: \u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e●\u003cspan lang=\\\"EN\\\"\u003e Identify key points from data analysis and integrate them with other important information\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e●\u003cspan lang=\\\"EN\\\"\u003e Use Tableau to create meaningful tables and graphical representations to organize and visually present data\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e●\u003cspan lang=\\\"EN\\\"\u003e Critically assess graphical representations for accuracy and misrepresentation of data\u003c/span\u003e\u003cspan lang=\\\"EN\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e●\u003cspan lang=\\\"EN\\\"\u003e Evaluate decisions/solutions based on data\u003c/span\u003e\u003c/p\u003e\",\"objectId\":\"course-40e02c86-a59c-4e18-886a-a6d6e75aa081\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+Data103x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f58e5505-867a-4e17-b810-d8d8977f3bff\",\"productName\":\"Façade design and engineering: complexity made simple\",\"productSlug\":\"learn/engineering/delft-university-of-technology-facade-design-and-engineering-complexity-made-simple\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f58e5505-867a-4e17-b810-d8d8977f3bff-8888ae8494f9.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Architecture\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$cd\",\"shortDescription\":\"\u003cp\u003eUnderstand the fundamental technology behind façade design and construction and the impact of the various components in facilitating the construction of sustainable, energy efficient, aesthetic and modern buildings.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eExplore the main principles involved in façade design in the context of sustainability.\u003c/li\u003e\\n\u003cli\u003eCategorize different façade technologies and materials, their potential and shortcomings.\u003c/li\u003e\\n\u003cli\u003eIncorporate façades’ lines of defense (air, wind, water) systematically into individual designs.\u003c/li\u003e\\n\u003cli\u003eRecognize structural demands on façades and tolerances, and integrate them into façade development.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f58e5505-867a-4e17-b810-d8d8977f3bff\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+FDE01x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e6fd007e-0bff-4138-8789-01ee2cfbeb66\",\"productName\":\"Solar Energy: Photovoltaic (PV) Systems\",\"productSlug\":\"learn/solar-energy/delft-university-of-technology-solar-energy-photovoltaic-pv-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e6fd007e-0bff-4138-8789-01ee2cfbeb66-d36f6aa2a2b7.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Electronics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$ce\",\"shortDescription\":\"\u003cp\u003eExplore the wide range of solar energy applications and learn to design a real PV installation with excellent performance and reliability.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eHow to design a PV system ranging from a residential rooftop system to a utility scale solar farm taking in to account: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe effects of the position of the sun and solar irradiance on PV module performance\u003c/li\u003e\\n\u003cli\u003eComponents of a PV system: PV modules, inverters, DC-DC converters, batteries, charge controllers and cables\u003c/li\u003e\\n\u003cli\u003eThe economics and impact on the grid of PV systems\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cstrong\u003eAudit learners\u003c/strong\u003e can develop their skills and knowledge in relation to the above learning objectives by having access to the video lectures, a limited number of practice exercises and discussion forums. \u003c/p\u003e\\n\u003cp\u003e\u003cstrong\u003eVerified learners\u003c/strong\u003e are offered a number of study tools to demonstrate they have mastered the learning objectives. They will have access to all exercises: practice, graded and exams.\u003c/p\u003e\",\"objectId\":\"course-e6fd007e-0bff-4138-8789-01ee2cfbeb66\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV3x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0bf58e47-9454-4c30-a1a5-081ae6b795e0\",\"productName\":\"Genetics: Analysis and Applications\",\"productSlug\":\"learn/genetics/massachusetts-institute-of-technology-genetics-analysis-and-applications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0bf58e47-9454-4c30-a1a5-081ae6b795e0-ce0bbfb6764d.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$cf\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about heredity? Enhance your scientific thinking and experimental design skills with this in-depth adventure through genetics.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to appreciate the applications of genetics to everyday life.\u003c/li\u003e\\n\u003cli\u003eHow to apply terminology appropriately to concepts in genetics. \u003c/li\u003e\\n\u003cli\u003eHow to justify the use of specific techniques and methods for answering different genetic questions. \u003c/li\u003e\\n\u003cli\u003eHow to analyze the location and type of mutation or chromosomal change. \u003c/li\u003e\\n\u003cli\u003eHow to find or create mutants of interest. \u003c/li\u003e\\n\u003cli\u003eHow to explain the impact of genetics on development and behavior.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-0bf58e47-9454-4c30-a1a5-081ae6b795e0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.03.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0a923310-9e7f-4ca6-9f6f-575dcc75e196\",\"productName\":\"Calculus II: Multivariable Functions\",\"productSlug\":\"learn/calculus/delft-university-of-technology-calculus-ii-multivariable-functions\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0a923310-9e7f-4ca6-9f6f-575dcc75e196-e8ccb7009807.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Math\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$d0\",\"shortDescription\":\"\u003cp\u003eThis course provides an overview of bachelor-level calculus of multivariable functions (Calculus II). You will review many basic concepts related to differentiation and integration of multivariable functions.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eVisualize functions of two variables and read off qualitative information from graphs and contour plots.\u003c/li\u003e\\n\u003cli\u003eCalculate (higher order) partial derivatives for a variety of multivariable functions.\u003c/li\u003e\\n\u003cli\u003eCalculate and interpret directional derivatives and gradients of multivariable functions.\u003c/li\u003e\\n\u003cli\u003eFind and classify critical points of functions of two variables and determine extreme values for functions of compact domains.\u003c/li\u003e\\n\u003cli\u003eEvaluate double integrals over general integration domains using cartesian or polar coordinates.\u003c/li\u003e\\n\u003cli\u003eEvaluate triple integrals over general integration domains using cartesian, cylindrical or spherical coordinates.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0a923310-9e7f-4ca6-9f6f-575dcc75e196\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+MMFEC2x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"53a8226e-05c4-4e28-bcce-4403cc7fb197\",\"productName\":\"Cell Biology: Cell-Cell Interactions\",\"productSlug\":\"learn/cellular-biology/massachusetts-institute-of-technology-cell-biology-cell-cell-interactions\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/53a8226e-05c4-4e28-bcce-4403cc7fb197-81b717ebaabb.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$d1\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about cells? Enhance your scientific thinking and data analysis skills with this in-depth adventure through cell biology.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to apply biochemical and genetic approaches to address fundamental questions regarding regulation of cellular functions and interactions.\u003c/li\u003e\\n\u003cli\u003eHow to evaluate the conclusions and models that scientists develop about cell biology from experimental approaches and results.\u003c/li\u003e\\n\u003cli\u003eHow to select specific empirical methods and techniques based on the different types of questions scientists ask.\u003c/li\u003e\\n\u003cli\u003eHow to design experiments to answer cell biology experiments with proper controls.\u003c/li\u003e\\n\u003cli\u003eHow to compare and contrast the properties of different cell types.\u003c/li\u003e\\n\u003cli\u003eHow to identify recurring themes in cell biology impacting human health.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-53a8226e-05c4-4e28-bcce-4403cc7fb197\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.06.3x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3f2d9b25-40be-4cd8-898c-6a1b8637bfec\",\"productName\":\"The Hardware of a Quantum Computer\",\"productSlug\":\"learn/quantum-computing/delft-university-of-technology-the-hardware-of-a-quantum-computer\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3f2d9b25-40be-4cd8-898c-6a1b8637bfec-226a1c5b9eef.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Physics\",\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$d2\",\"shortDescription\":\"\u003cp\u003eLearn how a quantum computer could be physically build, and how it could be controlled.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAn overview of the building blocks of a quantum computer;\u003c/li\u003e\\n\u003cli\u003eHow four of the most promising types of solid-state qubits work: superconducting Transmon qubits, Silicon spin qubits, diamond NV center qubits, and topological qubits;\u003c/li\u003e\\n\u003cli\u003eHow quantum gates, the basic operations of quantum computing, are performed on each of these qubit implementations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-3f2d9b25-40be-4cd8-898c-6a1b8637bfec\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+QTM2x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"faae9d35-1a89-4f4c-bc8f-f3647868720a\",\"productName\":\"Detailing Stick-System Façades: A Practical Approach\",\"productSlug\":\"learn/architecture/delft-university-of-technology-how-to-detail-a-stick-facade\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/faae9d35-1a89-4f4c-bc8f-f3647868720a-ff3834a483e3.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Architecture\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$d3\",\"shortDescription\":\"\u003cp\u003eMaster the standard details of a stick-system façade and learn to apply them in façade engineering design.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAfter completing this course, the learner will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDraw details for a typical stick-system façade\u003c/li\u003e\\n\u003cli\u003eRecognize the impact of different specialties on the iterative design process of façade detailing\u003c/li\u003e\\n\u003cli\u003ePredict the effect(s) of choosing an alternative system\u003c/li\u003e\\n\u003cli\u003eChoose the appropriate detail view and information to show for each stakeholder (specialty)\u003c/li\u003e\\n\u003cli\u003eCommunicate effectively about façade design to aid a more integrated design process\u003c/li\u003e\\n\u003cli\u003eConfidently apply general concepts in façade design to future designs (i.e. structural, building physics, and construction)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-faae9d35-1a89-4f4c-bc8f-f3647868720a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+HDSF1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2fd709f3-54ac-4653-9d54-f65310f2656c\",\"productName\":\"Genetics: Population Genetics and Human Traits\",\"productSlug\":\"learn/genetics/massachusetts-institute-of-technology-genetics-population-genetics-and-human-traits\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2fd709f3-54ac-4653-9d54-f65310f2656c-84c54948054b.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$d4\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about heredity? Enhance your scientific thinking and experimental design skills with this in-depth adventure through genetics.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to appreciate the applications of genetics to everyday life.\u003c/li\u003e\\n\u003cli\u003eHow to apply terminology appropriately to concepts in genetics. \u003c/li\u003e\\n\u003cli\u003eHow to justify the use of specific sequencing methods for answering genetic questions.\u003c/li\u003e\\n\u003cli\u003eHow to interpret the patterns and driving forces of genetic variation within and between human populations. \u003c/li\u003e\\n\u003cli\u003eHow to analyze results from genome-wide association studies. \u003c/li\u003e\\n\u003cli\u003eHow to use a quantitative approach to determine genetic features of different populations.\u003c/li\u003e\\n\u003cli\u003eHow to explain the impact of genetic tools on human society.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-2fd709f3-54ac-4653-9d54-f65310f2656c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.03.3x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"80bdc3fd-7029-4d22-aa2a-8a4b5fe4c166\",\"productName\":\"Cell Biology: The Cytoskeleton and Cell Cycle\",\"productSlug\":\"learn/cellular-biology/massachusetts-institute-of-technology-cell-biology-the-cytoskeleton-and-cell-cycle\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/80bdc3fd-7029-4d22-aa2a-8a4b5fe4c166-1e3325083a19.png\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Medicine\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$d5\",\"shortDescription\":\"\u003cp\u003eHow do we know what we know about cells? Enhance your scientific thinking and data analysis skills with this in-depth adventure through cell biology.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eHow to apply biochemical and genetic approaches to address fundamental questions regarding the regulation of cell structure and division.\u003c/li\u003e\\n\u003cli\u003eHow to evaluate the conclusions and models that scientists develop about cell biology from experimental approaches and results.\u003c/li\u003e\\n\u003cli\u003eHow to select specific empirical methods and techniques based on the different types of questions scientists ask.\u003c/li\u003e\\n\u003cli\u003eHow to design experiments with proper controls to answer cell biology questions.\u003c/li\u003e\\n\u003cli\u003eHow to compare and contrast the roles of actin and microtubule cytoskeletal elements.\u003c/li\u003e\\n\u003cli\u003eHow to identify recurring themes in maintaining cellular architecture throughout the cell cycle.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-80bdc3fd-7029-4d22-aa2a-8a4b5fe4c166\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+7.06.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"82e5c3a1-7d19-44d8-bbbc-f3cda6691a64\",\"productName\":\"Solar Energy: Photovoltaic (PV) Energy Conversion\",\"productSlug\":\"learn/solar-energy/delft-university-of-technology-solar-energy-photovoltaic-pv-energy-conversion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/82e5c3a1-7d19-44d8-bbbc-f3cda6691a64-78c134e01e06.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Energy \u0026 Earth Sciences\",\"Environmental Studies\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$d6\",\"shortDescription\":\"\u003cp\u003eLearn how solar cells generate electricity, and about the semiconductor physics and optics required to design and manufacture solar cells.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe principles behind the potential loss mechanisms in photovoltaic devices\u003c/li\u003e\\n\u003cli\u003eThe semiconductor physics necessary to understand solar cell performance and engineering\u003c/li\u003e\\n\u003cli\u003eThe optics and light management tools necessary for optimal solar cell design\u003c/li\u003e\\n\u003cli\u003eTo model all aspects of a working solar cell, understanding the efficiency limits and design rules\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cstrong\u003eAudit learners\u003c/strong\u003e can develop their skills and knowledge in relation to the above learning objectives by having access to the video lectures, a limited number of practice exercises and discussion forums. \u003c/p\u003e\\n\u003cp\u003e\u003cstrong\u003eVerified learners\u003c/strong\u003e are offered a number of study tools to demonstrate they have mastered the learning objectives. They will have access to all exercises: practice, graded and exam questions.\u003c/p\u003e\",\"objectId\":\"course-82e5c3a1-7d19-44d8-bbbc-f3cda6691a64\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c913261b-8081-4f28-9c10-0079b616ab39\",\"productName\":\"Cybersecurity Risk Management\",\"productSlug\":\"learn/risk-management/rochester-institute-of-technology-cybersecurity-risk-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c913261b-8081-4f28-9c10-0079b616ab39-9b5fb6076d7d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"$d7\",\"shortDescription\":\"\u003cp\u003eLearn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eInformation security risk management framework and methodologies\u003c/li\u003e\\n\u003cli\u003eIdentifying and modeling information security risks\u003c/li\u003e\\n\u003cli\u003eQualitative and quantitative risk assessment methods\u003c/li\u003e\\n\u003cli\u003eArticulating information security risks as business consequences\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c913261b-8081-4f28-9c10-0079b616ab39\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+CYBER503x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"723999e6-4b59-4f7c-b3cb-fb4ec59160c7\",\"productName\":\"Sensor Fusion and Non-linear Filtering for Automotive Systems\",\"productSlug\":\"learn/mechanical-engineering/chalmers-university-of-technology-sensor-fusion-and-non-linear-filtering-for-automotive-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/723999e6-4b59-4f7c-b3cb-fb4ec59160c7-c0188b59d770.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Chalmers University of Technology\"],\"partnerKeys\":[\"ChalmersX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6233178f-b703-4c85-bcea-3b3c55ef9289-8c26535e6e82.png\",\"fullDescription\":\"$d8\",\"shortDescription\":\"\u003cp\u003eLearn fundamental algorithms for sensor fusion and non-linear filtering with application to automotive perception systems.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBasics of Bayesian statistics and recursive estimation theory\u003c/li\u003e\\n\u003cli\u003eDescribe and model common sensors, and their measurements\u003c/li\u003e\\n\u003cli\u003eCompare typical motion models used for positioning, in order to know when to use them in practical problems\u003c/li\u003e\\n\u003cli\u003eDescribe the essential properties of the Kalman filter (KF) and apply it on linear state space models\u003c/li\u003e\\n\u003cli\u003eImplement key nonlinear filters in Matlab, in order to solve problems with nonlinear motion and/or sensor models\u003c/li\u003e\\n\u003cli\u003eSelect a suitable filter method by analysing the properties and requirements in an application\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-723999e6-4b59-4f7c-b3cb-fb4ec59160c7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ChalmersX+ChM015x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"38b8dc96-629b-483b-bafa-9e2cbf826503\",\"productName\":\"The Quantum Internet and Quantum Computers: How Will They Change the World?\",\"productSlug\":\"learn/quantum-computing/delft-university-of-technology-the-quantum-internet-and-quantum-computers-how-will-they-change-the-world\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/38b8dc96-629b-483b-bafa-9e2cbf826503-d1ba14f8f486.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Science\",\"Physics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$d9\",\"shortDescription\":\"\u003cp\u003eDiscover quantum computers and the quantum internet. Learn the principles and promises behind these developments and how quantum computing and quantum information will impact our future.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe basics of quantum computing and the quantum internet\u003c/li\u003e\\n\u003cli\u003eThe key application areas in which quantum technologies will change the world.\u003c/li\u003e\\n\u003cli\u003eThe potential advantages of a quantum computer and the quantum internet, but also the challenges in realizing them.\u003c/li\u003e\\n\u003cli\u003eThe basic quantum phenomena that make quantum technologies possible.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-38b8dc96-629b-483b-bafa-9e2cbf826503\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+QTM1x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"241c7604-5986-472c-bd80-ab8680511552\",\"productName\":\"Solar Energy: Integration of Photovoltaic Systems in Microgrids\",\"productSlug\":\"learn/solar-energy/delft-university-of-technology-solar-energy-integration-of-photovoltaic-systems-in-microgrids\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/241c7604-5986-472c-bd80-ab8680511552-47344f334919.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Electronics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$da\",\"shortDescription\":\"\u003cp\u003eLearn how to integrate a photovoltaic system into a microgrid of your design.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDifference between a microgrid, a passive distribution grid and a virtual power plant\u003c/li\u003e\\n\u003cli\u003eAncillary services provided by microgrids and PV\u003c/li\u003e\\n\u003cli\u003eOperation of centralized and decentralized control, forecasting, and evaluation of different market policies through a case study\u003c/li\u003e\\n\u003cli\u003eOperation of active power control and voltage regulation\u003c/li\u003e\\n\u003cli\u003eDifferent layouts and topologies of microgrids and power electronic components, and the role of power electronics converters in microgrids\u003c/li\u003e\\n\u003cli\u003eMicrogrid protection, adaptive protection, and the consequences of using a fault current source and fault current limitation\u003c/li\u003e\\n\u003cli\u003eMain motivations and challenges for the implementation of DC microgrids\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eVerified learners will have the added benefit of evaluating different strategies to control multiple inverters and to analyze local control to improve stability.\u003c/p\u003e\",\"objectId\":\"course-241c7604-5986-472c-bd80-ab8680511552\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV4x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d22f8451-ea79-4bd7-b813-443ea03b17b8\",\"productName\":\"Quantum Communication and the Quantum Network Explorer\",\"productSlug\":\"learn/computer-science/delft-university-of-technology-quantum-communication-and-quantum-network-explorer-qne\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d22f8451-ea79-4bd7-b813-443ea03b17b8-4ecd2ef1bb2b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Physics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$db\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of quantum networks and their applications with QuTech’s Quantum Network Explorer.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eUnderstand the fundamentals of quantum networks and their future applications.\u003c/li\u003e\\n\u003cli\u003eUtilize the diverse resources provided by the Quantum Network Explorer to gain practical insight into quantum networks through hands-on experience.\u003c/li\u003e\\n\u003cli\u003eRun your own quantum network simulations by leveraging the pre-built applications available in QNE’s Community Application Library.\u003c/li\u003e\\n\u003cli\u003eDevelop customized quantum network applications using QNE’s Application Development Kit (QNE-ADK) and contribute to the global QNE community by sharing your work.\u003c/li\u003e\\n\u003cli\u003eUse SquidASM as an advanced simulator for quantum network applications, elevating your research capabilities to the next level.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-d22f8451-ea79-4bd7-b813-443ea03b17b8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+QCQN1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"84566cd9-39a9-4b4e-9446-bcb7cf274671\",\"productName\":\"Road Traffic Safety in Automotive Engineering\",\"productSlug\":\"learn/engineering/chalmers-university-of-technology-road-traffic-safety-in-automotive-engineering\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/84566cd9-39a9-4b4e-9446-bcb7cf274671-3d657f8a436b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Health \u0026 Safety\",\"Computer Science\"],\"partnerName\":[\"Chalmers University of Technology\"],\"partnerKeys\":[\"ChalmersX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6233178f-b703-4c85-bcea-3b3c55ef9289-8c26535e6e82.png\",\"fullDescription\":\"$dc\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of passive and active safety in automotive engineering\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCurrent and upcoming means to reduce traffic related fatalities and injuries\u003c/li\u003e\\n\u003cli\u003eCar structure design and crash configuration influence on the vehicle occupant loading\u003c/li\u003e\\n\u003cli\u003ePrinciples of future integrated safety systems\u003c/li\u003e\\n\u003cli\u003eHuman body biomechanical and physiological response\u003c/li\u003e\\n\u003cli\u003eSimulations for crash safety assessment\u003c/li\u003e\\n\u003cli\u003eImportance of active preventive safety and the complexity of the driver/vehicle/environment (DVE) system\u003c/li\u003e\\n\u003cli\u003eSensor principles and the design and functions of current active safety systems\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-84566cd9-39a9-4b4e-9446-bcb7cf274671\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ChalmersX+ChM011x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c363944c-5adb-4490-b8f9-2b9b77be2952\",\"productName\":\"Solar Energy: Photovoltaic (PV) Technologies\",\"productSlug\":\"learn/solar-energy/delft-university-of-technology-solar-energy-photovoltaic-pv-technologies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c363944c-5adb-4490-b8f9-2b9b77be2952-956f581b8aa1.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Electronics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$dd\",\"shortDescription\":\"\u003cp\u003eExplore the main PV technologies in the current market, to gain in-depth knowledge on the design and processing methods of solar cells.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDesign concepts and fabrication processes of various photovoltaic technologies,\u003c/li\u003e\\n\u003cli\u003eIn-depth knowledge on the entire crystalline silicon solar cell landscape including, \u003cul\u003e\\n\u003cli\u003eMarket-leading polycrystalline based cells\u003c/li\u003e\\n\u003cli\u003eHigh efficiency/cutting edge monocrystalline based solar cells\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003eApplication of thin film solar cells, like CIGS, CdTe, thin-film silicon, Perovskites,\u003c/li\u003e\\n\u003cli\u003eConcentrated PV and space applications for III/V semiconductor based solar cells.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cstrong\u003eAudit learners\u003c/strong\u003e can develop their skills and knowledge in relation to the above learning objectives by having access to the video lectures, a limited number of practice exercises and discussion forum. \u003c/p\u003e\\n\u003cp\u003e\u003cstrong\u003eVerified learners\u003c/strong\u003e are offered a number of study tools to demonstrate they have mastered the learning objectives. They will have access to all exercises: practice, graded and exam questions.\u003c/p\u003e\",\"objectId\":\"course-c363944c-5adb-4490-b8f9-2b9b77be2952\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV2x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cb48aa31-2d67-4bd5-bb5f-bf3cec36745a\",\"productName\":\"Exam: Photovoltaic (PV) Energy Conversion\",\"productSlug\":\"learn/engineering/delft-university-of-technology-solar-engineering-photovoltaic-pv-energy-conversion-exam\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/cb48aa31-2d67-4bd5-bb5f-bf3cec36745a-33b570803fa4.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$de\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-GB\\\"\u003eEnroll in this course to gain access to the exam of the course Photovoltaic (PV) Energy Conversion\u003c/span\u003e, which forms part of the Micromasters program in Solar Energy Engineering.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e•Exam preparation material\u003c/span\u003e\u003cspan lang=\\\"EN-GB\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eOne proctored exam, with two attempts\u003c/p\u003e\",\"objectId\":\"course-cb48aa31-2d67-4bd5-bb5f-bf3cec36745a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV1Ex+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"80c7e14b-abbc-4258-b263-c01854a4095f\",\"productName\":\"Exam: Integration of Photovoltaic Systems in Microgrids\",\"productSlug\":\"learn/engineering/delft-university-of-technology-exam-solar-engineering-integration-of-photovoltaic-systems-in-microgrids\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/80c7e14b-abbc-4258-b263-c01854a4095f-e8e4fa4463e2.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"\u003cp\u003eIn this course you will gain access to the final exam of the course Integration of Photovoltaic Systems in Microgrids. You will be given exam preparation material to help you prepare (available in the audit track as well), and two attempts.\u003c/p\u003e\\n\u003cp\u003eThe exam is offered in the format of proctored exams. To read more about proctored exam and to review the technical requirements, review the edX's help pages: https://support.edx.org/hc/en-us/articles/207249428-How-do-proctored-exams-work-\u003c/p\u003e\\n\u003cp\u003eAfter passing the exam in this course, and its related course, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework.\u003c/p\u003e\\n\u003cp\u003eFor more information, please read the FAQ on this course page.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEnroll in this course to gain\u003cspan lang=\\\"EN-GB\\\"\u003e access\u003c/span\u003e to the exam of the course Integration of Photovoltaic Systems in Microgrids, which forms part of the Micromasters program in Solar Energy Engineering.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e•Exam preparation material\u003c/p\u003e\\n\u003cp\u003eOne proctored exam, with two attempts\u003c/p\u003e\",\"objectId\":\"course-80c7e14b-abbc-4258-b263-c01854a4095f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV4Ex+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"90428696-c690-40e1-9923-3ff74c1ab187\",\"productName\":\"Exam: Photovoltaic (PV) Technologies\",\"productSlug\":\"learn/engineering/delft-university-of-technology-solar-engineering-photovoltaic-pv-technologies-exam\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/90428696-c690-40e1-9923-3ff74c1ab187-03c6c146f639.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"\u003cp\u003eIn this course you will gain access to the final exam of the course Photovoltaic (PV) Technologies. You will be given exam preparation material to help you prepare (available in the audit track as well), and two attempts.\u003c/p\u003e\\n\u003cp\u003eThe exam is offered in the format of proctored exams. To read more about proctored exam and to review the technical requirements, review the edX's help pages: https://support.edx.org/hc/en-us/articles/207249428-How-do-proctored-exams-work-\u003c/p\u003e\\n\u003cp\u003eAfter passing the exam in this course, and its related course, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework.\u003c/p\u003e\\n\u003cp\u003eFor more information, please read the FAQ on this course page.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEnroll in this course to gain\u003cspan lang=\\\"EN-GB\\\"\u003e access\u003c/span\u003e to the exam of the course Photovoltaic (PV) Technologies, which forms part of the Micromasters program in Solar Energy Engineering.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e•Exam preparation material\u003c/p\u003e\\n\u003cp\u003eOne proctored exam, with two attempts\u003c/p\u003e\",\"objectId\":\"course-90428696-c690-40e1-9923-3ff74c1ab187\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV2Ex+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"69768c5b-ebf9-4ec5-aeb1-feb1b64cb8c3\",\"productName\":\"Exam: Photovoltaic (PV) Systems\",\"productSlug\":\"learn/engineering/delft-university-of-technology-solar-engineering-photovoltaic-pv-systems-exam\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/69768c5b-ebf9-4ec5-aeb1-feb1b64cb8c3-6cdb546bf80b.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"\u003cp\u003eIn this course you will gain access to the final exam of the course Photovoltaic (PV) Systems. You will be given exam preparation material to help you prepare (available in the audit track as well), and two attempts.\u003c/p\u003e\\n\u003cp\u003eThe exam is offered in the format of proctored exams. To read more about proctored exam and to review the technical requirements, review the edX's help pages: https://support.edx.org/hc/en-us/articles/207249428-How-do-proctored-exams-work-\u003c/p\u003e\\n\u003cp\u003eAfter passing the exam in this course, and its related course, you are eligible to receive one microcredential. A microcredential is a digital certificate that allows learners to demonstrate the knowledge and skills acquired after successfully completing a small unit of education. It describes the learning outcomes, educational level and scope of the course or program – and adds a quality mark, as it is bound to a recognized quality framework.\u003c/p\u003e\\n\u003cp\u003eFor more information, please read the FAQ on this course page.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEnroll in this course to gain\u003cspan lang=\\\"EN-GB\\\"\u003e access\u003c/span\u003e to the exam of the course Photovoltaic (PV) Systems, which forms part of the Micromasters program in Solar Energy Engineering.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e•Exam preparation material\u003c/p\u003e\\n\u003cp\u003eOne proctored exam, with two attempts\u003c/p\u003e\",\"objectId\":\"course-69768c5b-ebf9-4ec5-aeb1-feb1b64cb8c3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+PV3Ex+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"026a33ef-8474-4ec0-a782-0fa0ee2f27c8\",\"productName\":\"Physical and Advanced Side-Channel Attacks\",\"productSlug\":\"learn/computer-programming/graz-university-of-technology-physical-and-advanced-side-channel-attacks\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/026a33ef-8474-4ec0-a782-0fa0ee2f27c8-a16b8a9a5f72.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"$df\",\"shortDescription\":\"\u003cp\u003eSoftware-based and physical side-channel attacks have similar techniques. But physical attacks can observe properties and side effects that are usually not visible on the software layer. Thus, they are often considered the most dangerous side-channel attacks. In this course, we learn both about physical side-channel attacks but also about more advanced software-based side channels using prefetching and branch prediction. You will work with these attacks and understand how to mitigate them.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Understand where real-world systems expose physical side channels and how to exploit them\u003cbr /\u003e\\n- How and why Simple Power Analysis and Differential Power Analysis work\u003cbr /\u003e\\n- Understand the security risks posed by physical side-channel attackers as well as sophisticated software-based attackers\u003cbr /\u003e\\n- Understand how these attacks can be mitigated.\u003c/p\u003e\",\"objectId\":\"course-026a33ef-8474-4ec0-a782-0fa0ee2f27c8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TUGrazX+SCS4+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e1e7f39a-468e-4acf-a801-f71a0d76ed59\",\"productName\":\"Cache Side-Channel Attacks and Mitigations\",\"productSlug\":\"learn/computer-security/graz-university-of-technology-cache-side-channel-attacks-and-mitigations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e1e7f39a-468e-4acf-a801-f71a0d76ed59-43b796d27dfb.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"\u003cp\u003eIn this course, we build upon basic knowledge of software-based timing and cache attacks as well as the side-channel mindset. Same as in the prior courses, we do not just enumerate side-channel effects but we provide you with the experience of discovering side channels yourself in a group of students, living in a shared appartment. We dive deeper into the microarchitecture and get an in-depth understanding of virtual memory and caches in the course. We will learn about different cache side channels, such as Flush+Flush, Evict+Reload, and Prime+Probe. This requires some skills in reading and writing code, mainly C code. You will learn which attacks are relevant in the concrete native and virtualized environments you are working with, contributing to your risk assessment skills. In a set of small exercises, you will demonstrate that you understood the virtual memory, caches, and are able to find and exploit cache side channels in small software programs.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eSoftware-based side-channel attacks can pose a severe security threat in practice. In this course, we focus on a particularly prominent case: caches and cache side-channel attacks and we will go beyond the basic Flush+Reload attack. You will work with different cache side channels and understand where timing differences in architectures originate. You will learn which mechanisms can mitigate specific side-channel techniques in practice.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Spot and exploit side channels in cache hierarchies of concrete systems\u003cbr /\u003e\\n- Use different software-based cache side channels to extract secret information\u003cbr /\u003e\\n- Understand the security risks posed by cache side channels and which cache side channels can be mitigated in practice\u003c/p\u003e\",\"objectId\":\"course-e1e7f39a-468e-4acf-a801-f71a0d76ed59\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TUGrazX+SCS3+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9b7fdb41-5a79-4010-b547-95f26dd4d810\",\"productName\":\"Introduction to Software Side Channels and Mitigations\",\"productSlug\":\"learn/computer-security/graz-university-of-technology-introduction-to-software-side-channels-and-mitigations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9b7fdb41-5a79-4010-b547-95f26dd4d810-a69d9da5cfa8.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Graz University of Technology\"],\"partnerKeys\":[\"TUGrazX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c56a26e7-5025-4f31-97aa-0a5f42445447-0016ae232c5a.png\",\"fullDescription\":\"$e0\",\"shortDescription\":\"\u003cp\u003eSide channels exist in the real world, but they also exist in computers and can be exploited directly from software. This is a substantial computer security problem today, that we need to learn about to be able to stop attacks. In this course, you will learn and practice basic software-based side channels and understand the thought process to utilize a side channel. You will then learn how to mitigate or avoid side channels in software.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Spot and exploit side-channel leakage in simple software programs\u003cbr /\u003e\\n- Use different software-based side channels to extract secret information\u003cbr /\u003e\\n- Connect these security risks with methods to mitigate and close side channels\u003c/p\u003e\",\"objectId\":\"course-9b7fdb41-5a79-4010-b547-95f26dd4d810\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TUGrazX+SCS2+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5f1c55b4-354e-4155-af4a-76450953e10d\",\"productName\":\"Supply Chain Design\",\"productSlug\":\"learn/supply-chain-design/massachusetts-institute-of-technology-supply-chain-design\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f1c55b4-354e-4155-af4a-76450953e10d-7e2641a8e04e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e1\",\"shortDescription\":\"\u003cp\u003eLearn how to design and optimize the physical, financial, and information flows of a supply chain to enhance business performance – part of the \u003cem\u003eMITx MicroMasters Credential in Supply Chain Management\u003c/em\u003e.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eNetwork Design and Facility Location\u003c/li\u003e\\n\u003cli\u003eSupply Chain Finance\u003c/li\u003e\\n\u003cli\u003eProcurement and sourcing\u003c/li\u003e\\n\u003cli\u003eProduction planning\u003c/li\u003e\\n\u003cli\u003eDemand management and Sales \u0026amp; Operations Planning\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5f1c55b4-354e-4155-af4a-76450953e10d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+CTL.SC2x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9bf09b62-5e0a-43c1-a848-ecfd44144e21\",\"productName\":\"Quantum Hardware and its Applications with Quantum Inspire\",\"productSlug\":\"learn/computer-science/delft-university-of-technology-quantum-hardware-and-its-applications-with-quantum-inspire\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9bf09b62-5e0a-43c1-a848-ecfd44144e21-45f889687180.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Physics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$e2\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of quantum hardware and experiment with QuTech's simulators to gain hands-on experience with quantum computing.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAfter completing this course, you will be able to:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003eRecognize the purpose and capabilities of Quantum Inspire\u003c/li\u003e\\n\u003cli\u003eSummarize the basic components and working principles of a quantum computer\u003c/li\u003e\\n\u003cli\u003eIllustrate example protocols and applications of a quantum computer\u003c/li\u003e\\n\u003cli\u003eUse cQASM to program and run a (simple) quantum algorithm using Quantum Inspire\u003c/li\u003e\\n\u003cli\u003eDevelop customized quantum algorithms using the Quantum Inspire Software Development Kit (SDK)\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-9bf09b62-5e0a-43c1-a848-ecfd44144e21\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+QCQN2x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"21a8259b-3c0f-4bc7-b478-edf58b8fbb90\",\"productName\":\"Unix Tools: Data, Software and Production Engineering\",\"productSlug\":\"learn/unix/delft-university-of-technology-unix-tools-data-software-and-production-engineering\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/21a8259b-3c0f-4bc7-b478-edf58b8fbb90-bee1a730e6fa.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$e3\",\"shortDescription\":\"\u003cp\u003eGrow from being a Unix novice to Unix wizard status! Process big data, analyze software code, run DevOps tasks and excel in your everyday job through the amazing power of the Unix shell and command-line tools.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAfter completing the course you’ll be able to\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eEnter and combine commands in the Unix command line\u003c/li\u003e\\n\u003cli\u003eUse files, data pipelines, variables and control structures\u003c/li\u003e\\n\u003cli\u003eSelect the most useful tools and commands for fetching, selecting, generating, processing, summarizing and reporting data\u003c/li\u003e\\n\u003cli\u003eObtain data from databases, cloud-based hosts, version control systems, object files, archives and your desktop files\u003c/li\u003e\\n\u003cli\u003eAccomplish diverse processing tasks by putting together suitable commands and configuring their execution parameters\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-21a8259b-3c0f-4bc7-b478-edf58b8fbb90\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+UnixTx+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a8d986de-61b4-4a20-98bb-144f782f04ca\",\"productName\":\"Smart and Sustainable Cities: New Ways of Digitalization \u0026 Governance\",\"productSlug\":\"learn/sustainable-development/delft-university-of-technology-smart-and-sustainable-cities-new-ways-of-digitalization-governance\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a8d986de-61b4-4a20-98bb-144f782f04ca-178c6fba9e4b.png\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$e4\",\"shortDescription\":\"\u003cp\u003eExplore the key governance challenges for smart sustainable city (SSC) initiatives and the approach required. Learn to organize co-creation and to use a roadmap that support planning, implementation, close monitoring and risks mitigation.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eReview governance challenges for SSC\u003c/li\u003e\\n\u003cli\u003eReflect and debate on how to set priorities for smart sustainable city initiatives planning and management\u003c/li\u003e\\n\u003cli\u003eUnderstand how to engage stakeholders and involve citizens in SSC development and apply co-creation pathways with stakeholders \u003c/li\u003e\\n\u003cli\u003eObserve the conditions and risks related to IT and data governance in SSC \u003c/li\u003e\\n\u003cli\u003eDefine a draft of a governance and regulatory framework for implementing and monitoring SSC initiatives\u003c/li\u003e\\n\u003cli\u003eApply a roadmap for governing SSC initiatives in a real case\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a8d986de-61b4-4a20-98bb-144f782f04ca\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+SaSC01x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9de3b8b5-c828-4ae6-b842-6b6327815288\",\"productName\":\"Manufacturing Process Control I\",\"productSlug\":\"learn/manufacturing/massachusetts-institute-of-technology-manufacturing-process-control-i\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9de3b8b5-c828-4ae6-b842-6b6327815288-cb3707095bb2.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Math\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e5\",\"shortDescription\":\"\u003cp\u003eLearn how to model variations in manufacturing processes and develop methods to reduce and control deterministic variations to achieve consistent process quality.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eVariation modeling using the theory of Random Processes\u003c/li\u003e\\n\u003cli\u003eStatistical Process Control (SPC) foundations and applications\u003c/li\u003e\\n\u003cli\u003eXbar, EWMA, CUSUM and discrete event methods for detecting process problems\u003c/li\u003e\\n\u003cli\u003eMethods for analyzing process changes by looking at general process physics\u003c/li\u003e\\n\u003cli\u003eHow to apply these methods to achieve world-class quality in unit manufacturing processes\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9de3b8b5-c828-4ae6-b842-6b6327815288\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.830.1x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"37c5ca2e-5741-48a9-a8d6-da03aed266ab\",\"productName\":\"Sustainable Energy\",\"productSlug\":\"learn/sustainable-energy/massachusetts-institute-of-technology-sustainable-energy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/37c5ca2e-5741-48a9-a8d6-da03aed266ab-77f539f3fcfa.png\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Engineering\",\"Environmental Studies\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e6\",\"shortDescription\":\"\u003cp\u003eLearn to critically analyze modern energy technologies from engineering and socio-political perspectives, and gain the skills necessary to help the world meet rising energy demand while reducing carbon dioxide and other greenhouse gas emissions driving climate change\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to critically evaluate key features, opportunities, and challenges associated with modern energy technologies, and understand how these factors shape their contributions to global decarbonization\u003c/li\u003e\\n\u003cli\u003eUse systems-level tools and skills to analyze the technological, economic, and socio-political dimensions of real-word energy projects\u003c/li\u003e\\n\u003cli\u003eBuild consensus among involved stakeholders to achieve sustainability goals\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-37c5ca2e-5741-48a9-a8d6-da03aed266ab\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+22.811x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"561e3620-fe64-4462-820a-bf2de2be2f77\",\"productName\":\"The Science and Business of Biotechnology\",\"productSlug\":\"learn/biotechnology/massachusetts-institute-of-technology-the-science-and-business-of-biotechnology\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/561e3620-fe64-4462-820a-bf2de2be2f77-ce59ffc7b939.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Biology \u0026 Life Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e7\",\"shortDescription\":\"\u003cp\u003eExplore the latest scientific innovations in biotechnology, and novel business and financing models for commercializing them.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBasic financial analysis for the life-sciences professional\u003c/li\u003e\\n\u003cli\u003eThe historical financial risks and returns of the biopharma industry\u003c/li\u003e\\n\u003cli\u003eCapital budgeting for pharmaceutical companies\u003c/li\u003e\\n\u003cli\u003eDrug development and clinical trials\u003c/li\u003e\\n\u003cli\u003eThe mechanics of biotech startup financing\u003c/li\u003e\\n\u003cli\u003eBiomedical megafunds and drug royalty investment companies\u003c/li\u003e\\n\u003cli\u003eHealthcare analytics and machine learning\u003c/li\u003e\\n\u003cli\u003ePricing, value, and ethics\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-561e3620-fe64-4462-820a-bf2de2be2f77\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+15.480x+3T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3dbb7e34-528e-4bf9-a64a-f021c4161fdd\",\"productName\":\"Supply Chains for Manufacturing: Inventory Analytics\",\"productSlug\":\"learn/manufacturing/massachusetts-institute-of-technology-supply-chains-for-manufacturing-inventory-analytics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3dbb7e34-528e-4bf9-a64a-f021c4161fdd-c667d1f604b0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e8\",\"shortDescription\":\"\u003cp\u003eLearn about effective supply chain strategies for companies that operate globally, with emphasis on how to plan and integrate supply chain components into a coordinated system.\u003c/p\u003e\\n\u003cp\u003eThis course was formerly known as Supply Chains for Manufacturing I.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConcepts and models for effective supply chain and manufacturing system planning\u003c/li\u003e\\n\u003cli\u003eOperational tactics for managing variability\u003c/li\u003e\\n\u003cli\u003eIntegrated planning and collaboration\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-3dbb7e34-528e-4bf9-a64a-f021c4161fdd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+15.762x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7a7d4897-584a-4667-aeeb-c3a87a0cc15c\",\"productName\":\"Manufacturing Systems I\",\"productSlug\":\"learn/manufacturing/massachusetts-institute-of-technology-manufacturing-systems-i\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7a7d4897-584a-4667-aeeb-c3a87a0cc15c-99186295b0b7.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Math\",\"Business \u0026 Management\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$e9\",\"shortDescription\":\"\u003cp\u003eLearn about manufacturing systems and ways to analyze them in terms of material flow and storage, information flow, capacities, and times and durations of events, especially random events.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eApplications of basic probability models\u003c/li\u003e\\n\u003cli\u003eBuilding and solving optimization models\u003c/li\u003e\\n\u003cli\u003eInventory dynamics and management\u003c/li\u003e\\n\u003cli\u003ePhilosophy behind the Toyota Production System (TPS)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7a7d4897-584a-4667-aeeb-c3a87a0cc15c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.854.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"54c2620f-ace4-4d32-809d-69ff203aa38b\",\"productName\":\"Hello (Real) World with ROS – Robot Operating System\",\"productSlug\":\"learn/robotics/delft-university-of-technology-hello-real-world-with-ros-robot-operating-system\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/54c2620f-ace4-4d32-809d-69ff203aa38b-228c3d37e14c.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$ea\",\"shortDescription\":\"\u003cp\u003eLearn the fundamentals of ROS, Robot Operating System, to create advanced robotic systems.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to use ROS communication tools (topics, services, actions) to exchange information between functional modules\u003c/li\u003e\\n\u003cli\u003eVisualization and creation of a custom environment with a robot\u003c/li\u003e\\n\u003cli\u003eMapping of the robot environment and navigation with a mobile robot\u003c/li\u003e\\n\u003cli\u003eHow to implement a pick-and-place function with industrial robot arms\u003c/li\u003e\\n\u003cli\u003eDesign of a complete robotic application with state machines\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-54c2620f-ace4-4d32-809d-69ff203aa38b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+ROS1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"27b8385a-520e-429c-96a1-1a4060b2390f\",\"productName\":\"Principles of Modeling, Simulations, and Control for Electric Energy Systems\",\"productSlug\":\"learn/energy/massachusetts-institute-of-technology-principles-of-modeling-simulations-and-control-for-electric-energy-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/27b8385a-520e-429c-96a1-1a4060b2390f-fba14444961e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Physics\",\"Environmental Studies\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$eb\",\"shortDescription\":\"\u003cp\u003eApply a dynamic systems-level approach and engage emerging research on efficient, sustainable, and physically and economically feasible electric power systems of the future.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will learn:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003efundamental concepts for power systems planning, operations, and management\u003c/li\u003e\\n\u003cli\u003ewhat may not work when using today’s hierarchical control and how to evolve it into flexible end-to-end electricity service\u003c/li\u003e\\n\u003cli\u003estrategies for building resilience and enhancing energy access using existing grid infrastructure\u003c/li\u003e\\n\u003cli\u003ehow energy technologies, including intermittent renewable energy technologies, can be modeled and controlled at both the component and system level to ensure reliability and efficiency\u003c/li\u003e\\n\u003cli\u003ethe role of smart grids, data-enabled machine learning, power electronics-control, and data-driven decision-making in sustainable electric energy grids\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-27b8385a-520e-429c-96a1-1a4060b2390f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+6.247x+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"65deb012-00d8-49c7-abd1-add318ed12bb\",\"productName\":\"Engineering the Space Shuttle\",\"productSlug\":\"learn/aerospace-engineering/massachusetts-institute-of-technology-engineering-the-space-shuttle\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/65deb012-00d8-49c7-abd1-add318ed12bb-20d18f7523a6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Social Sciences\",\"History\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$ec\",\"shortDescription\":\"\u003cp\u003eLearn all about the world’s first reusable spacecraft - the Space Shuttle - from the very people who designed, built, and operated it for 30 years.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eFundamentals of Systems Engineering\u003c/li\u003e\\n\u003cli\u003eHow a major technical program gets governmental approval\u003c/li\u003e\\n\u003cli\u003eDesign of human spaceflight systems\u003c/li\u003e\\n\u003cli\u003eOperation of complex spaceflight systems\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-65deb012-00d8-49c7-abd1-add318ed12bb\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+16.893x+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b511fe62-03ca-4d35-83b2-3a6337929962\",\"productName\":\"Introduction to Computer Science and Programming\",\"productSlug\":\"learn/computer-science/tokyo-institute-of-technology-introduction-to-computer-science-and-programming\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b511fe62-03ca-4d35-83b2-3a6337929962-18aba38014cd.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$ed\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThe term “Computation” refers to the action performed by a computer. A computation can be a basic operation and it can also be a sophisticated computer simulation requiring a large amount of data and substantial resources. This course aims at introducing learners with no prior knowledge to the basic key concepts of computer science. By following the lectures and exercises of this course, you will gain an understanding of algorithms by programming using the language Ruby.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e・\u003cspan lang=\\\"EN-US\\\"\u003eWhat is data (corresponding to an atom of data)?\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eWhat is a computation (the one that corresponds to the atom of the computation)?\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eBasic information security: encryption, decryption, and crypto-breaking\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003ePrivate key cryptosystems and public key cryptosystems\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eRepresentative examples of utilization of computations in present society (Computer simulation, Data mining)\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eInstallation of software and the programming environments (editor, shell)\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eHow to use the programming environments (editor, shell) for computations\u003cbr /\u003e\\n\u003c/span\u003e ・\u003cspan lang=\\\"EN-US\\\"\u003eBasic programming using “Ruby on Rails,” a programming language\u003c/span\u003e\u003c/p\u003e\",\"objectId\":\"course-b511fe62-03ca-4d35-83b2-3a6337929962\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+CSE101x+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"85f9f647-1833-4402-947e-121c3145b16c\",\"productName\":\"Adaptive Markets: Financial Market Dynamics and Human Behavior\",\"productSlug\":\"learn/finance/massachusetts-institute-of-technology-adaptive-markets-financial-market-dynamics-and-human-behavior\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/85f9f647-1833-4402-947e-121c3145b16c-dd2c7f21532f.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\",\"Social Sciences\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$ee\",\"shortDescription\":\"\u003cp\u003eA completely new way of thinking about financial markets, institutions, and innovation that reconciles human behavior with market efficiency using concepts from evolutionary biology, cognitive neuroscience, and artificial intelligence.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLimits to rationality and market efficiency, and the adaptive nature of markets\u003c/li\u003e\\n\u003cli\u003ePsychlogical, neuroscientific, and evolutionary foundations of human behavior\u003c/li\u003e\\n\u003cli\u003eFormulation of the Adaptive Markets Hypothesis (AMH)\u003c/li\u003e\\n\u003cli\u003eApplications of the AMH to hedge funds, the 2008 Financial Crisis, and COVID-19\u003c/li\u003e\\n\u003cli\u003eEthical implications and high-impact applications of the AMH\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-85f9f647-1833-4402-947e-121c3145b16c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+15.481x+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"10b4fbe2-d60d-4d5e-9d7e-f01b0a317c5d\",\"productName\":\"Computational Thinking for Modeling and Simulation\",\"productSlug\":\"learn/simulation/massachusetts-institute-of-technology-computational-thinking-for-modeling-and-simulation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/10b4fbe2-d60d-4d5e-9d7e-f01b0a317c5d-69a1400f32d5.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$ef\",\"shortDescription\":\"Develop the thought processes involved in formulating a problem so a computer can effectively carry out\u0026nbsp;the solution.\u0026nbsp; In particular, this course emphasizes use of computers for modeling physical systems and predicting their behavior.\",\"productOverview\":\"By the end of this course, students will be able to:\u003cbr /\u003e\\r\\n\u003cul\u003e\\r\\n\u003cli\u003eSelect and implement methods for interpolation and understand their consequences for convergence of model results as discretization is refined.\u003c/li\u003e\\r\\n\u003cli\u003eCarry out a few simple methods for numerical integration\u003c/li\u003e\\r\\n\u003cli\u003eImplement procedures for numerical differentiation\u003c/li\u003e\\r\\n\u003cli\u003eWrite programs to solve systems of equations, both linear and non-linear\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-10b4fbe2-d60d-4d5e-9d7e-f01b0a317c5d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.086x+3T2018\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"431d4f06-a003-4c6a-b435-21c47aa95028\",\"productName\":\"Manufacturing Systems II\",\"productSlug\":\"learn/manufacturing/massachusetts-institute-of-technology-manufacturing-systems-ii\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/431d4f06-a003-4c6a-b435-21c47aa95028-b212f7bd97cd.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Math\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$f0\",\"shortDescription\":\"\u003cp\u003eLearn how to analyze manufacturing systems to optimize performance and control costs and better understand the flow of material and information.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the application of stochastic production line models\u003c/li\u003e\\n\u003cli\u003eIssues to consider in the design and use of simulations\u003c/li\u003e\\n\u003cli\u003eMaterial requirements planning (MRP) to bettermanage manufacturing processes\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-431d4f06-a003-4c6a-b435-21c47aa95028\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.854.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"41256da3-1302-4450-bab2-82d235c28f9a\",\"productName\":\"Supply Chains for Manufacturing: Capacity Analytics\",\"productSlug\":\"learn/supply-chain-design/massachusetts-institute-of-technology-supply-chains-for-manufacturing-capacity-analytics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/41256da3-1302-4450-bab2-82d235c28f9a-3aa5e6da83a8.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$f1\",\"shortDescription\":\"\u003cp\u003eLearn about various models, methods and software tools to help make better decisions for system design in manufacturing systems and supply chains.. \u003c/p\u003e\\n\u003cp\u003eThis course was formerly known as Supply Chains for Manufacturing II.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eFrameworks and models forsystem design\u003c/li\u003e\\n\u003cli\u003eDecision supportmodels\u003c/li\u003e\\n\u003cli\u003eMethods and software tools for supply chain contracting and risk mitigation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-41256da3-1302-4450-bab2-82d235c28f9a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+15.763x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6101ee5b-bd7a-4ce0-b229-949de6bf28dd\",\"productName\":\"Cities and Climate Change: Mitigation and Adaptation\",\"productSlug\":\"learn/climate-change/massachusetts-institute-of-technology-cities-and-climate-change-mitigation-and-adaptation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6101ee5b-bd7a-4ce0-b229-949de6bf28dd-ed0f40da544b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Environmental Studies\",\"Design\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$f2\",\"shortDescription\":\"\u003cp\u003eInvestigate the relationship between international cities and the effects of climate change through the expertise of urban leaders, practitioners, and academics and through peer-based discussion, applying knowledge to develop mitigation and adaptation strategies for resilient, case study cities.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eGain a deeper understanding of fundamental theories of governance and planning impacting urban climate mitigation and adaptation.\u003c/li\u003e\\n\u003cli\u003eComprehend the relationships between multi-level governance and multi-level climate risk assessment.\u003c/li\u003e\\n\u003cli\u003eImprove understanding of the operation of actors and systems involved in structuring policy and urban planning in response to climate change.\u003c/li\u003e\\n\u003cli\u003eArticulate and advocate for the best practices in climate mitigation and adaptation planning in local urban contexts.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-6101ee5b-bd7a-4ce0-b229-949de6bf28dd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+11.270x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"547086d2-78bc-4001-bc80-77552ec0e44c\",\"productName\":\"Mobile Application Experiences\",\"productSlug\":\"learn/mobile-development/massachusetts-institute-of-technology-mobile-application-experiences\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/547086d2-78bc-4001-bc80-77552ec0e44c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Humanities\",\"Business \u0026 Management\",\"Social Sciences\",\"Data Analysis \u0026 Statistics\",\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$f3\",\"shortDescription\":\"Learn to create a novel mobile application in this MIT course - from research to design, usability, implementation and field evaluation.\",\"productOverview\":\"$f4\",\"objectId\":\"course-547086d2-78bc-4001-bc80-77552ec0e44c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+21W.789x_4+1T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d278b1b8-2988-4889-9068-cee2b04f3fdc\",\"productName\":\"Introduction to Business Architecture\",\"productSlug\":\"learn/business-administration/tokyo-institute-of-technology-introduction-to-business-architecture\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d278b1b8-2988-4889-9068-cee2b04f3fdc-dd9c436c0e17.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$f5\",\"shortDescription\":\"\u003cp\u003eIn this course, you will learn the concepts of mapping a business architecture by using the representative methodology called DEMO (Design \u0026amp; Engineering Methodology for Organizations) as explained in the book, \u003cem\u003eEnterprise Ontology.\u003c/em\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will learn;\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eClarify the parts and interactions of an enterprise by mapping its operations\u003c/li\u003e\\n\u003cli\u003eDesign an organization or business by clarifying responsibility and relationships.\u003c/li\u003e\\n\u003cli\u003eProvide the basis for Information System Development of a given enterprise.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d278b1b8-2988-4889-9068-cee2b04f3fdc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+BA101x+1T2021a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d0266346-a050-49fe-8694-7d569e50cb04\",\"productName\":\"Basic Japanese Civil Law\",\"productSlug\":\"learn/law/tokyo-institute-of-technology-basic-japanese-civil-law\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d0266346-a050-49fe-8694-7d569e50cb04-e647b197a83c.png\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Social Sciences\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$f6\",\"shortDescription\":\"\u003cp\u003eLearn Japanese Civil Law, covering various contemporary issues faced in everyday life.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eStructure of legal system and justice system\u003c/li\u003e\\n\u003cli\u003eBasic Japanese civil law, especially the Japanese civil code\u003c/li\u003e\\n\u003cli\u003eContemporary problems in civil law\u003c/li\u003e\\n\u003cli\u003eMethods for accessing Japanese law and legal information\u003c/li\u003e\\n\u003cli\u003eSome basic legal technical terms in Japanese\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d0266346-a050-49fe-8694-7d569e50cb04\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+JLaw101x+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"80822e42-d5d5-4433-ad4b-bd08e417875a\",\"productName\":\"ライントレースに挑戦:自動運転のための第一歩|Try Virtual Line Tracing: First Steps Toward Autonomous Driving\",\"productSlug\":\"learn/engineering/tokyo-institute-of-technology-raintoresunitiao-zhan-zi-dong-yun-zhuan-notamenodi-yi-bu-try-virtual-line-tracing-first-steps-toward-autonomous-driving\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/80822e42-d5d5-4433-ad4b-bd08e417875a-b5528ba58fa3.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$f7\",\"shortDescription\":\"\u003cp\u003eThis course is designed for beginners to learn about line tracing, the first technology need for autonomous driving, using virtual experiments. MATLAB, which is necessary to run the simulations in the course, is available free of charge during the course, through the generosity of Mathworks.\u003c/p\u003e\\n\u003cp\u003e自動運転の基礎であるライントレースについて、仮想実験を使って学ぶ初心者向けのコースです。シュミレーションの実行に必要なMATLABは、Mathworks社の厚意によりコース受講中に限り無料で使うことができます。\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eContents\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/p\u003e\\n\u003cp\u003eWeek1\u003c/span\u003e:\u003cspan lang=\\\"EN-US\\\"\u003eCourse Overview and MATLAB Installation\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/p\u003e\\n\u003cp\u003eWeek2\u003c/span\u003e:\u003cspan lang=\\\"EN-US\\\"\u003eMeasurement and Obstacle Avoidance\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/p\u003e\\n\u003cp\u003eWeek3\u003c/span\u003e:\u003cspan lang=\\\"EN-US\\\"\u003eLine Trace Control 1: Virtual Experiment\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/p\u003e\\n\u003cp\u003eWeek4\u003c/span\u003e:\u003cspan lang=\\\"EN-US\\\"\u003eLine Trace Control 2: MATLAB Simulation\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/p\u003e\\n\u003cp\u003eWeek5\u003c/span\u003e:\u003cspan lang=\\\"EN-US\\\"\u003eFrom \\\"Intuitive Control\\\" to \\\"Control Theory\\\": PID Control\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e*This course is only available in Japanese.\u003c/p\u003e\\n\u003cp\u003e----------\u003c/p\u003e\\n\u003cp\u003eWeek1:概要とMATLABのインストール\u003c/p\u003e\\n\u003cp\u003eWeek2:ものを測る(計測)と障害物回避\u003c/p\u003e\\n\u003cp\u003eWeek3:ものを操る(制御)1:ライントレースの仮想実験\u003c/p\u003e\\n\u003cp\u003eWeek4:ものを操る(制御)2:コンピュータシミュレーション\u003c/p\u003e\\n\u003cp\u003eWeek5:直感な制御から制御理論へ:PID制御のシミュレーション\u003c/p\u003e\",\"objectId\":\"course-80822e42-d5d5-4433-ad4b-bd08e417875a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+SSS103Jx+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/80822e42-d5d5-4433-ad4b-bd08e417875a-df90a2db69a2.jpeg\"},{\"productUuid\":\"5f03a28e-1b32-4fea-962f-22d2538487e5\",\"productName\":\"プログラミングしながら学ぶコンピュータサイエンス入門 : Introduction to Computer Science and Programming\",\"productSlug\":\"learn/computer-programming/tokyo-institute-of-technology-puroguramingusinagaraxue-bukonpiyutasaiensuru-men-introduction-to-computer-science-and-programming\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f03a28e-1b32-4fea-962f-22d2538487e5-6d4cf2b1cba6.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$f8\",\"shortDescription\":\"\u003cp\u003eAIやコンピュータでやっていることは「計算」です。超入門的プログラミングで「計算」の設計法を体験しながら,コンピュータサイエンスの基礎を学びます。\u003c/p\u003e\\n\u003cp\u003e“Computations” are what computers, including those utilizing Artificial Intelligent algorithms are actually doing. Learn about the basic and key concepts of computer science while experiencing how to program anddesign “computational algorithms.”\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e・データ(データの原子に当たるもの)とは何か\u003cbr /\u003e\\n・計算(計算の原子に当たるもの)とは何か\u003cbr /\u003e\\n・情報セキュリティの基本:暗号化・復号・解読\u003cbr /\u003e\\n・共通鍵暗号系と公開鍵暗号系\u003cbr /\u003e\\n・現在社会において計算の活用の代表例\u003cbr /\u003e\\n- コンピュータ・シミュレーション\u003cbr /\u003e\\n- データマイニング\u003cbr /\u003e\\n・プログラミング環境(エディタ,シェル)のインストール\u003cbr /\u003e\\n・プログラミング環境(エディタ,シェル)の使い方\u003cbr /\u003e\\n・プログラミング言語Ruby による基本的なプログラミング\u003c/p\u003e\\n\u003cp\u003e・What is data (corresponding to an atom of data)? \u003cbr /\u003e\\n・What is a computation (that corresponds to the atom of the computation)?\u003cbr /\u003e\\n・Basic information security: encryption, decryption, and crypto-breaking\u003cbr /\u003e\\n・Private key cryptosystems and public key cryptosystems\u003cbr /\u003e\\n・Representative examples of utilization of computations in present society (Computer simulation, Data mining)\u003cbr /\u003e\\n・Installation of software and the programming environments (editor, shell)\u003cbr /\u003e\\n・How to use the programming environments (editor, shell) for computations\u003cbr /\u003e\\n・Basic programming using “Ruby on Rails,” a programming language\u003c/p\u003e\",\"objectId\":\"course-5f03a28e-1b32-4fea-962f-22d2538487e5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+CS101x+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"267becdc-0e84-4341-8976-2c27ac6c079d\",\"productName\":\"Cyber Security Economics\",\"productSlug\":\"learn/cybersecurity/delft-university-of-technology-cyber-security-economics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/267becdc-0e84-4341-8976-2c27ac6c079d-b82729981b0c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Social Sciences\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$f9\",\"shortDescription\":\"Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eSound understanding of the economics of cybersecurity as a systems discipline, from security policies (modelling what ought to be protected) to mechanisms (how to implement the protection goals)\u003c/li\u003e\\r\\n\u003cli\u003eHow to design security metrics to capture information security issues\u003c/li\u003e\\r\\n\u003cli\u003eHow the design of effective policies to enhance and maintain cybersecurity must take into account a complex set of incentives facing not only the providers and users of the Internet and computer software, but also those of potential attackers\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-267becdc-0e84-4341-8976-2c27ac6c079d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+Secon101x+3T_2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e639e113-c582-4854-a39f-d993acacb996\",\"productName\":\"Basic Japanese Civil Law 2\",\"productSlug\":\"learn/law/tokyo-institute-of-technology-basic-japanese-civil-law-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e639e113-c582-4854-a39f-d993acacb996-41b0cb2bedc2.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Social Sciences\"],\"partnerName\":[\"Tokyo Institute of Technology\"],\"partnerKeys\":[\"TokyoTechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/40c8032c-f10a-4a81-9099-fa8090d9ed90-779573cf2f57.png\",\"fullDescription\":\"$fa\",\"shortDescription\":\"\u003cp\u003eThis course is in succession to the TokyoTechX \\\"Basic Japanese Civil Law,\\\" which covered legal concepts common to many countries, such as sovereignty, constitution, separation of three powers, basic human rights, and personal safety. This course considers current issues in Japan, such as those faced in daily life from a legal perspective based upon laws and related methods. This course teaches Japanese civil law in more detail related to contemporary problems. The course starts with a review of the civil code and covers canceling of contracts, intellectual property, internet-related legal issues, cashless transactions, bankruptcy, torts, and protection of the elderly.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCivil law, especially the Japanese civil code\u003c/li\u003e\\n\u003cli\u003eDetailed contemporary problems in civil law\u003c/li\u003e\\n\u003cli\u003eLaws related to daily life in Japan\u003c/li\u003e\\n\u003cli\u003eBasis of judgement for civil ligation\u003c/li\u003e\\n\u003cli\u003eSome legal technical terms in Japanese\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e639e113-c582-4854-a39f-d993acacb996\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TokyoTechX+JLaw102x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"31604aa8-3b31-4f9c-b171-52668c721911\",\"productName\":\"Ethical Dilemmas in Professional Engineering\",\"productSlug\":\"learn/engineering/delft-university-of-technology-ethical-dilemmas-in-professional-engineering\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/31604aa8-3b31-4f9c-b171-52668c721911-24a0e44bc5e1.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$fb\",\"shortDescription\":\"\u003cp\u003eLearn how engineers worldwide can deal with ethical dilemmas. These can include conflicts of interests, bribery, whistleblowing and inadequate information about potential negative effects of products and technologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the professional rules of conduct for engineers and how to apply them\u003c/li\u003e\\n\u003cli\u003eAppreciate codes of conduct as an expression of the professional rules of conduct\u003c/li\u003e\\n\u003cli\u003eUnderstand the conditions under which whistleblowing is warranted\u003c/li\u003e\\n\u003cli\u003eRecognize conflicts of interest and develop strategies for handling them\u003c/li\u003e\\n\u003cli\u003eUnderstand the importance of communication with all stakeholders\u003c/li\u003e\\n\u003cli\u003eDevelop practical strategies for handling ethical dilemmas and apply them\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-31604aa8-3b31-4f9c-b171-52668c721911\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+EREM101x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b212b555-9ab8-4d18-8d3d-e4773e8a17a2\",\"productName\":\"Envisioning the Graduate of the Future\",\"productSlug\":\"learn/education/massachusetts-institute-of-technology-envisioning-the-graduate-of-the-future\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b212b555-9ab8-4d18-8d3d-e4773e8a17a2-3aeb58fdb15c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Design\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$fc\",\"shortDescription\":\"Embark on a collaborative and exploratory design process to reflect on the purpose of secondary school. Create a shareable artifact that conveys what you and your community believe a secondary school graduate should know and be able to do.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eWhat a graduate profile is and the benefits of creating one\u003c/li\u003e\\r\\n\u003cli\u003eA better understanding of your own school context through a reflection and discovery process\u003c/li\u003e\\r\\n\u003cli\u003eHow a graduate profile design process can engage a community in reflecting on and communicating the purpose of secondary school and establishing a cohesive vision\u003c/li\u003e\\r\\n\u003cli\u003eProcess and tools for designing a graduate profile that reflects the values of multiple stakeholders\u003c/li\u003e\\r\\n\u003cli\u003eHow a graduate profile can guide continuous school improvement\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-b212b555-9ab8-4d18-8d3d-e4773e8a17a2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+CMS.501x+2T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7fc384f8-ba41-4843-93e9-09688044f28b\",\"productName\":\"MIT App Inventor Certification Exam – Level 1\",\"productSlug\":\"learn/computer-programming/massachusetts-institute-of-technology-mit-app-inventor-certification-exam-level-1-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7fc384f8-ba41-4843-93e9-09688044f28b-6067c0a55c89.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$fd\",\"shortDescription\":\"\u003cp\u003eEarn a certification attesting to your basic knowledge of MIT App Inventor. Timed, 90 minute examination only, no course materials are provided.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eTimed, 90 minute certification examination only. There are no exam prep materials offered or recommended in this offering.\u003c/p\u003e\",\"objectId\":\"course-7fc384f8-ba41-4843-93e9-09688044f28b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+MIT.APP.01x+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b094bbe2-f733-473b-8a8a-9e73e8b3b513\",\"productName\":\"Sustainability in Everyday Life\",\"productSlug\":\"learn/sustainability/chalmers-university-of-technology-sustainability-in-everyday-life\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b094bbe2-f733-473b-8a8a-9e73e8b3b513-b88c3762e3c0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Environmental Studies\",\"Science\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"Chalmers University of Technology\"],\"partnerKeys\":[\"ChalmersX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6233178f-b703-4c85-bcea-3b3c55ef9289-8c26535e6e82.png\",\"fullDescription\":\"\u003cp\u003eDaily headlines warn of new chemical dangers, species on the edge of extinction, global warming-- framing our planet as “at risk.”\u003c/p\u003e\\n\u003cp\u003eSome people stop listening, others get alarmed, while some others want to learn more in hopes of making a difference in the world. \u003c/p\u003e\\n\u003cp\u003eDo you want to live a more sustainable life? In this environmental studies course, you will learn how to make more informed choices about your ecological footprint and gain a better understanding of how your choices impact on our world.\u003c/p\u003e\\n\u003cp\u003eThis course is organized into five key themes: chemicals, globalization, climate change, food and energy. These five themes represent challenges that people face day-to-day managing choices relating to sustainability.\u003c/p\u003e\\n\u003cp\u003eIn the final task of this course, you will demonstrate how you have acquired the skills and knowledge to organize your everyday life sustainably.\u003c/p\u003e\",\"shortDescription\":\"Learn the skills and information required to make more sustainable choices in everyday life related to food, energy, climate change and globalization.\",\"productOverview\":\"$fe\",\"objectId\":\"course-b094bbe2-f733-473b-8a8a-9e73e8b3b513\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ChalmersX+ChM002x+1T2018\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0f163616-6fb2-4d5d-a1cc-078b48a6688b\",\"productName\":\"BioGraph: Teaching Biology Through Systems, Models, \u0026 Argumentation\",\"productSlug\":\"learn/education/massachusetts-institute-of-technology-biograph-teaching-biology-through-systems-models-argumentation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0f163616-6fb2-4d5d-a1cc-078b48a6688b-f20f3dcba2f2.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Biology \u0026 Life Sciences\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\",\"University of Pennsylvania\",\"MITx_PennX\"],\"partnerKeys\":[\"MITx\",\"PennX\",\"MITx_PennX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$ff\",\"shortDescription\":\"\u003cp\u003eThis six-week interactive and collaborative course integrates systems thinking with computer models designed to ‘bring biology to life’. You will learn how to use online simulations to develop core biology content and practices, aligned with the NGSS.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eParticipants will be able to \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eTeach High School Biology content through a systems lens\u003c/li\u003e\\n\u003cli\u003eUse online simulations that develop core ideas in biology\u003c/li\u003e\\n\u003cli\u003eModify simulations through basic blocks-based coding\u003c/li\u003e\\n\u003cli\u003eHighlight the importance and usefulness of scientific models\u003c/li\u003e\\n\u003cli\u003eSupport students in computational modeling\u003c/li\u003e\\n\u003cli\u003eUse scientific argumentation as a method for teaching and learning science content\u003c/li\u003e\\n\u003cli\u003eJoin a global community of teachers\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0f163616-6fb2-4d5d-a1cc-078b48a6688b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx_PennX+BIOGRAPH2.1X+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5fda4000-8baf-4c1a-b6e6-840189eda463\",\"productName\":\"Data Structures \u0026 Algorithms I: ArrayLists, LinkedLists, Stacks and Queues\",\"productSlug\":\"learn/data-structures/the-georgia-institute-of-technology-data-structures-algorithms-i-arraylists-linkedlists-stacks-and-queues\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5fda4000-8baf-4c1a-b6e6-840189eda463-954cccca3c64.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$100\",\"shortDescription\":\"\u003cp\u003eWork with the principles of data storage in Arrays, ArrayLists \u0026amp; LinkedList nodes. Understand their operations and performance with visualizations. Implement low-level linear, linked data structures with recursive methods, and explore their edge cases. Extend these structures to the Abstract Data Types, Stacks, Queues and Deques.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDevelop mature Java programming skills with the use of generics, references and interfaces\u003c/li\u003e\\n\u003cli\u003eUnderstand the principles of data storage in Node objects\u003c/li\u003e\\n\u003cli\u003eProgram various low-level data structures like Singly, Doubly and Circular LinkedLists\u003c/li\u003e\\n\u003cli\u003eDesign and implement ADTs like Lists (backed by Arrays), Stacks and Queues\u003c/li\u003e\\n\u003cli\u003eExamine the edge cases that occur in these linear data structures\u003c/li\u003e\\n\u003cli\u003eAnalyze the time complexity of linear data structures and their algorithms\u003c/li\u003e\\n\u003cli\u003eCompute amortized analysis for Arrays, ArrayLists, Stacks and Queues\u003c/li\u003e\\n\u003cli\u003eImplement recursive methods that operate on linear data structures\u003c/li\u003e\\n\u003cli\u003eExtend knowledge of these concepts to other structures like PriorityQueues and Deques\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5fda4000-8baf-4c1a-b6e6-840189eda463\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+CS1332xI+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b30c5c26-0189-422c-a66e-5af26463e446\",\"productName\":\"Probability and Statistics I: A Gentle Introduction to Probability\",\"productSlug\":\"learn/statistics/the-georgia-institute-of-technology-probability-and-statistics-i-a-gentle-introduction-to-probability\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b30c5c26-0189-422c-a66e-5af26463e446-976c90fdc203.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Engineering\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$101\",\"shortDescription\":\"\u003cp\u003eThis course provides an introduction to basic probability concepts. Our emphasis is on applications in science and engineering, with the goal of enhancing modeling and analysis skills for a variety of real-world problems.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon completion of this course, learners will be able to:\u003c/p\u003e\\n\u003cp\u003e• Recall Bootcamp lessons based on set theory and calculus\u003cbr /\u003e\\n• Understand underlying probability axioms\u003cbr /\u003e\\n• Apply elementary probability counting rules, including permutations and combinations\u003cbr /\u003e\\n• Implement the concepts of independence and conditional probability\u003cbr /\u003e\\n• Determine how to update probabilities via Bayes Rule\u003c/p\u003e\",\"objectId\":\"course-b30c5c26-0189-422c-a66e-5af26463e446\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+ISYE6739xI+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6a5f3546-a974-4bcf-adf7-d9acb31c81b9\",\"productName\":\"Data Structures \u0026 Algorithms II: Binary Trees, Heaps, SkipLists and HashMaps\",\"productSlug\":\"learn/data-structures/the-georgia-institute-of-technology-data-structures-algorithms-ii-binary-trees-heaps-skiplists-and-hashmaps\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6a5f3546-a974-4bcf-adf7-d9acb31c81b9-ce3dc0df5acc.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$102\",\"shortDescription\":\"\u003cp\u003eBecome familiar with nonlinear and hierarchical data structures. Study various tree structures: Binary Trees, BSTs and Heaps. Understand tree operations and algorithms. Learn and implement HashMaps that utilize key-value pairs to store data. Explore probabilistic data structures like SkipLists. Course tools help visualize the structures and performance.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDevelop mature Java programming skills by using recursion in Tree ADTs \u003c/li\u003e\\n\u003cli\u003eInvestigate different nonlinear, linked data structures: Trees, Heaps, SkipLists and HashMaps \u003c/li\u003e\\n\u003cli\u003eStudy the significant uses and applications of hierarchical tree structures \u003c/li\u003e\\n\u003cli\u003eExplore tree properties, and categorizing based on shape and order \u003c/li\u003e\\n\u003cli\u003eDesign and implement the binary trees: BSTs and Heaps \u003c/li\u003e\\n\u003cli\u003eExamine edge cases and efficiencies in BST and Heap operations \u003c/li\u003e\\n\u003cli\u003eUnderstand the up-heap, down-heap and build-heap procedures \u003c/li\u003e\\n\u003cli\u003eConsider the probabilistic data structure, SkipLists, and randomization \u003c/li\u003e\\n\u003cli\u003eImplement a HashMap ADT with its key-value pairs \u003c/li\u003e\\n\u003cli\u003eAnalyze the different collision strategies with HashMaps \u003c/li\u003e\\n\u003cli\u003eCompute amortized analysis for Heaps and HashMaps\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6a5f3546-a974-4bcf-adf7-d9acb31c81b9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+CS1332xII+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4d3258fc-bcee-4c37-bf7a-9f22524bf4a7\",\"productName\":\"Human-Computer Interaction I: Fundamentals \u0026 Design Principles\",\"productSlug\":\"learn/human-computer-interaction/the-georgia-institute-of-technology-human-computer-interaction-i-fundamentals-design-principles\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-050cbdf42229.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$103\",\"shortDescription\":\"\u003cp\u003eLearn the principles of Human-Computer Interaction to create intuitive, usable interfaces, with established design principles like feedback cycles, direct manipulation, affordances, signifiers, and more.\u003c/p\u003e\",\"productOverview\":\"$104\",\"objectId\":\"course-4d3258fc-bcee-4c37-bf7a-9f22524bf4a7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HCIxI+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8b38cf01-e5fb-4e07-8d1e-eedcb37ae558\",\"productName\":\"Data Structures \u0026 Algorithms III: AVL and 2-4 Trees, Divide and Conquer Algorithms\",\"productSlug\":\"learn/data-structures/the-georgia-institute-of-technology-data-structures-algorithms-iii-avl-and-2-4-trees-divide-and-conquer-algorithms\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8b38cf01-e5fb-4e07-8d1e-eedcb37ae558-c7d51e17f6b0.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$105\",\"shortDescription\":\"\u003cp\u003eLearn more complex tree data structures, AVL and (2-4) trees. Investigate the balancing techniques found in both tree types. Implement these techniques in AVL operations. Explore sorting algorithms with simple iterative sorts, followed by Divide and Conquer algorithms. Use the course visualizations to understand the performance.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eImprove Java programming skills by implementing AVLs and sorting algorithms\u003c/li\u003e\\n\u003cli\u003eStudy techniques for restoring balance in AVL and (2-4) trees\u003c/li\u003e\\n\u003cli\u003eDistinguish when to apply single and double rotations in AVLs\u003c/li\u003e\\n\u003cli\u003eInvestigate complex (2-4) trees that exhibit underflow and overflow problems\u003c/li\u003e\\n\u003cli\u003eDemonstrate the appropriate use of promotion, transfer and fusion in (2-4) trees\u003c/li\u003e\\n\u003cli\u003eImplement basic iterative sorting algorithms: Bubble, Insertion and Selection\u003c/li\u003e\\n\u003cli\u003eExplore optimizations to improve efficiency, including Cocktail Shaker Sort\u003c/li\u003e\\n\u003cli\u003eContemplate two Divide \u0026amp; Conquer comparison sorting algorithms: Merge and Quick Sort\u003c/li\u003e\\n\u003cli\u003eConsider one non-comparison Divide \u0026amp; Conquer algorithm: LSD Radix Sort\u003c/li\u003e\\n\u003cli\u003eAnalyze the stability, memory usage and adaptations of all sorting algorithms presented\u003c/li\u003e\\n\u003cli\u003eStudy the time complexity for the AVLs, (2-4) Trees and sorting algorithms\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8b38cf01-e5fb-4e07-8d1e-eedcb37ae558\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+CS1332xIII+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e8850ec1-3ef3-4a66-bc98-02f62b272775\",\"productName\":\"Probability and Statistics II: Random Variables – Great Expectations to Bell Curves\",\"productSlug\":\"learn/statistics/the-georgia-institute-of-technology-probability-and-statistics-ii-random-variables-great-expectations-to-bell-curves\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e8850ec1-3ef3-4a66-bc98-02f62b272775-767052074a53.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Math\",\"Engineering\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$106\",\"shortDescription\":\"\u003cp\u003eThis course discusses properties and applications of random variables. For instance, how many customers are likely to arrive in the next hour? What’s the probability that a lightbulb will last more than a year?\u003c/p\u003e\\n\u003cp\u003eWhen you’re done with this course, you’ll have enough firepower to undertake a wide variety of modeling and analysis problems; and you’ll be well-prepared for the upcoming Statistics courses.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon completion of this course, learners will be able to:\u003c/p\u003e\\n\u003cp\u003e• Identify discrete and continuous random variables\u003cbr /\u003e\\n• Describe the properties of random variables, including the expected value, variance, and moment generating function.\u003cbr /\u003e\\n• Understand functions of random variables, and how they can be used in computer simulation applications.\u003cbr /\u003e\\n• Recognize joint (two-dimensional) random variables and how to extract marginal (onedimensional) and conditional information from them\u003cbr /\u003e\\n• Implement the concepts of independence and correlation\u003cbr /\u003e\\n• Work with and implement the R statistical package\u003c/p\u003e\",\"objectId\":\"course-e8850ec1-3ef3-4a66-bc98-02f62b272775\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+ISYE6739xII+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8a795319-4243-4956-af0d-f23ea93d8a2a\",\"productName\":\"Human-Computer Interaction III: Ethics, Needfinding \u0026 Prototyping\",\"productSlug\":\"learn/human-computer-interaction/the-georgia-institute-of-technology-human-computer-interaction-iii-ethics-needfinding-prototyping\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8a795319-4243-4956-af0d-f23ea93d8a2a-0fd1b1cbb91a.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$107\",\"shortDescription\":\"\u003cp\u003eBuild on your knowledge of HCI’s core principles by learning to design interfaces in the real world. Begin with the ethics of human subjects research, then learn critical methods for requirements gathering and brainstorming design alternatives.\u003c/p\u003e\",\"productOverview\":\"$108\",\"objectId\":\"course-8a795319-4243-4956-af0d-f23ea93d8a2a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HCIxIII+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d72cb271-b1ed-4881-bc87-dbcc16708307\",\"productName\":\"Human-Computer Interaction IV: Evaluation, Agile Methods \u0026 Beyond\",\"productSlug\":\"learn/human-computer-interaction/the-georgia-institute-of-technology-human-computer-interaction-iv-evaluation-agile-methods-beyond\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d72cb271-b1ed-4881-bc87-dbcc16708307-b03f50bdd766.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"$109\",\"shortDescription\":\"\u003cp\u003eComplete your understand of the design life cycle by learning to take interface ideas, prototype them quickly, and evaluate them with real users. Finally, tie principles and methods together and learn the next steps you could take in HCI.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eMethods for qualitative evaluation, including think-aloud studies and post-hoc interviews.\u003c/li\u003e\\n\u003cli\u003eMethods for empirical evaluation, including hypothesis testing and experimental design.\u003c/li\u003e\\n\u003cli\u003eMethods for heuristic evaluation, such as cognitive walkthroughs and task analysis.\u003c/li\u003e\\n\u003cli\u003eThe symbiosis between HCI and Agile development cycles.\u003c/li\u003e\\n\u003cli\u003eThe current state of HCI technologies such as extended reality, mobile devices, and robotics.\u003c/li\u003e\\n\u003cli\u003eThe current state of HCI in domains like education, healthcare, and cybersecurity.\u003c/li\u003e\\n\u003cli\u003eThe significant sub-schools of HCI such as social computing, computer-supported collaborative work, and information visualization.\u003c/li\u003e\\n\u003cli\u003eWhat you can expect to do next in HCI.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d72cb271-b1ed-4881-bc87-dbcc16708307\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HCIxIV+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e3933140-d4dc-4a6a-bf08-4e068cc5609e\",\"productName\":\"Health Informatics: Data and Interoperability Standards\",\"productSlug\":\"learn/health-informatics/the-georgia-institute-of-technology-health-informatics-data-and-interoperability-standards\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e3933140-d4dc-4a6a-bf08-4e068cc5609e-1a01f292a73d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Health \u0026 Safety\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"\u003cp\u003eOnce electronic health records and other clinical systems used in patient care are digital, the focus turns to how this health information can be represented and shared using standards. Developing standards that are both sufficiently comprehensive and also implementable in practice is one of the long-standing health informatics challenges in part because of the complexity of the human body and the resultant complexity of patient care. We discuss data and data sharing (interoperability) standards separately but they are inevitably intertwined since the information being shared using interoperability standards is often represented using data standards.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThe key standards for representing and sharing healthcare data.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eWorking familiarity with the major health care data standards\u003c/li\u003e\\n\u003cli\u003eAwareness of the web-based tools for accessing the data standards\u003c/li\u003e\\n\u003cli\u003eHL7 as the global health care interoperability standards organization\u003c/li\u003e\\n\u003cli\u003eHL7 interoperability standards history\u003c/li\u003e\\n\u003cli\u003eThe HL7 interoperability standards that preceded FHIR\u003c/li\u003e\\n\u003cli\u003eThe FHIR interoperability standard\u003c/li\u003e\\n\u003cli\u003eThe SMART on FHIR EHR connected app platform\u003c/li\u003e\\n\u003cli\u003eFamiliarity with web-based tools for learning and utilizing FHIR and SMART on FHIR\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e3933140-d4dc-4a6a-bf08-4e068cc5609e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HI2018xII+1T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"049ca241-7dd6-49d1-8728-f4160dae3dc9\",\"productName\":\"English for Doing Business in Asia – Speaking\",\"productSlug\":\"learn/english/the-hong-kong-university-of-science-and-technology-english-for-doing-business-in-asia-speaking\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/049ca241-7dd6-49d1-8728-f4160dae3dc9-a17378f17463.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Business \u0026 Management\",\"Language\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"$10a\",\"shortDescription\":\"\u003cp\u003eIntroducing strategies for developing your spoken English communication skills in the context of doing business in Asia.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ePronounce sounds clearly and use rhythm appropriately and persuasively\u003c/li\u003e\\n\u003cli\u003eIdentify the purpose of an oral presentation to meet the audience’s needs\u003c/li\u003e\\n\u003cli\u003eOrganize an oral presentation to suit the audience and purpose\u003c/li\u003e\\n\u003cli\u003eDeliver an informative and a persuasive presentation to discuss a topic relevant to a business context in Asia\u003c/li\u003e\\n\u003cli\u003eDevelop an understanding of cross-cultural issues, style, and genre for business communication purposes\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-049ca241-7dd6-49d1-8728-f4160dae3dc9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+EBA101x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b158102c-e8a3-4e03-b4ef-096065e1c84d\",\"productName\":\"Ergonomics in Design\",\"productSlug\":\"learn/design/the-hong-kong-university-of-science-and-technology-ergonomics-in-design\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b158102c-e8a3-4e03-b4ef-096065e1c84d-867080412bb8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Design\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"$10b\",\"shortDescription\":\"\u003cp\u003eThe course is designed to provide a basic understanding of ergonomics in design through the introduction of human anatomy, anthropometry, and modeling techniques with the aim of improving safety, productivity, comfort and health of people.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eApply ergonomic principles for the creation of safer, healthier and more efficient and effective products and activities\u003c/li\u003e\\n\u003cli\u003eRecognize the workings of the human body and their implications on products\u003c/li\u003e\\n\u003cli\u003eIdentify engineering solutions to improve human performance and reduce the risk of discomfort and injury when interacting with products\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b158102c-e8a3-4e03-b4ef-096065e1c84d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ISDN4330.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8265a384-6d1b-4410-af53-36420b16b6f9\",\"productName\":\"English for Doing Business in Asia – Writing\",\"productSlug\":\"learn/writing/the-hong-kong-university-of-science-and-technology-english-for-doing-business-in-asia-writing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8265a384-6d1b-4410-af53-36420b16b6f9-4382806123cc.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Business \u0026 Management\",\"Language\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"$10c\",\"shortDescription\":\"\u003cp\u003eIntroducing strategies for developing your written English communication skills in the context of doing business in Asia.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ePlan, research and structure a piece of writing according to the needs of a specific reader and purpose\u003c/li\u003e\\n\u003cli\u003eWrite a series of coherent and cohesive paragraphs, in which topic sentences containing controlling ideas are expanded with details, examples and explanations\u003c/li\u003e\\n\u003cli\u003eIdentify the purpose of a written document to meet the audience’s needs\u003c/li\u003e\\n\u003cli\u003eOrganize a written document to suit the audience and purpose\u003c/li\u003e\\n\u003cli\u003eDevelop an understanding of cross-cultural issues, style, and genre for business communication purposes\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8265a384-6d1b-4410-af53-36420b16b6f9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+EBA102x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f2694a55-7704-4dd5-9799-2a1557efa0c3\",\"productName\":\"A System View of Communications: From Signals to Packets (Part 1)\",\"productSlug\":\"learn/engineering/the-hong-kong-university-of-science-and-technology-a-system-view-of-communications-from-signals-to-packets-part-1\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f2694a55-7704-4dd5-9799-2a1557efa0c3-9e0cbea45bff.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Electronics\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"\u003cp\u003eHave you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems.\u003c/p\u003e\\n\u003cp\u003eThis course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition.\u003c/p\u003e\\n\u003cp\u003eThis course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLearn the point-to-point link which communicates information from a single transmitter to a single receiver.\u003c/li\u003e\\n\u003cli\u003eGain a basic understanding of the engineering tools used and tradeoffs faced in designing digital communications systems.\u003c/li\u003e\\n\u003cli\u003eDiscuss effective solutions to overcome these challenges and develop intuitive, useful systems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f2694a55-7704-4dd5-9799-2a1557efa0c3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ELEC1200.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1f757065-138f-45f2-857f-eaba7d99a548\",\"productName\":\"Ergonomics in Action\",\"productSlug\":\"learn/design/the-hong-kong-university-of-science-and-technology-ergonomics-in-action\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1f757065-138f-45f2-857f-eaba7d99a548-5760a1ac67a2.png\",\"productType\":\"Course\",\"attributes\":[\"Design\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"$10d\",\"shortDescription\":\"\u003cp\u003eThe course is designed to provide an understanding of how anthropometric and biomechanical information can be used in the design of workstations and products such as footwear with the aim of improving safety, productivity, comfort and health of people.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDesign a workplace according to ergonomic principles\u003c/li\u003e\\n\u003cli\u003eDetermine anthropometric measures\u003c/li\u003e\\n\u003cli\u003eApply anthropometric tables for evaluation and design criteria for products\u003c/li\u003e\\n\u003cli\u003eIdentify engineering solutions to improve human performance and reduce the risk of discomfort and injury when interacting with products\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1f757065-138f-45f2-857f-eaba7d99a548\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ISDN4330.2x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"caea2810-3db2-4d5f-be7d-22a9d91a4900\",\"productName\":\"A System View of Communications: From Signals to Packets (Part 2)\",\"productSlug\":\"learn/engineering/the-hong-kong-university-of-science-and-technology-a-system-view-of-communications-from-signals-to-packets-part-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/caea2810-3db2-4d5f-be7d-22a9d91a4900-3981580ef47d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Electronics\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"\u003cp\u003eHave you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems.\u003c/p\u003e\\n\u003cp\u003eThis course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition.\u003c/p\u003e\\n\u003cp\u003eThis course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the course, you will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLearn how multiple transmitters can share the same physical channel.\u003c/li\u003e\\n\u003cli\u003eGain a basic understanding of the engineering tools used and tradeoffs faced in designing digital communications systems.\u003c/li\u003e\\n\u003cli\u003eDiscuss effective solutions to overcome these challenges and develop intuitive, useful systems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-caea2810-3db2-4d5f-be7d-22a9d91a4900\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ELEC1200.2x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"eae8c83b-6d58-4537-a254-b3718f7d0ff7\",\"productName\":\"A System View of Communications: From Signals to Packets (Part 3)\",\"productSlug\":\"learn/engineering/the-hong-kong-university-of-science-and-technology-a-system-view-of-communications-from-signals-to-packets-part-3\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/eae8c83b-6d58-4537-a254-b3718f7d0ff7-a9c0b369c924.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Electronics\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"\u003cp\u003eHave you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? Gain an understanding of the basic engineering tools used and tradeoffs encountered in the design of these communication systems.\u003c/p\u003e\\n\u003cp\u003eThis course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition.\u003c/p\u003e\\n\u003cp\u003eThis course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the course, you will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLearn how information can be transmitted reliably from one station to another over a network that connects multiple stations.\u003c/li\u003e\\n\u003cli\u003eGain a basic understanding of the engineering tools used and tradeoffs faced in designing digital communications systems.\u003c/li\u003e\\n\u003cli\u003eDiscuss effective solutions to overcome these challenges and develop intuitive, useful systems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-eae8c83b-6d58-4537-a254-b3718f7d0ff7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ELEC1200.3x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"be7c922e-ebbb-4fe1-835d-04b5d349d198\",\"productName\":\"Developing Generative AI Applications with Python\",\"productSlug\":\"learn/artificial-intelligence/ibm-developing-generative-ai-applications-with-python\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/be7c922e-ebbb-4fe1-835d-04b5d349d198-13c4f21e13cc.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$10e\",\"shortDescription\":\"\u003cp\u003eBuild in-demand skills in generative AI application development and get hands-on experience creating intelligent chatbots and apps using popular LLMs, RAG technology, and IBM watsonx.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eJob-ready generative AI app development skills in 6 weeks, supported by practical experience and an industry-recognized credential. \u003c/li\u003e\\n\u003cli\u003eHow to integrate and enhance large language models (LLMs) using RAG technology to build intelligent apps and chatbots. \u003c/li\u003e\\n\u003cli\u003eHow to use Python libraries like Flask and Gradio to create web applications that interact with generative AI models. \u003c/li\u003e\\n\u003cli\u003eHow to use different frameworks and AI technologies to build AI-powered applications. \u003c/li\u003e\\n\u003cli\u003eHow to build generative AI-powered applications and chatbots using generative AI models, Python, and related frameworks.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-be7c922e-ebbb-4fe1-835d-04b5d349d198\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+AI0331EN+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f0543bb0-b2d6-45db-a805-950aa835a3d8\",\"productName\":\"Introduction to Data Science and Basic Statistics for Business\",\"productSlug\":\"learn/data-analysis/tecnologico-de-monterrey-introduction-to-data-science-and-basic-statistics-for-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f0543bb0-b2d6-45db-a805-950aa835a3d8-67ed97d17697.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"\u003cp\u003eThis course allows you to develop skills of a decision maker leader based on the following competencies:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eanalysis of statistical elements of information\u003c/li\u003e\\n\u003cli\u003econcepts and statistical foundations for the application of the area of data science\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eThrough descriptive statistics, the study and analysis of discrete and continuous probability distributions, as well as the estimation by intervals for the mean and the proportion, it is how you will be able to develop both skills.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eIn this course you will acquire statistical methods for decision making in business, as well as technological tools to develop quantitative skills.\u003c/p\u003e\\n\u003cp\u003eAreas such as \\\" big data\\\" require very clear knowledge of statistics and business, technology provides us various applications that require solid training in statistics for proper use and interpretation .\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThrough this course, participants will be able to:\u003c/p\u003e\\n\u003cp\u003e● Apply basic statistical methods to the business environment\u003c/p\u003e\\n\u003cp\u003e● Use technological tools to develop quantitative skills\u003c/p\u003e\\n\u003cp\u003e● Interpret the results of statistical methods applied to businesses\u003c/p\u003e\",\"objectId\":\"course-f0543bb0-b2d6-45db-a805-950aa835a3d8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+EQ-IDS.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"941d1e0a-758c-4792-acbe-e50aef58a236\",\"productName\":\"Drones for Agriculture: Advanced Sensing and Analysis\",\"productSlug\":\"learn/drones/wageningen-university-research-drones-for-agriculture-advanced-sensing-and-analysis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/941d1e0a-758c-4792-acbe-e50aef58a236-cb88c880debc.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Environmental Studies\",\"Energy \u0026 Earth Sciences\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$10f\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAre \u003c/span\u003eyou wondering how drones can contribute to improving crop management? Discover what sensing approaches are available on the market. Join us and learn h\u003cspan lang=\\\"EN-US\\\"\u003eow to turn the data you collect into valuable information.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAfter this course you will be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eExplain\u003c/span\u003e which UAV sensing systems are available and how they operate\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eI\u003c/span\u003enterpret data acquired with different sensors\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUnderstand how \u003c/span\u003edifferent sensors can be used in your application\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eImplement a\u003c/span\u003e processing workflow for different types of UAV data\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDesign \u003c/span\u003ean appropriate processing approach based on available datasets and application at hand\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eEvaluate results of UAV data \u003c/span\u003eanalysis and propose improvements\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-941d1e0a-758c-4792-acbe-e50aef58a236\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+Drone02x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"81a74e3c-73e8-47bd-8f40-2127f7da7c70\",\"productName\":\"Quantum Mechanics for Scientists and Engineers 2\",\"productSlug\":\"learn/quantum-physics-mechanics/stanford-university-quantum-mechanics-for-scientists-and-engineers-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/81a74e3c-73e8-47bd-8f40-2127f7da7c70-84250e85dd38.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$110\",\"shortDescription\":\"\u003cp\u003eThis course covers key topics in the use of quantum mechanics in many modern applications in science and technology, introduces core advanced concepts such as spin, identical particles, the quantum mechanics of light, the basics of quantum information, and the interpretation of quantum mechanics, and covers the major ways in which quantum mechanics is written and used in modern practice.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCore advanced concepts such as: \u003cul\u003e\\n\u003cli\u003eSpin\u003c/li\u003e\\n\u003cli\u003eIdentical particles\u003c/li\u003e\\n\u003cli\u003eQuantum mechanics of light\u003c/li\u003e\\n\u003cli\u003eBasics of quantum information\u003c/li\u003e\\n\u003cli\u003eInterpretation of quantum mechanics\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003eThe major ways in which quantum mechanics is written and used in modern practice\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-81a74e3c-73e8-47bd-8f40-2127f7da7c70\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+EEX0001B+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4f789bf2-bda7-4c80-85b9-4f43c2ddac33\",\"productName\":\"Innovative Business Models for Expanding Broadband and Closing the Access Gaps\",\"productSlug\":\"learn/business-model/world-bank-group-innovative-business-models-for-expanding-broadband-and-closing-the-access-gaps\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4f789bf2-bda7-4c80-85b9-4f43c2ddac33-59d3528a7591.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":[\"World Bank Group\"],\"partnerKeys\":[\"WBGx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3ca455dc-4c90-4097-9203-d647e3e70771-af804add6293.png\",\"fullDescription\":\"\u003cp\u003eRecognizing that approximately half of the world’s population remains unconnected to the Internet and that the cost of Internet access remains higher than recommended guidelines in many countries. This digital divide and the factors that create or exacerbate it are driving policymakers to expand Internet access as a critical foundation for the digital economy, the focus of this course. Digital connectivity has also been at the forefront of the world’s response to the COVID-19 pandemic – providing means for people to communicate and share information as countries impose extreme social-distancing measures, enabling remote work by governments and businesses, and allowing citizens access to essential services such as telehealth, online education, and digital financial services.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course is based on the World Bank’s Innovative Business Models for Expanding Broadband and Closing the Access Gaps. This course is intended to provide informative examples and discussion regarding innovative business models and approaches to the deployment of high-speed broadband networks. The information presented and examples highlighted are intended to help policymakers and regulators better consider how they can assess broadband project options and adopt decisions tailored to their country’s circumstances and needs.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis course will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDescribe the importance of leveraging new business models for expanding Internet access, in particular with respect to bridging the digital divide.\u003c/li\u003e\\n\u003cli\u003eDescribe the broadband value chain.\u003c/li\u003e\\n\u003cli\u003eIdentify key broadband technology options.\u003c/li\u003e\\n\u003cli\u003eDescribe policy options available for encouraging broadband expansion.\u003c/li\u003e\\n\u003cli\u003eConsider the appropriate role of the state in broadband projects.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4f789bf2-bda7-4c80-85b9-4f43c2ddac33\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WBGx+IBM01x+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d9e87305-d3cf-444c-99ba-19928d5de4d2\",\"productName\":\"HP Digital Skills for Educators – Microsoft 365 Copilot\",\"productSlug\":\"learn/education-teacher-training/hp-hp-digital-skills-for-educators-microsoft-office\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d9e87305-d3cf-444c-99ba-19928d5de4d2-b49f259b6099.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"HP\"],\"partnerKeys\":[\"HP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\",\"fullDescription\":\"$111\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHP Digital Skills for Educators\u003c/span\u003e – Microsoft 365 Copilot is designed to equip educators who are entirely new to digital tools or have limited digital experience, with the essential knowledge and skills to understand and use of basic digital tools in their teaching processes.\u003c/p\u003e\\n\u003cp\u003eEducators who complete this course will be able to\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDevelop a foundational knowledge\u003c/span\u003e of Technology and Computers\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eLearn essential practices to protect\u003c/span\u003e their Privacy \u0026amp; Security in a digital world\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eGain\u003c/span\u003e skills in using Microsoft 365 tools in their daily workflows\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscover ways to integrate Micr\u003c/span\u003eosoft tools into their teaching processes to aid productivity and student learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"$112\",\"objectId\":\"course-d9e87305-d3cf-444c-99ba-19928d5de4d2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HP+HPDSEM01.en+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8f068fbf-7abb-4aa9-a48d-5b77050fce38\",\"productName\":\"Marketing Operations\",\"productSlug\":\"learn/marketing/doane-university-marketing-operations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8f068fbf-7abb-4aa9-a48d-5b77050fce38-5b8249196fb8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Communication\"],\"partnerName\":[\"Doane University\"],\"partnerKeys\":[\"DoaneX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e9e90c9f-85ec-4ae5-bea8-2ecae2258446-85b6b8c0a212.png\",\"fullDescription\":\"\u003cp\u003eOvertime every industry evolves and marketing is no different. Social media in its various forms have led to a massive shift in the way people consume, interact, and utilize information.\u003c/p\u003e\\n\u003cp\u003eIn this course, you will explore the changes in marketing practices that have occurred from the shift to social media communications.\u003c/p\u003e\\n\u003cp\u003eThis course will prepare you with the foundational understanding of marketing operations and evolving marketing practices for your current or future business career.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore topics focusing on the historical development of marketing as well as the effects that global trade and technology has on marketing practices and operations.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course the learner will be able to: \u003c/p\u003e\\n\u003cp\u003e● Identify and evaluate the Marketplace \u003c/p\u003e\\n\u003cp\u003e● Identify historical changes and concepts \u003c/p\u003e\\n\u003cp\u003e● Explore new technologies as they apply to marketing \u003c/p\u003e\\n\u003cp\u003e● Explain Social Media and Value Creation \u003c/p\u003e\\n\u003cp\u003e● Discuss market segmentation, target marketing \u0026amp; promotion\u003c/p\u003e\",\"objectId\":\"course-8f068fbf-7abb-4aa9-a48d-5b77050fce38\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DoaneX+BUS-2512x+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8ffb075a-8950-40ca-8101-ecd8a518e3b6\",\"productName\":\"Synthetic Aperture Radar: Hazards\",\"productSlug\":\"learn/earth-sciences/university-of-alaska-fairbanks-synthetic-aperture-radar-hazards\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8ffb075a-8950-40ca-8101-ecd8a518e3b6-4d52663b5b79.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Physics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$113\",\"shortDescription\":\"\u003cp\u003eThis online course focuses on the applications of Synthetic Aperture Radar (SAR) remote sensing for disaster monitoring. Learn about weather and illumination-independent SAR remote sensing technology, and explore its applications to natural hazards including earthquakes, volcanic eruptions, and flooding.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eParticipants in this course will develop the following skills:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIntuitive understanding of SAR image and phase information\u003c/li\u003e\\n\u003cli\u003eUnderstanding the properties of different SAR sensor types\u003c/li\u003e\\n\u003cli\u003eAbility to pick the optimal sensor for your application\u003c/li\u003e\\n\u003cli\u003eCreation of RGB color visualizations from images acquired at different times or in different polarizations\u003c/li\u003e\\n\u003cli\u003eUse of SAR images to map hazards such as flooding and deforestation\u003c/li\u003e\\n\u003cli\u003eUse of interferometric SAR techniques to measure cm-scale surface deformation related to volcanic activity and landslides\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8ffb075a-8950-40ca-8101-ecd8a518e3b6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+SAR-401+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6faca5d4-40b8-4ee1-b775-96fa807719ed\",\"productName\":\"Big Data Machine Learning | 大数据机器学习\",\"productSlug\":\"learn/big-data/tsinghua-university-big-data-machine-learning-da-shu-ju-ji-qi-xue-xi\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6faca5d4-40b8-4ee1-b775-96fa807719ed-da7e8d422f14.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Tsinghua University\"],\"partnerKeys\":[\"TsinghuaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b5714409-b5f4-4c9d-9348-b0fecbaaddd6-780fbb6c72c7.png\",\"fullDescription\":\"$114\",\"shortDescription\":\"\u003cp\u003eThe \\\"Big Data Machine Learning\\\" course is a basic theoretical course for senior undergraduates or graduate students in the information discipline. The purpose is to cultivate students to have an in-depth understanding of the theoretical basis of big data machine learning, a firm grasp of big data machine learning methods, and the ability to solve practical problems. and other comprehensive abilities. The main contents of the course include: basic theories of statistical learning, basic methods of machine learning, and deep learning theories and methods.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eBasic concepts of big data machine learning\u003c/li\u003e\\n\u003cli\u003eBig data machine learning technology and principles\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e.Machine learning and deep learning algorithms\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eBasic concepts of Big Data Machine Learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003ePrinciples and techniques of Big Data Machine Learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAlgorithms of machine learning and deep learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-6faca5d4-40b8-4ee1-b775-96fa807719ed\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TsinghuaX+70240403+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c\",\"productName\":\"Humanitarian Action in the Digital Age\",\"productSlug\":\"learn/computer-programming/ecole-polytechnique-federale-de-lausanne-humanitarian-action-in-the-digital-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c-e3c92e427041.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Humanities\"],\"partnerName\":[\"École polytechnique fédérale de Lausanne\"],\"partnerKeys\":[\"EPFLx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f244695-7416-4c6c-a2a9-97769b6acb56-a2dc5dd735ab.png\",\"fullDescription\":\"\u003cp\u003eAs humanitarian practitioner, you are interested in technology but you feel it should be used more responsibly? You are worried people tend to jump on opportunities without properly considering risks? This MOOC is for you!\u003c/p\u003e\\n\u003cp\u003eThis course will first introduce you to the basics of computer and data science and help you understand what happens underneath the surface when using a computer, the internet or social media. You will then dive into some more complex technologies like artificial intelligence, cryptography or distributed ledgers. Equipped with this knowledge, you will then explore with world-leading experts how to use technology responsibly, covering topics such as accountability, ethics, data protection, the do no harm principle and inclusion.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThe first MOOC about responsible use of technology for humanitarians. Learn about technology and identify risks and opportunities when designing digital solutions.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis MOOC will initially provide you with a holistic understanding of Information and Communication Technologies (ICT) – including:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComputers, network, internet and cloud computing\u003c/li\u003e\\n\u003cli\u003eSoftware, data and digital transformation\u003c/li\u003e\\n\u003cli\u003eCryptography, cybersecurity and privacy\u003c/li\u003e\\n\u003cli\u003eArtificial Intelligence and Distributed Ledgers\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eOnce you have a better grasp of technology, you will explore these topics through a humanitarian lens:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eEthics, accountability and the “do no harm” principle\u003c/li\u003e\\n\u003cli\u003eChallenges for humanitarian principles in the digital age\u003c/li\u003e\\n\u003cli\u003eData protection and cybersecurity\u003c/li\u003e\\n\u003cli\u003eDigital inclusion and human centered design.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d1a5dbf6-8ffc-449b-9fe5-91d3ea13c22c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EPFLx+DHA+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5f73b024-2455-4d5c-8bd3-efcf84cb6906\",\"productName\":\"HP Digital Skills for Educators – Google Workspace\",\"productSlug\":\"learn/education-teacher-training/hp-hp-digital-skills-for-educators-google-workspace\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f73b024-2455-4d5c-8bd3-efcf84cb6906-c7a5b87adaee.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"HP\"],\"partnerKeys\":[\"HP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\",\"fullDescription\":\"$115\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHP Digital Skills for Educators\u003c/span\u003e – Google Workspace is designed to equip educators with the essential knowledge and skills to understand and use of basic digital tools in their teaching processes.\u003c/p\u003e\\n\u003cp\u003eEducators who complete this course will be able to\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDevelop a foundational knowledge\u003c/span\u003e of Technology and Computers\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eLearn essential practices to protect\u003c/span\u003e their Privacy \u0026amp; Security in a digital world\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eGain\u003c/span\u003e skills in using Google Workspace tools in their daily workflows\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscover ways to integrate \u003c/span\u003eGoogle tools into their teaching processes to aid productivity and student learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"$116\",\"objectId\":\"course-5f73b024-2455-4d5c-8bd3-efcf84cb6906\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HP+HPDSEG01.en+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"818fd544-aedf-4d1c-8a5f-91c8ac8e69a8\",\"productName\":\"Synthetic Aperture Radar: Ecosystems\",\"productSlug\":\"learn/ecosystems/university-of-alaska-fairbanks-synthetic-aperture-radar-ecosystems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/818fd544-aedf-4d1c-8a5f-91c8ac8e69a8-4035b6723412.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Physics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$117\",\"shortDescription\":\"\u003cp\u003eThis online course will introduce the contributions of Synthetic Aperture Radar (SAR) remote sensing to the monitoring of Earth’s ecosystems. Learn how the weather-independence of SAR combined with its ability to penetrate into vegetation canopies make SAR an excellent information source to characterize vegetation structure, measure above-ground biomass, and analyze the change of vegetation long term and throughout the seasons.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eParticipants in this course will develop the following skills:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIntuitive understanding of SAR images and polarimetric SAR\u003c/li\u003e\\n\u003cli\u003eUnderstanding the role of wavelength and signal polarization when applying SAR to the monitoring of ecosystems\u003c/li\u003e\\n\u003cli\u003eUse SAR data to map and monitor agriculture extent \u003c/li\u003e\\n\u003cli\u003eApply SAR to map and assess forest degradation activities \u003c/li\u003e\\n\u003cli\u003eTechniques to measure above-ground forest biomass from spaceborne SAR observations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-818fd544-aedf-4d1c-8a5f-91c8ac8e69a8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+SAR-402+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"54b0c343-22c0-4233-8c8b-b91729ca0ed5\",\"productName\":\"Evolution of Business and Market\",\"productSlug\":\"learn/business-administration/indian-institute-of-management-bangalore-evolution-of-business-and-market\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/54b0c343-22c0-4233-8c8b-b91729ca0ed5-083561e65c45.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Indian Institute of Management Bangalore\"],\"partnerKeys\":[\"IIMBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c2e6b3f5-9c1f-41f0-b692-f2173d05a256-7729f0b9d72b.png\",\"fullDescription\":\"\u003cp\u003eEach week is discussed in detail covering topics as diverse as the persistence of merchant guilds in medieval Europe, the historical emergence of the modern impersonal markets, and their promised benefits in comparison to traditional systems of business and the influence of pre-colonial institutions on development in Africa and Asia.\u003c/p\u003e\\n\u003cp\u003eThe course also deals with how businesses could overcome frictions of information asymmetry and moral hazards. We first explore the role of networks and hierarchy in shaping traditional and modern business, and then discuss the historical evolution of the firm, from individual merchants and guilds to large multinational corporations. We discuss the importance and limits of formal institutions, the role of trust and cosmopolitan culture, and the impact of communication, transport and mass-media technologies.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis course deals with how businesses and markets have evolved over time. The six-week course is divided into six themes focused on the evolution of businesses and markets, and the role of networks, institutions, culture and technology in their evolution.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThe course is designed with the following specific objectives and learning outcomes: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eLearn the role of a dense network of relationships in Traditional Business.\u003c/li\u003e\\n\u003cli\u003eUnderstand the formalization of business over time from craft guilds to formal markets.\u003c/li\u003e\\n\u003cli\u003eDescribe how the social structure of a society affects the growth of the market.\u003c/li\u003e\\n\u003cli\u003eExplain a historical perspective of how markets evolve.\u003c/li\u003e\\n\u003cli\u003eAnalyse various policies of business and market; role of institutions, cultural ingredients, and technology in the development process.\u003c/li\u003e\\n\u003cli\u003eStudy of the economy focusing exclusively on India.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-54b0c343-22c0-4233-8c8b-b91729ca0ed5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IIMBx+ST105x+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0873ab96-d416-4f45-8845-34643833dd8d\",\"productName\":\"Capstone: Following the Well Architected Framework\",\"productSlug\":\"learn/computer-science/amazon-web-services-capstone-following-the-well-architected-framework\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0873ab96-d416-4f45-8845-34643833dd8d-f950b00d24c3.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Amazon Web Services\"],\"partnerKeys\":[\"AWS\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/31705519-3082-4c18-aa23-1caf9a038b1c-21ab36bd68bc.png\",\"fullDescription\":\"$118\",\"shortDescription\":\"\u003cp\u003eThis course is the final part of the Cloud Technology Consultant Professional Certificate where all of your knowledge will come together. You've gained foundational tech knowledge and AWS Cloud expertise, but how can you ensure your solutions adhere to best practices? That's where the AWS Well-Architected Framework comes in. It offers guidance for secure, high-performance, resilient, and efficient AWS solutions. We'll assess workloads against its principles, explore the AWS Well-Architected Tool, and apply the framework to your Capstone project. Additionally, you'll discover steps for launching your career, including AWS Certification, hands-on experience, and technical interview practice.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDescribe how and when to use The Well Architected Framework\u003c/li\u003e\\n\u003cli\u003eDifferentiate between the pillars of The Well Architected Framework\u003c/li\u003e\\n\u003cli\u003eEvaluate AWS architectures against The Well Architected Framework\u003c/li\u003e\\n\u003cli\u003eRecall cost optimization techniques for AWS architectures\u003c/li\u003e\\n\u003cli\u003eDefine disaster recovery and evaluate disaster recovery options in the cloud\u003c/li\u003e\\n\u003cli\u003eLearn how to interview for an IT job and how to prepare for an interview\u003c/li\u003e\\n\u003cli\u003eCreate a portfolio and a resume\u003c/li\u003e\\n\u003cli\u003eLearn about AWS Certification and the benefits of AWS Certification\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0873ab96-d416-4f45-8845-34643833dd8d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AWS+CTC-Capstone-Architected+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"58dd0be7-fb22-4ecc-b013-1caa67817bea\",\"productName\":\"Basic Japanese Civil Law\",\"productSlug\":\"learn/law/institute-of-science-tokyo-basic-japanese-civil-law-3\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/58dd0be7-fb22-4ecc-b013-1caa67817bea-0444540de71f.png\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Social Sciences\"],\"partnerName\":[\"Institute of Science Tokyo\"],\"partnerKeys\":[\"ScienceTokyo\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c64ca4df-182e-4dff-8f9c-bce589fef512-032c9ce46518.png\",\"fullDescription\":\"$119\",\"shortDescription\":\"\u003cp\u003eTokyo Institute of Technology (Tokyo Tech) created this online as a edX member before it merged with Tokyo Medical and Dental University (TMDU) to form Institute of Science Tokyo (Science Tokyo) on October 1, 2024.\u003c/p\u003e\\n\u003cp\u003eThe institute names “Tokyo Tech” and “Tokyo Institute of Technology” are used in this course, however, the current name of the institute is “Institute of Science Tokyo”.\u003c/p\u003e\\n\u003cp\u003e---\u003c/p\u003e\\n\u003cp\u003eLearn Japanese Civil Law, covering various contemporary issues faced in everyday life.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eStructure of legal system and justice system\u003c/li\u003e\\n\u003cli\u003eBasic Japanese civil law, especially the Japanese civil code\u003c/li\u003e\\n\u003cli\u003eContemporary problems in civil law\u003c/li\u003e\\n\u003cli\u003eMethods for accessing Japanese law and legal information\u003c/li\u003e\\n\u003cli\u003eSome basic legal technical terms in Japanese\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-58dd0be7-fb22-4ecc-b013-1caa67817bea\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ScienceTokyo+JLaw101x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e2ed559f-3acf-45aa-920e-49591f52ec03\",\"productName\":\"Big Data for Agri-Food: Principles and Tools\",\"productSlug\":\"learn/big-data/wageningen-university-research-big-data-for-agri-food-principles-and-tools\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e2ed559f-3acf-45aa-920e-49591f52ec03-0d01f1e98d51.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Computer Science\",\"Business \u0026 Management\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$11a\",\"shortDescription\":\"\u003cp\u003eAs the big data era unfolds, developments in sensor and information technologies are evolving quickly. As a result, science and businesses are yielding enormous amounts of data. Ideally this data provides valuable insights for decision-making in real time. But processing data the traditional way is no longer possible. Join Wageningen University \u0026amp; Research, #1 university Animal Sciences and Agriculture, and learn how to best handle big data sets. Enrol now.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eRecognize big data characteristics (volume, velocity, variety, veracity)\u003c/li\u003e\\n\u003cli\u003eThe difference between scaling up and scaling out\u003c/li\u003e\\n\u003cli\u003eBig data principles: immutability and pure functions\u003c/li\u003e\\n\u003cli\u003eProcessing big data with map-reduce, using clusters\u003c/li\u003e\\n\u003cli\u003eUnderstand technologies: distributed file systems, Hadoop\u003c/li\u003e\\n\u003cli\u003eHow dataframes and wrapper technology (Apache Spark) make life easier\u003c/li\u003e\\n\u003cli\u003eThe big data workflow and pipeline\u003c/li\u003e\\n\u003cli\u003eHow data is organized in datalakes, using lazy evaluation\u003c/li\u003e\\n\u003cli\u003eDevelop insight how to apply this to your own case\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e2ed559f-3acf-45aa-920e-49591f52ec03\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+DRAGONx+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"327f6730-98ec-44f6-86f8-4c2b2640009d\",\"productName\":\"Cyberbullying-An Overview\",\"productSlug\":\"learn/child-development/state-bank-of-india-cyberbullying-an-overview\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/327f6730-98ec-44f6-86f8-4c2b2640009d-3ae29c9edbc4.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"State Bank of India\"],\"partnerKeys\":[\"State-Bank-of-India\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6fc80e42-95b2-47c6-a5e8-8d76f104cebd-dd0954c7476b.png\",\"fullDescription\":\"$11b\",\"shortDescription\":\"\u003cp\u003eCyberbullying is the use of technology to repeatedly harass, humiliate, or threaten an individual or group. This can include, but is not limited to, actions such as sending threatening messages, posting embarrassing photos or videos, and spreading rumors online. \u003c/p\u003e\\n\u003cp\u003eCyberbullying has become a growing concern among parents, educators, and lawmakers as technology continues to advance and become more ingrained in our daily lives. One of the main concerns with cyberbullying is that it can happen at any time and anywhere, as long as the bully has access to a device connected to the internet.\u003c/p\u003e\\n\u003cp\u003eCyberbullying has disastrous consequences which are sometimes irreparable and it needs to be addressed. It is affecting everyone irrespective of age , gender and location. Cyber bullying is a serious issue as it is creating a lot of mental stress which results in anxiety , self–doubt and depression and thereby affecting the whole personality of a person.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eLearning about cyberbullying can help you understand the impact it can have on individuals and communities, and how to recognize and prevent it. Cyber bullying is a great danger to the society. It causes harm to people and results negatively for, both, the bully and the victim. Being knowledgeable about cyberbullying definitely beneficial in various fields, such as social work, education, workplace or technology, where you may encounter and need to address the issue. Cyberbullying is a growing concern for people of all ages and backgrounds. As we are more and more dependent on digital technologies and social media, it is important for everyone to be aware of the potential negative consequences and take steps to prevent it.\u003c/p\u003e\",\"objectId\":\"course-327f6730-98ec-44f6-86f8-4c2b2640009d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:State-Bank-of-India+SBIIT005x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b0690b85-d927-40ca-891c-0f824c8b5653\",\"productName\":\"The COVID-19 Pandemic and the Use of mRNA Vaccines\",\"productSlug\":\"learn/vaccines/university-of-pennsylvania-the-covid-19-pandemic-and-the-use-of-mrna-vaccines\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b0690b85-d927-40ca-891c-0f824c8b5653-c5673c2e69a8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"University of Pennsylvania\"],\"partnerKeys\":[\"PennX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/fc03b413-d5d6-48af-974f-21da4d244ee8-6fe2970cf98b.png\",\"fullDescription\":\"$11c\",\"shortDescription\":\"\u003cp\u003eA brief course led by Dr. Drew Weissman, a pioneer of mRNA technology. Learn the facts about how mRNA vaccines work and what role they play in halting the COVID-19 pandemic from a team of experts in the Perelman School of Medicine at the University of Pennsylvania.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, learners will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExamine the role of vaccines in humanity’s ongoing fight against disease \u003c/li\u003e\\n\u003cli\u003eDescribe, in simple terms, how mRNA vaccines work \u003c/li\u003e\\n\u003cli\u003eDiscuss possible directions for mRNA vaccines as humanity looks to a future beyond the COVID-19 pandemic\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b0690b85-d927-40ca-891c-0f824c8b5653\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PennX+mRNA1x+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0f1843cc-cd8e-491d-86a3-f9bc7179dcac\",\"productName\":\"Planet Earth Geovisualization - MicroMasters\",\"productSlug\":\"learn/energy-earth-sciences/university-of-denver-planet-earth-geovisualization\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0f1843cc-cd8e-491d-86a3-f9bc7179dcac-2857d6a9ab5e.png\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$11d\",\"shortDescription\":\"\u003cp\u003eThe theory and art of map making developed over several thousand years and has been revolutionized by computer technology. This course is designed to expose students to the use of computer techniques in assessing technical design issues in the compilation of accurate and meaningful automated geographic mapping products. GIS software will be used in a series of hands-on lab exercises to produce typical GIS mapping products.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of this two-course series you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExamine the art and science of cartography and the components of map communication\u003c/li\u003e\\n\u003cli\u003eCreate vector map data in a geodatabase from a raster map\u003c/li\u003e\\n\u003cli\u003eCreate a choropleth map illustrating appropriate data classification techniques and symbology\u003c/li\u003e\\n\u003cli\u003eCreate a graduated symbol map illustrating appropriate data classification techniques and symbology\u003c/li\u003e\\n\u003cli\u003eCreate an Isarithmic map illustrating appropriate data classification technique and symbology\u003c/li\u003e\\n\u003cli\u003eRender a digital elevation model (DEM) into a 3D image to create viewshed and line of sight calculations\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0f1843cc-cd8e-491d-86a3-f9bc7179dcac\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+GIS-PEGMM-U041-202450+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2c182f50-1436-44a4-ac33-f23a60a98324\",\"productName\":\"Planet Earth Geovisualization, Deeper Dive - MicroMasters\",\"productSlug\":\"learn/energy-earth-sciences/university-of-denver-plant-earth-geovisualization-deeper-dive-micromasters\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2c182f50-1436-44a4-ac33-f23a60a98324-4127ffeb26ec.png\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$11e\",\"shortDescription\":\"\u003cp\u003eThis is the 2nd course in a two part series. The theory and art of map making developed over several thousand years and has been revolutionized by computer technology. This course is designed to expose students to the use of computer techniques in assessing technical design issues in the compilation of accurate and meaningful automated geographic mapping products. GIS software will be used in a series of hands-on lab exercises to produce typical GIS mapping products.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAt the end of the two-part series, students will be able to: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExamine the art and science of cartography and the components of map communication\u003c/li\u003e\\n\u003cli\u003eCreate vector map data in a geodatabase from a raster map\u003c/li\u003e\\n\u003cli\u003eCreate a choropleth map illustrating appropriate data classification techniques and symbology\u003c/li\u003e\\n\u003cli\u003eCreate a graduated symbol map illustrating appropriate data classification techniques and symbology\u003c/li\u003e\\n\u003cli\u003eCreate an Isarithmic map illustrating appropriate data classification technique and symbology\u003c/li\u003e\\n\u003cli\u003eRender a digital elevation model (DEM) into a 3D image to create viewshed and line of sight calculations\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2c182f50-1436-44a4-ac33-f23a60a98324\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+GIS-PEGDDMM-U041-202470+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"db51d48d-d269-49ed-8545-5fc816ac1ced\",\"productName\":\"Exploring Generative AI for Personalized User Experiences\",\"productSlug\":\"learn/engineering/university-of-british-columbia-exploring-generative-ai-for-personalized-user-experiences\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/db51d48d-d269-49ed-8545-5fc816ac1ced-0b5dab603c4c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Design\",\"Art \u0026 Culture\"],\"partnerName\":[\"University of British Columbia\"],\"partnerKeys\":[\"UBCx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\",\"fullDescription\":\"$11f\",\"shortDescription\":\"\u003cp\u003eExplore various AI personalization tools, understand their applications, and learn how to implement them effectively to enhance user experiences and drive business growth. This two-week intensive course is designed for those who are aiming to be content creators, digital media professionals and marketers who want to harness the power of Generative AI (GenAI) for personalization.\u003c/p\u003e\\n\u003cp\u003eThis course includes two \u003cstrong\u003e1.5-hour live interactive sessions\u003c/strong\u003e on Wednesdays, where you'll engage directly with course instructors and industry experts, ask questions, and gain hands-on experience.\u003c/p\u003e\\n\u003cp\u003eThis course may be eligible for .5 credit for a University of British Columbia Extended Learning \u003ca href=\\\"https://extendedlearning.ubc.ca/courses/ai-cloud-strategy-fundamentals/0160\\\" rel=\\\"noopener\\\" target=\\\"_blank\\\"\u003eMicro-certificate in AI and Cloud Strategy: Fundamentals.\u003c/a\u003e\u003c/p\u003e\\n\u003cp\u003eFor more information, contact ubcxsupport.exl@ubc.ca.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the fundamentals of Generative AI and its role in personalization\u003c/li\u003e\\n\u003cli\u003eExplore different AI personalization tools and their applications\u003c/li\u003e\\n\u003cli\u003eLearn how to implement AI personalization strategies in marketing campaigns\u003c/li\u003e\\n\u003cli\u003eAnalyze the impact of AI personalization on user engagement and business outcomes\u003c/li\u003e\\n\u003cli\u003eDevelop skills to evaluate and choose the right AI tools for specific personalization needs\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-db51d48d-d269-49ed-8545-5fc816ac1ced\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UBCx+AI.02x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2df50737-b55d-48b7-a86f-77b326e3ee88\",\"productName\":\"Bioethics: The Law, Medicine, and Ethics of Reproductive Technologies and Genetics\",\"productSlug\":\"learn/ethics/harvard-university-bioethics-the-law-medicine-and-ethics-of-reproductive-technologies-and-genetics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2df50737-b55d-48b7-a86f-77b326e3ee88-9c5471ae24d1.png\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Philosophy \u0026 Ethics\",\"Law\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$120\",\"shortDescription\":\"\u003cp\u003eAn introduction to the study of bioethics and the application of legal and ethical reasoning.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow the reproductive technology industry works, and issues raised related to buying and selling human reproductive materials\u003c/li\u003e\\n\u003cli\u003eThe law and ethics of surrogacy\u003c/li\u003e\\n\u003cli\u003eCivil lawsuits when things go wrong with reproductive technology: wrongful birth and wrongful life lawsuits\u003c/li\u003e\\n\u003cli\u003eThe law and ethics of sperm donation and the legal status of sperm donors\u003c/li\u003e\\n\u003cli\u003eEthical and legal issues raised by human enhancement\u003c/li\u003e\\n\u003cli\u003eThe law and ethics of mixing human and animal genetic material\u003c/li\u003e\\n\u003cli\u003eThe ownership of human tissue and its underlying genetic information\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2df50737-b55d-48b7-a86f-77b326e3ee88\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+HLS4X+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bb02f879-5c2d-4467-9461-b2d29c2d85df\",\"productName\":\"The Threat of Nuclear Terrorism\",\"productSlug\":\"learn/counterterrorism/stanford-university-the-threat-of-nuclear-terrorism\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bb02f879-5c2d-4467-9461-b2d29c2d85df-4fd38876f3db.jpeg\",\"productType\":\"Course\",\"attributes\":[\"History\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$121\",\"shortDescription\":\"\u003cp\u003eFormer Secretary of Defense William J. Perry and a team of international experts explore what can be done about the threat of nuclear terrorism in this free course, for which you can earn a signed Statement of Accomplishment. This is a self-paced version of the original course which ran in Fall 2017.\u003c/p\u003e\\n\u003cp\u003e\u003cstrong\u003eWelcome to \\\"The Threat of Nuclear Terrorism\\\"\u003c/strong\u003e\u003c/p\u003e\\n\u003cp\u003e\\\"Today, the danger of some sort of nuclear catastrophe is greater than it was during the Cold War, and most people are blissfully unaware of this danger.\\\"\u003c/p\u003e\\n\u003cp\u003eI wrote these words three years ago, and my concern led me to create my first Stanford Online course, \\\"Living at the Nuclear Brink.\\\" Our nuclear peril continues to increase, and therefore I offer the next in our series of free courses on this vital subject: The Threat of Nuclear Terrorism. The topic is frightening, but it is one we must face if we are to have any chance of stopping potential catastrophe.\u003c/p\u003e\",\"productOverview\":\"$122\",\"objectId\":\"course-bb02f879-5c2d-4467-9461-b2d29c2d85df\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+FSI.Y0001+1T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"efc25613-f0ea-4423-bfcd-4d94c317f085\",\"productName\":\"Tech for Good: The Role of ICT in Achieving the SDGs\",\"productSlug\":\"learn/technology/sdg-academy-tech-for-good-the-role-of-ict-in-achieving-the-sdgs\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/efc25613-f0ea-4423-bfcd-4d94c317f085-5dd84e82e22b.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Data Analysis \u0026 Statistics\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"SDG Academy\"],\"partnerKeys\":[\"SDGAcademyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0152661c-94b4-44ff-ad5d-54528339c1b0-516950c54c28.png\",\"fullDescription\":\"$123\",\"shortDescription\":\"\u003cp\u003eWhat opportunities and challenges do digital technologies present for the development of our society?\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eICT can improve access to knowledge and services, promote transparency, and encourage collaboration\u003c/li\u003e\\n\u003cli\u003eResponsible collection and use of data requires governance, security, and trust\u003c/li\u003e\\n\u003cli\u003eICT projects should be contextualized and inclusive\u003c/li\u003e\\n\u003cli\u003eTechnology is \u003cem\u003enot\u003c/em\u003e neutral! Be aware of bias in design and implementation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-efc25613-f0ea-4423-bfcd-4d94c317f085\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:SDGAcademyX+ICT001+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6636fff3-c5d4-4e31-907e-5eaa111c9a13\",\"productName\":\"Introduction to the Internet of Things\",\"productSlug\":\"learn/iot-internet-of-things/universitat-politecnica-de-valencia-introduction-to-the-internet-of-things\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6636fff3-c5d4-4e31-907e-5eaa111c9a13-66be3d0fec08.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"\u003cp\u003eInternet of Things (IoT) is the present and the future of technology. Either, if you have none, few or some experience with electronics and you want to develop it projects this course will give you the necessary kick start to start creating amazing devices capable of sensing, controlling physical signals. This course introduces it using Arduino and ESP boards. This is a preliminary course in which we deal, with the basics of electronics and programming. If you already know the basics, then the second part of this course will be of your interest, in which we start creating smart devices.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis is a preliminary course in which we deal with the basics of electronics and programming using Arduino and ESP boards.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the basic concepts of electroncis for programming microcontrollers (digital, analog, PWM, communication buses, timers, etc.).\u003c/li\u003e\\n\u003cli\u003eTo program Arduino and ESP devices\u003c/li\u003e\\n\u003cli\u003eTo read data from ambient and environmental sensors (temperature, humidity, light)\u003c/li\u003e\\n\u003cli\u003eTo control actuators such as a fan, a light or a water pump using a relay\u003c/li\u003e\\n\u003cli\u003eTo display information on LCD displays to print data of your device\u003c/li\u003e\\n\u003cli\u003eTo use buttons and LEDs (and RGB LEDs) to generate a basic user interface\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6636fff3-c5d4-4e31-907e-5eaa111c9a13\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+IOT101.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1deb6cfe-2b02-4fcd-908b-7ada317d83db\",\"productName\":\"Unlocking the Power of Generative AI with ChatGPT for Higher Education\",\"productSlug\":\"learn/chatgpt/universidad-galileo-unlocking-the-power-of-generative-ai-with-chatgpt-for-higher-education\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1deb6cfe-2b02-4fcd-908b-7ada317d83db-bfc35fa7f260.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Computer Science\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"$124\",\"shortDescription\":\"\u003cp\u003eDiscover how generative artificial intelligence, such as ChatGPT, Bard, or Bing, can be used by teachers to enrich and optimize the teaching-learning process.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the fundamental concepts of Artificial Intelligence as applied to education.\u003c/li\u003e\\n\u003cli\u003eFamiliarize yourself with the technology of ChatGPT and its potential to enhance education.\u003c/li\u003e\\n\u003cli\u003eIntegrate ChatGPT into teaching and learning processes, using practical examples tailored to the educational context.\u003c/li\u003e\\n\u003cli\u003eDevelop curriculum design, plan lessons, create instructional materials, design learning activities, and craft assessments, all using ChatGPT as a teaching assistant.\u003c/li\u003e\\n\u003cli\u003eEnhance teaching and learning effectiveness and efficiency by integrating ChatGPT with other AI tools.\u003c/li\u003e\\n\u003cli\u003eIdentify and address ethical and privacy challenges derived from the use of Generative AI.\u003c/li\u003e\\n\u003cli\u003eEvaluate and reflect on the relevance and applicability of Artificial Intelligence in education.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1deb6cfe-2b02-4fcd-908b-7ada317d83db\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GalileoX+GalileoXAI002_V2+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"64a809a6-d077-493c-9c2a-1f494b4340d3\",\"productName\":\"Synthetic Aperture Radar: Foundations\",\"productSlug\":\"learn/data-analysis/university-of-alaska-fairbanks-synthetic-aperture-radar-foundations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/64a809a6-d077-493c-9c2a-1f494b4340d3-124ded7f8f84.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Physics\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$125\",\"shortDescription\":\"\u003cp\u003eThis online course provides foundational knowledge of Synthetic Aperture Radar (SAR) remote sensing including SAR imaging, SAR interferometry, and the concepts of polarimetric SAR. The individual concepts will be illustrated with data sets from spaceborne and airborne SAR missions.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eParticipants in this course will develop the following skills:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIntuitive understanding of SAR image and phase information\u003c/li\u003e\\n\u003cli\u003eUnderstanding the role of wavelength and signal polarization on SAR image content\u003c/li\u003e\\n\u003cli\u003eUse of interferometric SAR techniques to measure cm-scale surface deformation.\u003c/li\u003e\\n\u003cli\u003eUse polarimetric information to analyze ecosystem parameters\u003c/li\u003e\\n\u003cli\u003eSelect the right sensor wavelength and polarization for your application.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-64a809a6-d077-493c-9c2a-1f494b4340d3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+SAR-400+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"903b35ab-fb9d-40e4-9989-2582e4f551ce\",\"productName\":\"Ethical AI for Students\",\"productSlug\":\"learn/ethics/university-of-adelaide-ethical-ai-for-students\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/903b35ab-fb9d-40e4-9989-2582e4f551ce-d17a7730ff59.png\",\"productType\":\"Course\",\"attributes\":[\"Ethics\"],\"partnerName\":[\"University of Adelaide\"],\"partnerKeys\":[\"AdelaideX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f5d1ff66-002f-43fa-9d76-1b191d4a3272-0e2420850666.png\",\"fullDescription\":\"$126\",\"shortDescription\":\"\u003cp\u003eUnpack the ethical challenges of using Generative AI (GenAI) so you can confidently produce unbiased, accurate and transparent content.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eRecognise commonly used AI terminology\u003c/li\u003e\\n\u003cli\u003eIdentify the positives and negatives of using GenAI as a student\u003c/li\u003e\\n\u003cli\u003eRecognise the consequences of using incorrect or biased information created by GenAI\u003c/li\u003e\\n\u003cli\u003eRecognise correct ways to cite the use of AI\u003c/li\u003e\\n\u003cli\u003eIdentify differences in the usage protocols of different policies\u003c/li\u003e\\n\u003cli\u003eRecognise ways you can ethically use GenAI in the workplace\u003c/li\u003e\\n\u003cli\u003eReflect on possible future AI developments in AI\u003c/li\u003e\\n\u003cli\u003eRecognise when something has been created using AI.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-903b35ab-fb9d-40e4-9989-2582e4f551ce\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AdelaideX+EthicalAIx+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1c038e98-12fb-40b8-aeaf-11b4e231a802\",\"productName\":\"Introduction to Digital Twin and Applications\",\"productSlug\":\"learn/engineering/the-hong-kong-polytechnic-university-introduction-to-digital-twin-and-applications\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1c038e98-12fb-40b8-aeaf-11b4e231a802-4345f02af54d.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eIn the fourth industrial revolution, the digital twin is one of the critical technologies that is gaining prominence. The digital twin is the simulation technology that integrates multidisciplinary, multi-physical quantities, multi scales, and multi-probabilities by making full use of a physical model, sensor update, operation history, and other data. During this course, learners will engage in how to create digital twins and utilize them to model, simulate, and manage industrial processes. Digital twins give information on every component of a manufacturing process, allowing you to improve the efficiency and efficacy of your production line and equipment. It may be used to monitor, study, and analyze physical assets like buildings, processes, and systems, as well as to conduct research and development.\u003c/span\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDigital twins are gaining popularity, as a simulation technique that integrates interdisciplinary, multi-physical quantity, multiscale, and multi-probability. Digital twins are used to monitor, examine, and analyze physical assets like buildings, processes, and systems.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e• What are the digital twins and their types\u003c/p\u003e\\n\u003cp\u003e• Characteristics of digital twin technology\u003c/p\u003e\\n\u003cp\u003e• Applications of digital twins in different industries and sectors\u003c/p\u003e\\n\u003cp\u003e• Implementation and deployment of the digital twin\u003c/p\u003e\\n\u003cp\u003e• Future development of digital twins and cyber-physical systems\u003c/p\u003e\",\"objectId\":\"course-1c038e98-12fb-40b8-aeaf-11b4e231a802\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+DT001+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b37b28e6-f404-4acc-8b87-b38830fb2846\",\"productName\":\"Capstone Business and Operations for a Circular Bio-Economy\",\"productSlug\":\"learn/circular-economy/wageningen-university-research-capstone-business-and-operations-for-a-circular-bio-economy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b37b28e6-f404-4acc-8b87-b38830fb2846-fd56a46edfa8.jpg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$127\",\"shortDescription\":\"\u003cp\u003eThis capstone project is the final part of the MicroMasters® Program Business and Operations for a Circular Bio-Economy. Interdisciplinarity is central in this part, linking the various sections in this MicroMasters Program.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cstrong\u003eAfter completing the course, you will be able to:\u003c/strong\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eDefine a proper research proposal on the edge of the technology and business aspects in a biobased circular economy\u003c/li\u003e\\n\u003cli\u003eFind and interpret academic literature\u003c/li\u003e\\n\u003cli\u003eAnalyse and discuss a biobased product from the business and supply chain perspectives discussed in this MicroMasters Program\u003c/li\u003e\\n\u003cli\u003eCombine organizational and operational business considerations to design a sustainable biobased practice\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b37b28e6-f404-4acc-8b87-b38830fb2846\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+CE03Bx+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"850ed744-cd8f-4385-9aad-31120e4dc83e\",\"productName\":\"Agile, Healthy, and Attractive Organizations\",\"productSlug\":\"learn/business-management/university-system-of-maryland-agile-healthy-and-attractive-organizations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/850ed744-cd8f-4385-9aad-31120e4dc83e-1a8a94892641.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\"],\"partnerName\":[\"University System of Maryland\",\"The University of Maryland, College Park\"],\"partnerKeys\":[\"USMx\",\"UMD\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\",\"fullDescription\":\"$128\",\"shortDescription\":\"\u003cp\u003eAHA organizations use complexity economics to succeed in VUCA conditions, with flexibility, health, and purpose. Let's learn how they change quickly and use AI and digital twins for strategy and growth.\u003c/p\u003e\",\"productOverview\":\"$129\",\"objectId\":\"course-850ed744-cd8f-4385-9aad-31120e4dc83e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+AHA01+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5f6bd54e-6c64-4310-9ef6-558673e0e74b\",\"productName\":\"Animal Behaviour in Conservation\",\"productSlug\":\"learn/animal-behavior/wageningen-university-research-animal-behaviour-in-conservation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f6bd54e-6c64-4310-9ef6-558673e0e74b-e3150dd98e38.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Environmental Studies\",\"Science\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$12a\",\"shortDescription\":\"\u003cp\u003eHow can we coexist with wildlife in our rapidly changing human-dominated world? The instructors behind Wageningen University \u0026amp; Research’s high ranking ‘Introduction to Animal Behaviour’ have created a sequel. Equip yourself with the skills to assess human-caused impact on diverse species. Learn to apply behavioural principles to design more effective conservation actions. Enrol now.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConnect key behavioural concepts to relevant conservation challenges \u003c/li\u003e\\n\u003cli\u003eUnderstand how animals use behaviour to mitigate anthropogenic threats\u003c/li\u003e\\n\u003cli\u003eRecognize which behavioural traits can serve as threat and management indicators\u003c/li\u003e\\n\u003cli\u003eIdentify successful examples of behaviour-based conservation management\u003c/li\u003e\\n\u003cli\u003eUse relevant resources to find species-specific information on biology and conservation challenges \u003c/li\u003e\\n\u003cli\u003eDesign a basic species action plan incorporating a behaviour-based conservation action\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5f6bd54e-6c64-4310-9ef6-558673e0e74b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+AB102x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7915db0f-612c-454b-9750-c9fa6da87906\",\"productName\":\"How to Use ChatGPT in Education\",\"productSlug\":\"learn/computer-programming/edx-how-to-use-chatgpt-in-education\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7915db0f-612c-454b-9750-c9fa6da87906-a9de9bff9001.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"edX\"],\"partnerKeys\":[\"edX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$12b\",\"shortDescription\":\"\u003cp\u003eWelcome to How to Use ChatGPT in Education! We're excited to show you the power of ChatGPT in education. This course is designed for students and instructors to explore the many ways that ChatGPT can be used to enhance the learning experience. Enroll now to join us on this journey. We can't wait to see how you'll apply the knowledge you'll learn to enhance the learning experience for instructors and students!\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUnderstand the basics of ChatGPT technology and how it can be applied to education. \u003c/p\u003e\\n\u003cp\u003eLearn how to create personalized learning experiences using ChatGPT. \u003c/p\u003e\\n\u003cp\u003eDiscover advanced techniques for using ChatGPT for automated grading and feedback. \u003c/p\u003e\\n\u003cp\u003eUnderstand the ethical and legal considerations for using ChatGPT in education and how to mitigate any potential issues.\u003c/p\u003e\",\"objectId\":\"course-7915db0f-612c-454b-9750-c9fa6da87906\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:edX+ChatGPT106+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2db5b811-1403-4b25-82e4-cc7099eac3d9\",\"productName\":\"E-COMMERCE FUNDAMENTALS\",\"productSlug\":\"learn/ecommerce/state-bank-of-india-e-commerce-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2db5b811-1403-4b25-82e4-cc7099eac3d9-cd0fb278c42a.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"State Bank of India\"],\"partnerKeys\":[\"State-Bank-of-India\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6fc80e42-95b2-47c6-a5e8-8d76f104cebd-dd0954c7476b.png\",\"fullDescription\":\"$12c\",\"shortDescription\":\"\u003cp\u003eThe Objective of preparing this course is to empower students with unique concepts, methods, acquisitions, and fundamentals of e-commerce business. It will also enlighten how firms gain competitive advantage in e-commerce business. Also, this course will focus on new innovative concepts, frameworks and tools that benefit both students and merchants.\u003c/p\u003e\\n\u003cp\u003eThis course will help in developing both intellectual and practical insight to electronic commerce enabling better understanding of the nature of electronic commerce, how it has changed the existing business models, and its likely impact in the future. This course will also help present and future stakeholders in e-commerce business to develop strategies, to find place in marketspace in the competitive market of the present-day scenario. The course has been organized around the decision-making process for formulating the e-commerce business strategy and use new business models to guide the consumer’s journey to serve consumer’s aspirations.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003ea. Creating value through the gathering, synthesizing, and distribution of information.\u003c/p\u003e\\n\u003cp\u003eb. Formulating strategy in ways that make management of e-commerce business and management of technology associated with it.\u003c/p\u003e\\n\u003cp\u003ec. Compete in real time and engage the customers and markets continuously.\u003c/p\u003e\\n\u003cp\u003ed. Organize resources around the demand side e.g., customers, markets, trends, and needs-rather than the supply side, as business have done in the past.\u003c/p\u003e\\n\u003cp\u003ee. Use technology mediated channels which means that on going operations are subject to measurement and tracking in unprecedented and granular ways.\u003c/p\u003e\",\"objectId\":\"course-2db5b811-1403-4b25-82e4-cc7099eac3d9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:State-Bank-of-India+SBIIT006X+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ffbf55a3-1983-4395-ba46-1b7b57bf46f4\",\"productName\":\"AP® Biology - Part 2: Genetics\",\"productSlug\":\"learn/genetics/rice-university-ap-r-biology-part-2-genetics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ffbf55a3-1983-4395-ba46-1b7b57bf46f4-711add0b8968.jpg\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"Rice University\"],\"partnerKeys\":[\"RICEx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3e0f3544-6626-4373-afb9-b21e0e66a571-9317ec003c4d.png\",\"fullDescription\":\"$12d\",\"shortDescription\":\"The second course in a comprehensive series designed to prepare you for the AP Biology exam, focusing on genetics and DNA.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003ePrepare for the AP Biology Exam\u003c/li\u003e\\n\\t\u003cli\u003eLearn about Mendel and the history of genetics, molecular genetics and the technology in use today\u003c/li\u003e\\n\\t\u003cli\u003eSee how living systems store, retrieve, transmit and respond to information\u003c/li\u003e\\n\\t\u003cli\u003eSee how the process of evolution drives the diversity of life\u003c/li\u003e\\n\\t\u003cli\u003eParticipate in inquiry-based lab investigations and discussions\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ffbf55a3-1983-4395-ba46-1b7b57bf46f4\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RiceX+AdvBio.2x+2015T3\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"289368df-5b0f-4e01-b230-45f364b6c635\",\"productName\":\"Managing Museums in the 21st Century, a My Armenia Program series\",\"productSlug\":\"learn/humanities/the-smithsonian-institution-managing-museums-in-the-21st-century-a-my-armenia-program-series\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/289368df-5b0f-4e01-b230-45f364b6c635-62ca9753e76a.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Art \u0026 Culture\",\"Business \u0026 Management\"],\"partnerName\":[\"The Smithsonian Institution\"],\"partnerKeys\":[\"SmithsonianX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/19c4ee8d-c405-4db8-a0d8-609a78c9ab33-09941dc6e316.png\",\"fullDescription\":\"$12e\",\"shortDescription\":\"\u003cp\u003eThis course provides a broad introduction to various aspects of operating a museum. This course is not intended to serve as a primer for managing a museum, but rather as a resource for thinking about different approaches to museum operations and activities as shared by a number of diverse Smithsonian professionals. Parts of this course were developed for the My Armenia Program, a collaborative program of the people of Armenia, USAID, and the Smithsonian Institution.\u003c/p\u003e\",\"productOverview\":\"$12f\",\"objectId\":\"course-289368df-5b0f-4e01-b230-45f364b6c635\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:SmithsonianX+MyArmenia1.3x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"746eb1ef-1fca-40d5-8b86-56853cb10166\",\"productName\":\"Introduction to Business Architecture\",\"productSlug\":\"learn/business-management/institute-of-science-tokyo-introduction-to-business-architecture-3\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/746eb1ef-1fca-40d5-8b86-56853cb10166-4807f00fa3c6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Institute of Science Tokyo\"],\"partnerKeys\":[\"ScienceTokyo\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c64ca4df-182e-4dff-8f9c-bce589fef512-032c9ce46518.png\",\"fullDescription\":\"$130\",\"shortDescription\":\"\u003cp\u003eIn this course, you will learn the concepts of mapping a business architecture by using the representative methodology called DEMO (Design \u0026amp; Engineering Methodology for Organizations) as explained in the book, \u003cem\u003eEnterprise Ontology.\u003c/em\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will learn;\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eClarify the parts and interactions of an enterprise by mapping its operations\u003c/li\u003e\\n\u003cli\u003eDesign an organization or business by clarifying responsibility and relationships.\u003c/li\u003e\\n\u003cli\u003eProvide the basis for Information System Development of a given enterprise.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-746eb1ef-1fca-40d5-8b86-56853cb10166\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ScienceTokyo+BA101x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7248ea90-dad7-4b7d-b4f3-946ed6eae5e3\",\"productName\":\"Databases: Relational Databases and SQL\",\"productSlug\":\"learn/relational-databases/stanford-university-databases-relational-databases-and-sql\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7248ea90-dad7-4b7d-b4f3-946ed6eae5e3-ce956c9963c7.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$131\",\"shortDescription\":\"\u003cp\u003eThis course is one of five self-paced courses on the topic of Databases, originating as one of Stanford's three inaugural massive open online courses released in the fall of 2011. The original \\\"Databases\\\" courses are now all available on edx.org.\u003c/p\u003e\\n\u003cp\u003eThis course provides an introduction to relational databases and comprehensive coverage of SQL, the long-accepted standard query language for relational database systems.\u003c/p\u003e\\n\u003cp\u003e\u003cem\u003eDatabases: Advanced Topics in SQL\u003c/em\u003e and \u003cem\u003eDatabases: OLAP and Recursion\u003c/em\u003e are follow-on courses to this course and can be taken in either order. \u003cem\u003eAdvanced Topics\u003c/em\u003e is a broad and practical course covering indexes, transactions, constraints, triggers, views, and authorization, while \u003cem\u003eOLAP and Recursion\u003c/em\u003e is recommended for learners with specific interest in these topics.\u003c/p\u003e\",\"productOverview\":\"$132\",\"objectId\":\"course-7248ea90-dad7-4b7d-b4f3-946ed6eae5e3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOE.YDB-SQL0001+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7575d263-e153-4acc-b972-dfcf8edd9b0c\",\"productName\":\"Databases: Advanced Topics in SQL\",\"productSlug\":\"learn/sql/stanford-university-databases-advanced-topics-in-sql\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7575d263-e153-4acc-b972-dfcf8edd9b0c-43dbae799606.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$133\",\"shortDescription\":\"$134\",\"productOverview\":\"$135\",\"objectId\":\"course-7575d263-e153-4acc-b972-dfcf8edd9b0c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOE.YDB-ADVSQL0001+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c5c2336f-7dbb-4840-a26d-fd9991fae339\",\"productName\":\"Procurement and Logistics Management\",\"productSlug\":\"learn/procurement/international-supply-chain-education-alliance-procurement-and-logistics-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c5c2336f-7dbb-4840-a26d-fd9991fae339-84dcaa877f7f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"International Supply Chain Education Alliance\"],\"partnerKeys\":[\"ISCEA\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e1f70279-dab1-436b-b87d-2aa4c1c3c3b8-2a7a6512dd73.png\",\"fullDescription\":\"$136\",\"shortDescription\":\"\u003cp\u003eLearn fundamental concepts regarding the flow of goods and materials throughout the supply chain. Starting from procurement and continuing with logistics; including the management of inventory, transportation and facilities in the distribution network - part of the ISCEA CSCA - Certified Supply Chain Analyst - Internationally Recognized Certificate.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eInventory management for supply chain managers\u003c/li\u003e\\n\u003cli\u003eMaterial Requirements Planning\u003c/li\u003e\\n\u003cli\u003eProcurement management including purchasing and strategic sourcing in the context of supply chain management\u003c/li\u003e\\n\u003cli\u003eBusiness processes of manufacturing roperations in the real-world\u003c/li\u003e\\n\u003cli\u003eGlobal logistics and transportation; including risk management, freight forwarding and Incoterms\u003c/li\u003e\\n\u003cli\u003eDistribution and warehouse operations\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c5c2336f-7dbb-4840-a26d-fd9991fae339\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ISCEA+CSCA02+3T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"eb57cb64-2f14-4a7e-8626-914cde2b06d0\",\"productName\":\"Data Science and Agile Systems for Product Management\",\"productSlug\":\"learn/product-management/the-university-of-maryland-college-park-data-science-and-agile-systems-for-product-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/eb57cb64-2f14-4a7e-8626-914cde2b06d0-ceb03dde0483.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Design\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$137\",\"shortDescription\":\"\u003cp\u003eDeliver faster, higher quality, and fault-tolerant products regardless of industry using the latest in Agile, DevOps, and Data Science.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDesigning and modeling for fast feedback and idea sharing\u003c/li\u003e\\n\u003cli\u003eSystem optimization with open architectures\u003c/li\u003e\\n\u003cli\u003eValidating functions and verifying performance\u003c/li\u003e\\n\u003cli\u003eLeveraging and enabling the system designs, platforms, and ecosystems\u003c/li\u003e\\n\u003cli\u003eLean Startup and Product Innovation Analytics\u003c/li\u003e\\n\u003cli\u003eDeveloping the data collection and preparation pipeline for products and services\u003c/li\u003e\\n\u003cli\u003eAnalyzing the performance and testing hypotheses for usability, fast-feedback, and growth\u003c/li\u003e\\n\u003cli\u003eCustomer experience (CX) validation and enhancement leveraging usability analytics\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-eb57cb64-2f14-4a7e-8626-914cde2b06d0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+ENES608.4+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2c192210-3267-44e4-badf-032012d3c241\",\"productName\":\"Databases: Modeling and Theory\",\"productSlug\":\"learn/databases/stanford-university-databases-modeling-and-theory\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2c192210-3267-44e4-badf-032012d3c241-2f65473c9f97.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$138\",\"shortDescription\":\"$139\",\"productOverview\":\"$13a\",\"objectId\":\"course-2c192210-3267-44e4-badf-032012d3c241\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOE.YDB-MDL_THEORY0001+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c624e7bf-ec65-419c-8c56-9feed573e29f\",\"productName\":\"Essentials of Genomics and Biomedical Informatics\",\"productSlug\":\"learn/biomedical-sciences/israelx-essentials-of-genomics-and-biomedical-informatics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c624e7bf-ec65-419c-8c56-9feed573e29f-3d1fa2ae6736.png\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Computer Science\",\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"IsraelX\"],\"partnerKeys\":[\"IsraelX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"$13b\",\"shortDescription\":\"\u003cp\u003eThis course presents clinicians and digital health enthusiasts with an overview of the data revolution in medicine and how to exploit it for research and in the clinic. The course will not make you a bioinformatician but will introduce the main concepts, tools, algorithms, and databases in this field.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e● The scientific basis, concepts, and language needed to communicate effectively with bioinformaticians, statisticians and data scientists \u003c/p\u003e\\n\u003cp\u003e● First-hand experience in a computational analysis in the practice sessions \u003c/p\u003e\\n\u003cp\u003e● An opportunity to conduct your own basic research (utilizing existing tools, not programming new ones) \u003c/p\u003e\\n\u003cp\u003e● Sufficient background to enable further studies, research, or training towards a career in this field \u003c/p\u003e\\n\u003cp\u003e● And ultimately, the ability to provide better and more personalized medicine for your patients\u003c/p\u003e\",\"objectId\":\"course-c624e7bf-ec65-419c-8c56-9feed573e29f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+gabi+3T2022a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"20782eec-9695-47c1-a7c8-991dd5e56fd0\",\"productName\":\"Music, Art, Society, and Self\",\"productSlug\":\"learn/music-arts/the-university-of-wisconsin-madison-music-art-society-and-self\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/20782eec-9695-47c1-a7c8-991dd5e56fd0-341e882f638e.png\",\"productType\":\"Course\",\"attributes\":[\"Art \u0026 Culture\",\"Humanities\"],\"partnerName\":[\"The University of Wisconsin-Madison\"],\"partnerKeys\":[\"WisconsinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/496e8de4-f4c2-4395-bfa4-5e9daeb60f1d-f8f8e09793a2.png\",\"fullDescription\":\"$13c\",\"shortDescription\":\"\u003cp\u003eThis course will provide a chance for you to explore yourself and your experiences with music and art. It is based on your own point of view and the environment around you. You'll learn about yourself and how music and art influence you while while observing and doing.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will learn to explore yourself in relationship to the arts through written reflections. You will have an opportunity to examine the roles that art play within families, friends and society and relate that to your life and community. You will discover and explore individual artistic and musical interests and abilities. Everyone can become a more active listener of music and viewer of art — this course will teach you how to transform yourself.\u003c/p\u003e\",\"objectId\":\"course-20782eec-9695-47c1-a7c8-991dd5e56fd0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WisconsinX+DCS0011+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b01ee61e-1ac1-4a07-b5f4-348a4b4868d6\",\"productName\":\"Databases: Semistructured Data\",\"productSlug\":\"learn/relational-databases/stanford-university-databases-semistructured-data\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b01ee61e-1ac1-4a07-b5f4-348a4b4868d6-934315464fc2.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$13d\",\"shortDescription\":\"$13e\",\"productOverview\":\"$13f\",\"objectId\":\"course-b01ee61e-1ac1-4a07-b5f4-348a4b4868d6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOE.YDB-SSD0001+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c8d68a73-99ab-46a5-af17-ed472aff42e7\",\"productName\":\"Applications of AI in Healthcare\",\"productSlug\":\"learn/computer-science/hamad-bin-khalifa-university-applications-of-ai-in-healthcare\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c8d68a73-99ab-46a5-af17-ed472aff42e7-a52dd941b784.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Medicine\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Hamad Bin Khalifa University\"],\"partnerKeys\":[\"HBKUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9c05acb1-4527-4361-95e5-827457af9819-318ad2f39987.png\",\"fullDescription\":\"$140\",\"shortDescription\":\"\u003cp\u003eThis MOOC will allow healthcare workers and other non-technical professionals interested in AI applications in healthcare to participate in the conversation about AI and health. For the first time, non-technical professionals will be empowered to develop AI-related projects to enhance and elevate their practice.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis course will provide you with a solid understanding of AI’s capabilities, benefits, and limitations, as well as actionable strategies to contribute to AI-driven innovation in your organization. You will learn how to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentify common tasks that can be solved with AI models.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDevelop and train AI models to automate certain tasks in a medical environment\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eVisualize the inner workings of the models trained in this program (\\\"understandable AI\\\").\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eMitigate challenges related to the clinical use of AI, such as AI mistrust, and legal and ethical considerations\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDiscuss AI in medical settings\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c8d68a73-99ab-46a5-af17-ed472aff42e7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HBKUx+HBKU011+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"60847f40-a3b7-4ecb-a1aa-d95ebb7cdb9e\",\"productName\":\"Instructional Design Models\",\"productSlug\":\"learn/education/university-of-maryland-global-campus-instructional-design-models\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/60847f40-a3b7-4ecb-a1aa-d95ebb7cdb9e-d6bdf08ca344.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"$141\",\"shortDescription\":\"\u003cp\u003eExplore traditional and current instructional design models as you develop an Instructional Design Document (IDD) for an outline of an online course.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eUpon successful completion of this course, you will be able to:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003eCritically evaluate the strengths and limitations of different instructional design models such as ADDIE, Dick and Carey, Understanding by Design, Rapid Instructional Design, and SAM. \u003c/li\u003e\\n\u003cli\u003eApply instructional design models in the context of learning design, tailoring each model to suit specific educational needs and contexts.\u003c/li\u003e\\n\u003cli\u003eCreate detailed and effective design documents that encapsulate all aspects of the instructional design process, from planning to implementation.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-60847f40-a3b7-4ecb-a1aa-d95ebb7cdb9e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+LDT200x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5f179f35-7a24-4e70-abb9-6a61e9ccb92f\",\"productName\":\"Fintech: Overview of the Fintech Sector\",\"productSlug\":\"learn/fintech/the-university-of-texas-at-austin-fintech-overview-of-the-fintech-sector\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f179f35-7a24-4e70-abb9-6a61e9ccb92f-ee7dc44f8011.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"The University of Texas at Austin\"],\"partnerKeys\":[\"UTAustinX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9d38ad58-87fb-4a89-9f23-c8df318112e3-aec8e9e98a5f.png\",\"fullDescription\":\"$142\",\"shortDescription\":\"\u003cp\u003eThis course provides a review of the most recent technological advances that are radically changing the financial services industry.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAfter the completion of this course, you will have a well-rounded understanding of the fintech industry. You will learn:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eHow financial institutions create value and build competitive advantage\u003c/li\u003e\\n\u003cli\u003eHow new technologies add value to financial products\u003c/li\u003e\\n\u003cli\u003eHow fintech firms navigate the complex regulatory environment\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5f179f35-7a24-4e70-abb9-6a61e9ccb92f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UTAustinX+FINTECH-OVERVIEW+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"798930ae-2d16-45f2-8306-734fc7f5a22b\",\"productName\":\"Databases: OLAP and Recursion\",\"productSlug\":\"learn/databases/stanford-university-databases-olap-and-recursion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/798930ae-2d16-45f2-8306-734fc7f5a22b-0d7af0d752c8.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$143\",\"shortDescription\":\"\u003cp\u003eThis course is one of five self-paced courses on the topic of Databases, originating as one of Stanford's three inaugural massive open online courses released in the fall of 2011. The original \\\"Databases\\\" courses are now all available on edx.org.\u003c/p\u003e\\n\u003cp\u003eThis course builds on concepts introduced in \u003cem\u003eDatabases: Relational Databases and SQL\u003c/em\u003e and is recommended for learners seeking to understand On-Line Analytical Processing (OLAP) and/or recursion in the SQL language.\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eThe On-Line Analytical Processing section of this course introduces star schemas, the data cube concept, and OLAP features in relational databases including the Cube and Rollup operators.\u003c/li\u003e\\n\u003cli\u003eThe Recursion section of this course covers the SQL standard for queries over recursively-defined relations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"$144\",\"objectId\":\"course-798930ae-2d16-45f2-8306-734fc7f5a22b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOE.YDB-OLAP_RECURSION0001+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5dca240a-b9fa-45c9-8f1c-8d63a661c10d\",\"productName\":\"Smart Cities, Management of Smart Urban Infrastructures\",\"productSlug\":\"learn/urban-planning/ecole-polytechnique-federale-de-lausanne-smart-cities-management-of-smart-urban-infrastructures\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5dca240a-b9fa-45c9-8f1c-8d63a661c10d-2e190a073f93.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Business \u0026 Management\"],\"partnerName\":[\"École polytechnique fédérale de Lausanne\"],\"partnerKeys\":[\"EPFLx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f244695-7416-4c6c-a2a9-97769b6acb56-a2dc5dd735ab.png\",\"fullDescription\":\"$145\",\"shortDescription\":\"\u003cp\u003eIn the era of Smart Cities, learn the principles of urban infrastructure management and find ways to incorporate smart technologies into legacy infrastructures.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe nature of disruptive innovations (smart technologies) in urban infrastructure systems\u003c/li\u003e\\n\u003cli\u003eState-of-the-art strategies that can be used for “smart infrastructure” solutions in cities, while effectively managing the transition from legacy infrastructures to smart systems\u003c/li\u003e\\n\u003cli\u003eManagement of the transition phase from legacy infrastructure systems to smart cities by supporting innovations while avoiding early lock-in\u003c/li\u003e\\n\u003cli\u003eApplications for the materials learned in this course, within the context of the management of “smart urban transportation systems” as well as “smart urban energy systems”\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5dca240a-b9fa-45c9-8f1c-8d63a661c10d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EPFLx+SmartCitiesX+2T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6b90d5f2-2d6f-4795-9960-5e36f061a2ea\",\"productName\":\"Foundational Field Skills for Earth and Environmental Sciences\",\"productSlug\":\"learn/environmental-science/university-of-canterbury-foundational-field-skills-for-earth-and-environmental-sciences\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6b90d5f2-2d6f-4795-9960-5e36f061a2ea-bb5761aa1a23.png\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Environmental Studies\"],\"partnerName\":[\"University of Canterbury\"],\"partnerKeys\":[\"UCx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ecfbe814-b9bf-45ae-8bc0-baf62dbedeb6-8113d578a9f6.png\",\"fullDescription\":\"$146\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-NZ\\\"\u003eThis course focusses on the proficiency of fundamental field skills required for most graduate degrees and entry-level jobs in the earth and environmental sciences. The course combines instructional demonstrations and scaffolded learning activities in the New Zealand outdoors. \u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-NZ\\\"\u003eDevelop and execute fundamental field skills and techniques in the earth and environmental sciences.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003eFamiliarize with and perform core navigation skills.\u003c/li\u003e\\n\u003cli\u003eDevelop techniques to make effective scientific observations in the field.\u003c/li\u003e\\n\u003cli\u003eDistinguish between what is an 'observation' and an 'interpretation'.\u003c/li\u003e\\n\u003cli\u003eExecute systematic notetaking of scientific field observations and data collection.\u003c/li\u003e\\n\u003cli\u003eBuild your ability to draft field sketches to match what you see in the field.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-6b90d5f2-2d6f-4795-9960-5e36f061a2ea\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UCx+GEO02ucx+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"177a427b-8be7-4556-81bc-b5d8a9523496\",\"productName\":\"Predictive, Prescriptive Analytics For Business Decision Making\",\"productSlug\":\"learn/business-management/institute-of-product-leadership-ipl-predictive-prescriptive-analytics-for-business-decision-making\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/177a427b-8be7-4556-81bc-b5d8a9523496-81878cfc5142.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Communication\"],\"partnerName\":[\"Institute of Product Leadership (IPL)\"],\"partnerKeys\":[\"IPL\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/1e2adb13-5e26-4e31-9a99-b3df1fed0618-e5efa94f5060.png\",\"fullDescription\":\"\u003cp\u003ePrescriptive analytics can cut through the clutter of immediate uncertainty and changing conditions. It can help prevent fraud, limit risk, increase efficiency, meet business goals, and create more loyal customers.\u003c/p\u003e\\n\u003cp\u003ePrescriptive analytics is a type of data analytics—the use of technology to help businesses make better decisions through the analysis of raw data. Specifically, prescriptive analytics factors information about possible situations or scenarios, available resources, past performance, and current performance, and suggests a course of action or strategy. It can be used to make decisions on any time horizon, from immediate to long term.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to build Predictive and Prescriptive Models using Numerical Data\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eUnderstand the difference between Cross sectional and Longitudinal data.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDifferentiate between a prediction and forecasting problem scenario and apply these concepts towards data led decision making.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eUnderstand Parametric and Non Parametric modelling approach towards addressing the key tradeoff between Predictive accuracy and Explain- ability of models.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eUse LPP towards building multiple “What if “ scenarios which are widely used in business decision making.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eConceptualize Gradient Descent Algorithm which is a key foundation for most of the widely used Machine learning algorithms to be introduced subsequently.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-177a427b-8be7-4556-81bc-b5d8a9523496\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IPL+412+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"274f824d-9ac7-484c-a80f-14ed19b2342a\",\"productName\":\"Future Robots\",\"productSlug\":\"learn/robotics/universita-degli-studi-di-napoli-federico-ii-future-robots\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/274f824d-9ac7-484c-a80f-14ed19b2342a-60b03badb5fc.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Social Sciences\",\"Ethics\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$147\",\"shortDescription\":\"\u003cp\u003eLearn Robots as a new science for the understanding of human beings and the affects of robotics in the real world.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ePotential problems and opportunities for human beings as a result of the robotics revolution\u003c/li\u003e\\n\u003cli\u003eThe intricacies of human behavior: biological evolution, development, learning, imitation, cultural evolution\u003c/li\u003e\\n\u003cli\u003eThe economic revolution and political life as seen through the robotic revolution\u003c/li\u003e\\n\u003cli\u003eAnalysis of mental pathologies, art,and religion.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-274f824d-9ac7-484c-a80f-14ed19b2342a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+46+3T2021a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b42b3d27-0fcc-47a7-a21f-98e158a15951\",\"productName\":\"Platform Product Revival\",\"productSlug\":\"learn/information-technology/the-university-of-maryland-college-park-platform-product-revival\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b42b3d27-0fcc-47a7-a21f-98e158a15951-800f21990537.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$148\",\"shortDescription\":\"\u003cp\u003eLCNC Platforms support vital business processes, but 75% of IT implementations fail. Learn how users are the most critical and difficult part of platform success - and how to respond when “Everything is broken” and you need LCNC Platform Revival.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eChange Management and User Adoption Essentials\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEvaluation methods for a failed rollout\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eMethods for reviving a failed platform\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstablishing a user community\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b42b3d27-0fcc-47a7-a21f-98e158a15951\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+PLAT03+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"dff06164-1430-468a-bdde-6b09759ae96a\",\"productName\":\"Virtual Building Design for Engineers Using Autodesk Revit\",\"productSlug\":\"learn/engineering/the-university-of-maryland-college-park-virtual-building-design-for-engineers-using-autodesk-revit\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/dff06164-1430-468a-bdde-6b09759ae96a-da798d49e734.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$149\",\"shortDescription\":\"\u003cp\u003eThis course is a beginners guide to Autodesk Revit software. Students will learn the fundamentals of Autodesk Revit’s functionality and how Design Professionals and Project Teams use Autodesk Revit-centric and BIM-centric workflows for design and construction optimization, coordination, visualization, and automation.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThis introductory course will include the following:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIntroduction to basic BIM Theory and 3D modeling and parametric modeling\u003c/li\u003e\\n\u003cli\u003eDiscussing the benefits of visualization, and basic Revit workflows\u003c/li\u003e\\n\u003cli\u003eIntroduction to the Revit UI, basic Revit modeling tools, and general Revit functionality \u003c/li\u003e\\n\u003cli\u003eTutorials on how to start a new Revit project and use Revit templates\u003c/li\u003e\\n\u003cli\u003eTutorials on how to model simple building components in Revit, and how to create basic building views, including 3D views, elevations, plans, sections, and details.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-dff06164-1430-468a-bdde-6b09759ae96a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+ENCE426.1+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c454b5b0-5574-4f0a-a21c-3006a7d3a861\",\"productName\":\"Revit for Structural Engineers\",\"productSlug\":\"learn/structural-engineering/university-system-of-maryland-revit-for-structural-engineers\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c454b5b0-5574-4f0a-a21c-3006a7d3a861-02d924a614af.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"University System of Maryland\"],\"partnerKeys\":[\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b9dc96da-b3fc-45a6-b6b7-b8e12eb79335-bc0488f1a5f8.png\",\"fullDescription\":\"$14a\",\"shortDescription\":\"\u003cp\u003eLearn how to model basic building structural systems in Autodesk Revit.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eRevit modeling tools for building structures\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to model a cast-in-place concrete building structure in Revit\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to model a structural steel building structure in Revit\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to model foundation systems, including piles and pile caps in Revit\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to develop structural details\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c454b5b0-5574-4f0a-a21c-3006a7d3a861\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+ENCE426.2+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"04bf344f-d72d-46cf-8b0b-979052e71588\",\"productName\":\"Instructional Design Course Evaluation \u0026 Capstone Project\",\"productSlug\":\"learn/data-analysis/university-of-maryland-global-campus-instructional-design-course-evaluation-capstone-project\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/04bf344f-d72d-46cf-8b0b-979052e71588-cb00fe2de29a.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"$14b\",\"shortDescription\":\"\u003cp\u003eAll of your hard work will come together in the capstone project, where you will create a minicourse to demonstrate your knowledge of instructional design principles.You will also evaluate your minicourse and assess the impact of design on the learning environment.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eDevelop digital learning materials, applying user-centered and inclusive design methodologies.\u003c/li\u003e\\n\u003cli\u003eCreate storyboards or wireframes to organize course content. \u003c/li\u003e\\n\u003cli\u003eApply visual design principles and responsive design techniques to create visually appealing and functional learning experiences.\u003c/li\u003e\\n\u003cli\u003eCreate high-quality course designs using industry-standard design tools and software. \u003c/li\u003e\\n\u003cli\u003eEvaluate course content to gather feedback, assess usability, and refine digital learning experiences.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-04bf344f-d72d-46cf-8b0b-979052e71588\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+LDT400x+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2c03680b-1a46-4815-ac90-0654ee8b2a89\",\"productName\":\"Communicating with Presence\",\"productSlug\":\"learn/medicine/stanford-university-communicating-with-presence\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2c03680b-1a46-4815-ac90-0654ee8b2a89-c08e0757e38d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$14c\",\"shortDescription\":\"\u003cp\u003eEnhance patient care with the Stanford Presence 5 model—a proven framework for humanism and effective communication in medicine. This online CME/CE course equips healthcare professionals with practical strategies to build trust, improve patient outcomes, and strengthen clinician-patient connections. Enroll today to transform your approach to patient interactions!\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eSummarize strategies to “Prepare with Intention” including reviewing patient history and resetting before the visit.\u003c/li\u003e\\n\u003cli\u003eDiscuss methods to “Listen Intently and Completely” including being thoughtful with body position and allowing your patient to finish their statements.\u003c/li\u003e\\n\u003cli\u003eIdentify strategies to “Agree on What Matters Most” including making an agenda based on patient priorities and asking open ended questions.\u003c/li\u003e\\n\u003cli\u003eEngage using positive language for goals and asking about patient beliefs and attitudes by \\\"Connecting to the Patient's Story\\\".\u003c/li\u003e\\n\u003cli\u003eIncorporate strategies to “Explore Emotional Cues” including validating patient emotions.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2c03680b-1a46-4815-ac90-0654ee8b2a89\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOM-YCME0045+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"22a8f040-25b5-4a6a-ae7d-427a88d61d45\",\"productName\":\"Virtual Care with Presence\",\"productSlug\":\"learn/continuing-medical-education/stanford-university-virtual-care-with-presence\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/22a8f040-25b5-4a6a-ae7d-427a88d61d45-6dee4a322112.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\"],\"partnerName\":[\"Stanford University\"],\"partnerKeys\":[\"StanfordOnline\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f53a7458-c79b-4524-97cf-28241114230e-e47d44123c3b.png\",\"fullDescription\":\"$14d\",\"shortDescription\":\"\u003cp\u003eEnhance your telemedicine skills with this CME/CE course, focused on maintaining human connection during virtual visits. Learn to apply the Presence 5 model to build trust, engage patients, and deliver compassionate care in a digital setting. Enroll today to improve your virtual patient interactions and ensure meaningful telehealth experiences!\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eApply strategies to \\\"\\\"Prepare with intention\\\"\\\" and center oneself prior to conducting a telemedicine visit.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eIncorporate strategies to \\\"Listen intently and completely\\\" while on a virtual visit with a patient.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDetermine goals and priorities with the patient during the virtual visit by \\\"Agreeing on what matters most.\\\"\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEngage virtually with the patient's family, friends, and home environment by \\\"Connecting with the patient's story.\\\"\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eRecognize and respond to body language, facial expressions, and changes in tone by \\\"Exploring emotional cues.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-22a8f040-25b5-4a6a-ae7d-427a88d61d45\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:StanfordOnline+SOM-YCME0044+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"956c9ae3-cc1f-4787-a438-e4d0a95f400a\",\"productName\":\"Mental Health, Mindfulness, and Self-Care\",\"productSlug\":\"learn/healthcare/university-of-cape-town-mental-health-mindfulness-and-self-care-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/956c9ae3-cc1f-4787-a438-e4d0a95f400a-6fc65007ea78.png\",\"productType\":\"Course\",\"attributes\":[\"Health \u0026 Safety\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$14e\",\"shortDescription\":\"\u003cp\u003eLearn mindfulness and self-care techniques from University of Cape Town (UCT) experts, to empower yourself and others in prioritizing mental health and overcoming stigma.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eAn overview of key mental health conditions, including depressive disorder, anxiety disorders, bipolar disorder, psychotic disorders, and substance use disorders.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eThe ability to use mindfulness and self-care techniques to empower yourself and others in prioritizing mental health.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eThe knowledge to approach and engage with someone experiencing one of many common mental health conditions.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eA practical framework for becoming a ‘guide on the side’ for those experiencing mental health challenges.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-956c9ae3-cc1f-4787-a438-e4d0a95f400a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UCT+UCTMHMS01+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"dc9d0701-e1d5-4844-a64b-0cef33e2ee58\",\"productName\":\"Science Communication\",\"productSlug\":\"learn/journalism/israelx-science-communication\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/dc9d0701-e1d5-4844-a64b-0cef33e2ee58-7dea81629e83.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Science\",\"Social Sciences\"],\"partnerName\":[\"IsraelX\",\"Technion\"],\"partnerKeys\":[\"IsraelX\",\"Technion\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"$14f\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscover how science can become news, stories, and entertainment. Learn from international experts in science communication from around the world.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003e*\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e How to communicate research clearly and in an engaging manner \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e*\u003cspan lang=\\\"EN-US\\\"\u003e Dialog, listening storytelling, and creative writing\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e*\u003cspan lang=\\\"EN-US\\\"\u003e How to engage the public through citizen science and community science\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003e*\u003cspan lang=\\\"EN-US\\\"\u003e How to communicate effectively with journalists, decision-makers, and the public\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eIncorporating contemporary science in the classroom and informal learning environments\u003c/p\u003e\",\"objectId\":\"course-dc9d0701-e1d5-4844-a64b-0cef33e2ee58\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+ACD_Science_communication+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8fe1362d-caea-437e-b5c8-e04ee680c9a7\",\"productName\":\"Cloud Computing for Enterprises\",\"productSlug\":\"learn/cloud-computing/university-of-maryland-global-campus-cloud-computing-for-enterprises\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8fe1362d-caea-437e-b5c8-e04ee680c9a7-59aa504324c1.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Maryland Global Campus\",\"University System of Maryland\"],\"partnerKeys\":[\"UMGC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/22ffb18d-d59a-4ee4-a265-9db42b158476-a80bf4a32d19.png\",\"fullDescription\":\"\u003cp\u003eOrganizations are increasingly moving their critical information and assets to the cloud. Understand the technology, best practices, and economics of cloud computing, and the rewards and risks of this rush to the cloud.\u003c/p\u003e\\n\u003cp\u003eIn this course, part of the Cloud Computing MicroMasters program, you will learn the essentials of cloud computing, including Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Software As A Service (SaaS), and other \\\"X as a service\\\" platforms.\u003c/p\u003e\\n\u003cp\u003eYou will explore how the cloud can support businesses by increasing productivity and effectiveness. \u003c/p\u003e\\n\u003cp\u003eThis course is part of the Cloud Computing MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Cloud Computing Architecture. See the MicroMasters program page for more information.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eUnderstand cloud computing technologies and how they can increase business productivity and effectiveness.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eInvestigate various cloud computing technologies and providers including public, private and hybrid clouds\u003c/li\u003e\\n\u003cli\u003eAnalyze the applications of cloud technologies to business\u003c/li\u003e\\n\u003cli\u003eDevelop strategies to enhance organizational effectiveness using cloud technologies\u003c/li\u003e\\n\u003cli\u003eEvaluate the cost benefits of cloud adoption\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8fe1362d-caea-437e-b5c8-e04ee680c9a7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+CC605x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"48d9041a-a871-4872-9404-c7aaca2cc937\",\"productName\":\"Check Point Jump Start: Quantum Spark Network Security\",\"productSlug\":\"learn/computer-programming/check-point-software-technologies-ltd-check-point-jump-start-quantum-spark-network-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/48d9041a-a871-4872-9404-c7aaca2cc937-161e5ee000f2.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$150\",\"shortDescription\":\"\u003cp\u003eCheck Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.\u003c/p\u003e\",\"productOverview\":\"$151\",\"objectId\":\"course-48d9041a-a871-4872-9404-c7aaca2cc937\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs11+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/48d9041a-a871-4872-9404-c7aaca2cc937-29d761a97948.png\"},{\"productUuid\":\"1a0b5fad-26d0-4f10-9e11-b14763cbb55e\",\"productName\":\"Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection\",\"productSlug\":\"learn/big-data/cornell-university-wiretaps-to-big-data-privacy-and-surveillance-in-the-age-of-interconnection\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1a0b5fad-26d0-4f10-9e11-b14763cbb55e-373fb565e962.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\"],\"partnerName\":[\"Cornell University\"],\"partnerKeys\":[\"CornellX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/99661642-a500-4988-bd1b-97877bd6e232-6903c8a95279.png\",\"fullDescription\":\"How does cellular technology enable massive surveillance? Do users have rights against surveillance? How does surveillance affect how we use cellular and other technologies? How does it affect our democratic institutions? Do you know that the metadata collected by a cellular network speaks volumes about its users? In this course you will explore all of these questions while investigating related issues in WiFi and Internet surveillance. The issues explored in this course are at the intersection of networking technology, law, and sociology and will appeal to anyone interested in the technical, political, and moral questions inherent in the use of information networks. The course will include broad overviews for the novice, while pointing to the detailed resources needed for those engaged in the development of corporate or governmental policies.\",\"shortDescription\":\"Explore the privacy issues of an interconnected world.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eThe basic function of cellular telephone networks, WiFi, and other networking technologies.\u003c/li\u003e\\n\\t\u003cli\u003eThe evolution of privacy rights through the U.S. constitution's 4th amendment, particularly as applied to content and context surveillance.\u003c/li\u003e\\n\\t\u003cli\u003eTypes of cryptography used to secure wired and wireless networks.\u003c/li\u003e\\n\\t\u003cli\u003eThe implications of different forms of surveillance and their impact on an individual's privacy in society.\u003c/li\u003e\\n\\t\u003cli\u003eContemporary surveillance and security decisions/laws.\u003c/li\u003e\\n\\t\u003cli\u003eHow to apply ethical thinking and judgment to a wide range of privacy and surveillance situations.\u003c/li\u003e\\n\\t\u003cli\u003eThe impact of using complex and powerful technologies to collect personal data on individuals, corporations, markets, and societies.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1a0b5fad-26d0-4f10-9e11-b14763cbb55e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CornellX+ENGRI1280x+3T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bcbbc43f-ba44-4220-950a-3a8fac4dd0f6\",\"productName\":\"Managing the Value of Customer Relationships\",\"productSlug\":\"learn/business-administration/the-wharton-school-of-the-university-of-pennsylvania-managing-the-value-of-customer-relationships\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bcbbc43f-ba44-4220-950a-3a8fac4dd0f6-e3708e5afabd.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The Wharton School of the University of Pennsylvania\"],\"partnerKeys\":[\"Wharton\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/06788cb1-4ba8-4349-aa66-e11ac8b644ef-216362adda56.png\",\"fullDescription\":\"$152\",\"shortDescription\":\"Learn how to identify your most valuable customers to develop and implement customer-centric strategies and maximize their strategic value.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eMake an informed decision about whether, how, and when to invest in customer centricity\u003c/li\u003e\\r\\n\u003cli\u003eMake the case for customer centricity in your organization\u003c/li\u003e\\r\\n\u003cli\u003eFind a balance in your organization between customer-centric and product-centric efforts\u003c/li\u003e\\r\\n\u003cli\u003eDecide what initial experiments your company should invest in to achieve customer centricity\u003c/li\u003e\\r\\n\u003cli\u003eChoose metrics to gauge and guide ongoing customer-centric efforts\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-bcbbc43f-ba44-4220-950a-3a8fac4dd0f6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:Wharton+CustomerCentricityx+3T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"84fda3bf-e0c0-4f36-a389-ee4983bdc273\",\"productName\":\"Learning From Data (Introductory Machine Learning)\",\"productSlug\":\"learn/machine-learning/caltech-learning-from-data-introductory-machine-learning\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/84fda3bf-e0c0-4f36-a389-ee4983bdc273-fcead121f96a.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\",\"Math\"],\"partnerName\":[\"Caltech\"],\"partnerKeys\":[\"CaltechX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/01424b8a-06bf-4410-ac4f-2f1016b105be-e40ca6bcc9d7.png\",\"fullDescription\":\"\u003cp\u003eThis introductory computer science course in machine learning will cover basic theory, algorithms, and applications. Machine learning is a key technology in Big Data, and in many financial, medical, commercial, and scientific applications. It enables computational systems to automatically learn how to perform a desired task based on information extracted from the data. Machine learning has become one of the hottest fields of study today and the demand for jobs is only expected to increase. Gaining skills in this field will get you one step closer to becoming a data scientist or quantitative analyst.\u003c/p\u003e\\n\u003cp\u003eThis course balances theory and practice, and covers the mathematical as well as the heuristic aspects. The lectures follow each other in a story-like fashion:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eWhat is learning?\u003c/li\u003e\\n\u003cli\u003eCan a machine learn?\u003c/li\u003e\\n\u003cli\u003eHow to do it?\u003c/li\u003e\\n\u003cli\u003eHow to do it well?\u003c/li\u003e\\n\u003cli\u003eTake-home lessons.\u003c/li\u003e\\n\u003c/ul\u003e\",\"shortDescription\":\"Introductory Machine Learning course covering theory, algorithms and applications. Our focus is on real understanding, not just \\\"knowing.\\\"\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eIdentify basic theoretical principles, algorithms, and applications of Machine Learning\u003c/li\u003e\\n\\t\u003cli\u003eElaborate on the connections between theory and practice in Machine Learning\u003c/li\u003e\\n\\t\u003cli\u003eMaster the mathematical and heuristic aspects of Machine Learning and their applications to real world situations\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-84fda3bf-e0c0-4f36-a389-ee4983bdc273\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CaltechX+CS1156x+3T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"86d8045d-57f5-4455-bcb4-fb0d842e2cda\",\"productName\":\"Four Facets of Contemporary Japanese Architecture: City\",\"productSlug\":\"learn/architecture/the-university-of-tokyo-four-facets-of-contemporary-japanese-architecture-city\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/86d8045d-57f5-4455-bcb4-fb0d842e2cda-cb7ecdca4b8c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Architecture\"],\"partnerName\":[\"The University of Tokyo\"],\"partnerKeys\":[\"UTokyoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/234a2849-1ac0-44fc-a5bd-2ab0e4e077fe-b06b8a3a6bca.png\",\"fullDescription\":\"\u003cp\u003eThis is the third course in the “Four Facets of Contemporary Japanese Architecture” series, which focuses on the third facet: city.\u003c/p\u003e\\n\u003cp\u003eAfter the 1970s, Japanese architects are said to have stopped conceptualizing cities and instead focused on designing the individual buildings that make up the cities. However, as cities continue to undergo significant transformations in response to globalization, the advent of information technologies, and so on, Japanese architects are once again engaging the city, and doing so in unique ways.\u003c/p\u003e\\n\u003cp\u003eThis course on “City” will review the works of those architects who have attempted to conceptualize cities through their architecture and examine the changes over the last half century as well as the issues for the future. Fumihiko Maki, Itsuko Hasegawa, Riken Yamamoto, Kengo Kuma, Jun Aoki, and Atelier Bow-Wow (Yoshiharu Tsukamoto \u0026amp; Momoyo Kaijima) visit their buildings to discuss the ideas behind their respective works.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn the history, ideas, and concepts behind contemporary Japanese architecture through one facet of Japanese architecture, city.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDevelopment of contemporary Japanese architecture since the 1964 Tokyo Olympics\u003c/li\u003e\\n\u003cli\u003eFeatures of works of influential Japanese architects\u003c/li\u003e\\n\u003cli\u003eHow Japanese architects attempted to conceptualize cities through their architecture\u003c/li\u003e\\n\u003cli\u003ePresent concerns and potential future directions for contemporary Japanese architecture\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-86d8045d-57f5-4455-bcb4-fb0d842e2cda\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UTokyoX+UTokyo009x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"962b2832-fafa-475d-8698-ea3d08701148\",\"productName\":\"Il potere dei sondaggi\",\"productSlug\":\"learn/political-science/universita-degli-studi-di-napoli-federico-ii-il-potere-dei-sondaggi\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/962b2832-fafa-475d-8698-ea3d08701148-09c44245f2b0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$153\",\"shortDescription\":\"\u003cp\u003eAscoltare, capire e governare l'opinione pubblica\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCome usare i sondaggi nelle strategie politiche e comunicative.\u003c/li\u003e\\n\u003cli\u003eCome si fa un sondaggio: dalla progettazione della ricerca alla rilevazione e analisi dei dati\u003c/li\u003e\\n\u003cli\u003eI metodi più utilizzati per la racconta dei dati\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInterpretare i sondaggi come strumento di comunicazione e strategia politico-elettorale\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to use opinion polls as part of political and communication strategy.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow a poll is conducted: from planning the research to data collection and analysis\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eMost common data collection methods\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInterpreting results of opinion polls for inclusion in communication and electoral-political strategy\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-962b2832-fafa-475d-8698-ea3d08701148\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+Fed11+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"fe45fe00-a7c8-4037-ba40-f956e2b6ef29\",\"productName\":\"Applied Quantum Computing II: Hardware\",\"productSlug\":\"learn/engineering/purdue-university-quantum-computing-ii-hardware\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/fe45fe00-a7c8-4037-ba40-f956e2b6ef29-6e404fcdb376.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Science\"],\"partnerName\":[\"Purdue University\"],\"partnerKeys\":[\"PurdueX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e5dfaf30-3828-4826-944e-03ea3dcf5b13-ab295e7bad86.png\",\"fullDescription\":\"$154\",\"shortDescription\":\"\u003cp\u003eLearn how present-day material platforms are built to perform quantum information processing tasks.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eSuperconducting quantum platforms\u003c/li\u003e\\n\u003cli\u003eAtomic/trapped-ion quantum platforms\u003c/li\u003e\\n\u003cli\u003eSpin-based quantum platforms\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-fe45fe00-a7c8-4037-ba40-f956e2b6ef29\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PurdueX+ECE_69501.2+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6e203b84-6858-4a91-8df9-0e28e6fd1d9a\",\"productName\":\"e-Learning on Digital Agriculture\",\"productSlug\":\"learn/agriculture/world-bank-group-e-learning-on-digital-agriculture\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6e203b84-6858-4a91-8df9-0e28e6fd1d9a-ffc40c851fd0.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Environmental Studies\"],\"partnerName\":[\"World Bank Group\"],\"partnerKeys\":[\"WBGx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3ca455dc-4c90-4097-9203-d647e3e70771-af804add6293.png\",\"fullDescription\":\"$155\",\"shortDescription\":\"\u003cp\u003eAgriculture is no exception to digital revolution, going beyond a simple adoption of Information and Communication Technologies (ICTs). According to ICRISAT, digital agriculture is defined as “ICT and data ecosystems to support the development and delivery of timely, targeted information and services to make farming profitable and sustainable while delivering safe nutritious and affordable food for all.”\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eGain a solid understanding of core concepts of DAT and ICT in agriculture, with a focus on used cases and potential impact.\u003c/li\u003e\\n\u003cli\u003eLearn about digital tools enhancing on-farm productivity.\u003c/li\u003e\\n\u003cli\u003eUnderstand how to empower smallholder farmers through ICT/Digital Tools in market access and financial services.\u003c/li\u003e\\n\u003cli\u003eGain awareness of the forward-looking technologies and their scope in agriculture – artificial intelligence, remote sensing, crowdsourcing, and big data analytics.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6e203b84-6858-4a91-8df9-0e28e6fd1d9a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WBGx+DAT2001x+1T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4bc463a9-1c02-4d2e-bcad-92cee4a6c6a5\",\"productName\":\"Consumer and Environmental Safety: Food Packaging and Kitchenware\",\"productSlug\":\"learn/food-nutrition/eit-food-consumer-and-environmental-safety-food-packaging-and-kitchenware\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4bc463a9-1c02-4d2e-bcad-92cee4a6c6a5-78c294170096.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Food \u0026 Nutrition\"],\"partnerName\":[\"EIT Food\"],\"partnerKeys\":[\"EIT_Food\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9a8db325-4f07-4e29-990b-3ec8059bf7ad-fbef866d4b06.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"en-BE\\\"\u003eFood safety is highly regulated. Yet, one blind spot is the migration of molecules from contact materials in kitchenware into food. Particular attention needs to be placed on chemicals present at low doses but acting on the endocrine system over a long time.\u003c/span\u003e\u003cspan lang=\\\"en-BE\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eIn this course, you’ll learn about these endocrine disrupters and their potential impact on human health and the environment.\u003cspan lang=\\\"en-BE\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eYou’ll evaluate how chemicals can migrate from packaging and slowly affect our endocrine health, and how tests can check for safety. Ultimately, you’ll better understand how we can improve food safety in general.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"en-BE\\\"\u003eDiscover the importance of kitchenware and packaging that is safe for people and the environment alike.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eWhat are the potential risks for global health and for the environment derived from packaging?\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eWhich stakeholders are involved in the safety of packaging and how are these connected?\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eHow is research in chemistry, biology and material science contributing towards safer food?\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eWhat is the role that consumers play in order to improve safety?\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eWhat measures do the industry, governments and the EU put in place to ensure safe packaging?\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"en-BE\\\"\u003eHow can information and communication technologies reach the general public and help in daily choices?\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4bc463a9-1c02-4d2e-bcad-92cee4a6c6a5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EIT_Food+EITFoodFPK+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cb086354-6a83-4318-8ff8-b44179a94bc4\",\"productName\":\"Nuove tecnologie digitali\",\"productSlug\":\"learn/technology/universita-degli-studi-di-napoli-federico-ii-nuove-tecnologie-digitali\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/cb086354-6a83-4318-8ff8-b44179a94bc4-1116d1ae335f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Communication\",\"Engineering\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$156\",\"shortDescription\":\"\u003cp\u003eUn corso che ti avvicinerà alle diverse tematiche del digitale. Un viaggio attraverso le principali teorie dell’informazione e delle varie opportunità che il Web offre, dall’uso delle reti telematiche alla diffusione delle reti sociali.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLa teoria dell’informazione;\u003c/li\u003e\\n\u003cli\u003ei concetti di base relativi al Sistema Operativo con riferimento a Windows e alle Graphical User Interfaces;\u003c/li\u003e\\n\u003cli\u003ele reti di calcolatori e gli impianti di trasmissione;\u003c/li\u003e\\n\u003cli\u003eIl World Wide Web, il protocollo HTTP e la sua applicazione con i servizi web: HTML e CSS;\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003ele Reti Sociali e una panoramica sul futuro di internet.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eThe theory of information;\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eBasic concepts relating to Computer Architecture, Operating System and Graphical User Interfaces;\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eComputer networks and transmission systems;\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eWorld Wide Web, HTTP protocol and its application in Web services: HTML and CSS;\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eSocial networks and the future of the Internet.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-cb086354-6a83-4318-8ff8-b44179a94bc4\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+Fed.X-41+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9a9ad276-4ea5-4643-b7d2-c92be97e72e1\",\"productName\":\"Agri-Food Systems Analysis\",\"productSlug\":\"learn/sustainability/doane-university-agri-food-systems-analysis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9a9ad276-4ea5-4643-b7d2-c92be97e72e1-9d22a9b1e736.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Doane University\"],\"partnerKeys\":[\"DoaneX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e9e90c9f-85ec-4ae5-bea8-2ecae2258446-85b6b8c0a212.png\",\"fullDescription\":\"$157\",\"shortDescription\":\"\u003cp\u003eThis course will provide an introduction to critical skills for understanding and evaluating sustainability metrics in relation to Agri-Food systems.\u003c/p\u003e\",\"productOverview\":\"$158\",\"objectId\":\"course-9a9ad276-4ea5-4643-b7d2-c92be97e72e1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DoaneX+SAG-603x+1T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7ff42f15-4650-41ac-9ea7-1068e2a26606\",\"productName\":\"Health Communication\",\"productSlug\":\"learn/public-health/indian-institute-of-management-bangalore-celulas-y-tejidos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7ff42f15-4650-41ac-9ea7-1068e2a26606-33b5ae7afd41.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":[\"Indian Institute of Management Bangalore\"],\"partnerKeys\":[\"IIMBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c2e6b3f5-9c1f-41f0-b692-f2173d05a256-7729f0b9d72b.png\",\"fullDescription\":\"\u003cp\u003eLearn the challenges of communicating about health to different stakeholders, explore various theoretical frameworks and learn practical techniques to enhance your communication strategies.\u003c/p\u003e\\n\u003cp\u003eThis course will cover health literacy, message development, cultural competency, digital media, interpersonal communication, and ethical considerations in health communication.\u003c/p\u003e\\n\u003cp\u003eTarget Audience: This course is designed for healthcare professionals, public health practitioners, communication specialists, health educators, policymakers, and individuals interested in the field of health communication. It caters to both early-career professionals seeking to enhance their skills and knowledge, as well as experienced professionals aiming to stay updated with the latest communication strategies in public health.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDesigned during the difficult months of the COVID pandemic in 2021 to capture the\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e rapidly evolving health communication landscape, this course enables you to deal with “infodemics”, managing the infodemic in a public health crisis for better health outcomes.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eWhat you’ll learn: \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eRole of effective health communication in promoting public health and improving health outcomes\u003c/li\u003e\\n\u003cli\u003eCommunication theories and principles to develop targeted health messages for diverse populations\u003c/li\u003e\\n\u003cli\u003eStrategies to enhance health literacy and improve health information comprehension\u003c/li\u003e\\n\u003cli\u003eCultural competence in health communication to address the needs and preferences of diverse communities\u003c/li\u003e\\n\u003cli\u003eInterpersonal communication skills to establish rapport, trust, and collaboration with patients, colleagues, and stakeholders\u003c/li\u003e\\n\u003cli\u003eEthical challenges in health communication, including issues related to privacy, consent, and health disparities\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDigital media platforms and technologies to disseminate health information and engage with audiences effectively\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7ff42f15-4650-41ac-9ea7-1068e2a26606\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IIMBx+BC102x+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"96172666-4adb-4f98-9df3-c83250ab04c6\",\"productName\":\"Unlocking Information Security II: An Internet Perspective\",\"productSlug\":\"learn/computer-programming/tel-aviv-university-unlocking-information-security-ii-an-internet-perspective\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/96172666-4adb-4f98-9df3-c83250ab04c6-32be4366e8e1.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Tel Aviv University\",\"IsraelX\"],\"partnerKeys\":[\"TAUx\",\"IsraelX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e337af8-3643-496e-be9e-fb91274a505d-19990d293b60.png\",\"fullDescription\":\"$159\",\"shortDescription\":\"\u003cp\u003eContinue learning how systems are hacked and defended.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAn introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls\u003c/li\u003e\\n\u003cli\u003eAn in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC\u003c/li\u003e\\n\u003cli\u003eA survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?\u003c/li\u003e\\n\u003cli\u003eAn introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-96172666-4adb-4f98-9df3-c83250ab04c6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TAUx+InfoSec102+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/96172666-4adb-4f98-9df3-c83250ab04c6-ed8a05b9f952.png\"},{\"productUuid\":\"6895dcc7-d17e-43b5-a6a2-26c8b2d3003b\",\"productName\":\"Innovation in Arable Farming: Technologies for Sustainable Farming Systems\",\"productSlug\":\"learn/food-nutrition/eit-food-innovation-in-arable-farming-technologies-for-sustainable-farming-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6895dcc7-d17e-43b5-a6a2-26c8b2d3003b-e2bdf87f2c77.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Food \u0026 Nutrition\"],\"partnerName\":[\"EIT Food\"],\"partnerKeys\":[\"EIT_Food\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9a8db325-4f07-4e29-990b-3ec8059bf7ad-fbef866d4b06.png\",\"fullDescription\":\"\u003cp\u003eIntensification of arable farming systems can be achieved through the adoption of innovative technologies, without negatively impacting the environment. However, uptake of these technologies by farmers across the EU has been limited.\u003c/p\u003e\\n\u003cp\u003eIn this course, you’ll explore evidence-based information that outlines the benefits and challenges of adopting new technologies within the EU, and have the chance to read case study examples of some of these applications.\u003c/p\u003e\\n\u003cp\u003eYou’ll learn from other farmers who have already adopted agri-tech on their farm and hear how they overcame any barriers to adoption.\u003c/p\u003e\\n\u003cp\u003eYou’ll also evaluate the potential of agri-tech to enhance production while meeting environmental and social responsibilities.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eExplore how innovative digital technologies can help achieve sustainable intensification of arable farming systems.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of the course, you‘ll be able to...\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eDescribe the concepts of precision agriculture and sustainable intensification and the impact these can have on farming systems.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCompare the different technologies that can be used to increase productivity and know how to work out yields to profit.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eExplore how to use agri-tech to help reduce environmental impacts of farm practices.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentify which skills are necessary to implement new data-driven arable farming techniques.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDevelop an action plan for precision farming.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAssess the benefits to the environment offered by the intensification of agriculture\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6895dcc7-d17e-43b5-a6a2-26c8b2d3003b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EIT_Food+EITFOODIAF+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8cdc3419-2ba3-492f-af12-6be4eb8e2b63\",\"productName\":\"Check Point Jump Start: Quantum Management\",\"productSlug\":\"learn/cybersecurity/check-point-software-technologies-ltd-check-point-jump-start-quantum-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8cdc3419-2ba3-492f-af12-6be4eb8e2b63-7aa6734455e2.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$15a\",\"shortDescription\":\"\u003cp\u003eCheck Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks.This course includes these modules:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003e\\n\u003cp\u003eIntro\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInstalling Gaia\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eRunning the First Time Wizard.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eInstalling SmartConsole\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstablish SIC\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCreate \u0026amp; installing Policy\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable application control blade\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable IDA blade\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable HTTPS Inspection\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnable Autonomous Threat Prevention\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAdding License\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCPUSE SmartConsole\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eGathering cpinfo\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ol\u003e\\n\u003cp\u003eThis course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products.\u003c/p\u003e\",\"productOverview\":\"$15b\",\"objectId\":\"course-8cdc3419-2ba3-492f-af12-6be4eb8e2b63\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs09+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/8cdc3419-2ba3-492f-af12-6be4eb8e2b63-38fa27562737.png\"},{\"productUuid\":\"126d971a-6bb6-45a0-b7e7-cb5aca63c437\",\"productName\":\"Check Point Jump Start: Harmony Mobile\",\"productSlug\":\"learn/computer-programming/check-point-software-technologies-ltd-check-point-jump-start-harmony-mobile\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/126d971a-6bb6-45a0-b7e7-cb5aca63c437-2b224581fcec.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$15c\",\"shortDescription\":\"$15d\",\"productOverview\":\"$15e\",\"objectId\":\"course-126d971a-6bb6-45a0-b7e7-cb5aca63c437\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs10+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/126d971a-6bb6-45a0-b7e7-cb5aca63c437-9413d93574a7.png\"},{\"productUuid\":\"423727a8-831b-4590-91dd-0d9acd93b322\",\"productName\":\"Automóviles eléctricos: Negocios\",\"productSlug\":\"learn/electric-cars/delft-university-of-technology-automoviles-electricos-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/423727a8-831b-4590-91dd-0d9acd93b322-725939a5b85c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Engineering\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$15f\",\"shortDescription\":\"\u003cp\u003eObtenga una comprensión profunda de los variados modelos de negocio rentables para automóviles eléctricos.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCómo los automóviles eléctricos están alterando los modelos de negocio convencionales.\u003c/li\u003e\\n\u003cli\u003eCómo aplicar herramientas avanzadas de innovación empresarial.\u003c/li\u003e\\n\u003cli\u003eCómo desarrollar modelos de negocio rentables de movilidad eléctrica.\u003c/li\u003e\\n\u003cli\u003eInnovación en la movilidad futura.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-423727a8-831b-4590-91dd-0d9acd93b322\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+eCARS3SPx+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8c6642f0-0949-4bd5-9084-b2d63814a75c\",\"productName\":\"Check Point Jump Start: Harmony Endpoint Security\",\"productSlug\":\"learn/computer-security/check-point-software-technologies-ltd-check-point-jump-start-harmony-endpoint-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8c6642f0-0949-4bd5-9084-b2d63814a75c-d0a9079674a6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Check Point Software Technologies Ltd.\"],\"partnerKeys\":[\"CheckPoint\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c980660a-dc5c-4dc5-8f04-de4359eb5ea0-f4df7f5337bd.png\",\"fullDescription\":\"$160\",\"shortDescription\":\"$161\",\"productOverview\":\"\u003cp\u003eLearn how to use Check Point Harmony Endpoint security solution to prevent, protect, and quickly respond to advanced attacks on Endpoint devices.\u003c/p\u003e\",\"objectId\":\"course-8c6642f0-0949-4bd5-9084-b2d63814a75c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CheckPoint+cpjs07+2T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b8eac1f6-1911-4a4a-aec3-39ed9945422f\",\"productName\":\"Big Data Analytics\",\"productSlug\":\"learn/big-data/university-of-adelaide-big-data-analytics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b8eac1f6-1911-4a4a-aec3-39ed9945422f-6465408b0fc3.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Adelaide\"],\"partnerKeys\":[\"AdelaideX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f5d1ff66-002f-43fa-9d76-1b191d4a3272-0e2420850666.png\",\"fullDescription\":\"\u003cp\u003eGain essential skills in today’s digital age to store, process and analyse data to inform business decisions.\u003c/p\u003e\\n\u003cp\u003eIn this course, part of the Big Data MicroMasters program, you will develop your knowledge of big data analytics and enhance your programming and mathematical skills. You will learn to use essential analytic tools such as Apache Spark and R.\u003c/p\u003e\\n\u003cp\u003eTopics covered in this course include:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003ecloud-based big data analysis;\u003c/li\u003e\\n\u003cli\u003epredictive analytics, including probabilistic and statistical models;\u003c/li\u003e\\n\u003cli\u003eapplication of large-scale data analysis;\u003c/li\u003e\\n\u003cli\u003eanalysis of problem space and data needs.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eBy the end of this course, you will be able to approach large-scale data science problems with creativity and initiative.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn key technologies and techniques, including R and Apache Spark, to analyse large-scale data sets to uncover valuable business information.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to develop algorithms for the statistical analysis of big data;\u003c/li\u003e\\n\u003cli\u003eKnowledge of big data applications;\u003c/li\u003e\\n\u003cli\u003eHow to use fundamental principles used in predictive analytics;\u003c/li\u003e\\n\u003cli\u003eEvaluate and apply appropriate principles, techniques and theories to large-scale data science problems.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b8eac1f6-1911-4a4a-aec3-39ed9945422f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AdelaideX+AnalyticsX+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ee591393-3e24-456f-b569-266843f60149\",\"productName\":\"Industry 4.0: How to Revolutionize your Business\",\"productSlug\":\"learn/industrial-engineering/the-hong-kong-polytechnic-university-industry-4-0-how-to-revolutionize-your-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ee591393-3e24-456f-b569-266843f60149-cc82de257f3b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Engineering\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"$162\",\"shortDescription\":\"\u003cp\u003eAn introduction to the fourth industrial revolution, it's major systems and technologies and how new products and services will impact business and society.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the various stages of industrial revolutions\u003c/li\u003e\\n\u003cli\u003eUnderstand the Future of Work and the skills needed\u003c/li\u003e\\n\u003cli\u003eThe drivers, enablers and compelling forces for Industry 4.0’s advancement\u003c/li\u003e\\n\u003cli\u003eSmart factories and howthey compare to existing ones\u003c/li\u003e\\n\u003cli\u003eUnderstand whatInternet of Thing (IoT) and Industrial Internet of Things (IIoT)\u003c/li\u003e\\n\u003cli\u003ePredictive Analysis, Big Data leading to data-driven decisions and automation\u003c/li\u003e\\n\u003cli\u003eCyber Physical Systems and other major systems in Industry 4.0\u003c/li\u003e\\n\u003cli\u003eUnderstand the role and importance of data and cloud computing\u003c/li\u003e\\n\u003cli\u003eHow to use the Cloud to support human-machine collaborative efforts\u003c/li\u003e\\n\u003cli\u003eThe use of collaborative robots\u003c/li\u003e\\n\u003cli\u003eExamples of smart automations, products and services\u003c/li\u003e\\n\u003cli\u003eThe challenges in cybersecurity and how to reduce them\u003c/li\u003e\\n\u003cli\u003eHow organizations and knowledge workers can better prepare for Industry 4.0\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ee591393-3e24-456f-b569-266843f60149\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+I4.0x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"afff6081-0330-4d86-8c8a-83ee077b56c2\",\"productName\":\"Digital Shield: Cybersecurity for Data and System Protection\",\"productSlug\":\"learn/computer-science/universidades-anahuac-digital-shield-cybersecurity-for-data-and-system-protection\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/afff6081-0330-4d86-8c8a-83ee077b56c2-8e2ad8f0d8ff.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$163\",\"shortDescription\":\"\u003cp\u003eThis course empowers you with the knowledge to protect systems, networks, and data, develop skills to adequately respond to cyberattacks, understand the risks of cybersecurity, and identify vulnerabilities while managing information security.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the fundamentals of information security and cybersecurity\u003c/li\u003e\\n\u003cli\u003eIdentify concepts related to security threats and vulnerabilities\u003c/li\u003e\\n\u003cli\u003eUnderstand risk management strategies and regulatory compliance\u003c/li\u003e\\n\u003cli\u003eAnalyze strategies and controls for network security\u003c/li\u003e\\n\u003cli\u003eIdentify various types of malware and the associated controls for prevention\u003c/li\u003e\\n\u003cli\u003eDevelop strategies for safe internet browsing\u003c/li\u003e\\n\u003cli\u003eIdentify various social engineering techniques and strategies to prevent victim from falling to social engineering attack\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-afff6081-0330-4d86-8c8a-83ee077b56c2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.MO.13x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0c61aa0b-f7c1-4af8-bff8-11b5e5afa6e7\",\"productName\":\"Basi di dati\",\"productSlug\":\"learn/databases/universita-degli-studi-di-napoli-federico-ii-basi-di-dati\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0c61aa0b-f7c1-4af8-bff8-11b5e5afa6e7-9ff5b06d5db6.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$164\",\"shortDescription\":\"\u003cp\u003eImpara i fondamenti dei sistemi di gestione delle informazioni e comprendi i modelli delle basi di dati e le relative evoluzioni. \u003c/p\u003e\\n\u003cp\u003eLearn the fundamentals of information management systems and database models.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eGli allievi del corso saranno introdotti :\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003ealla comprensione della teoria relazionale dei dati\u003c/li\u003e\\n\u003cli\u003eall’analisi, progetto, implementazione di sistemi di basi di dati relazionali a supporto di applicazioni reali\u003c/li\u003e\\n\u003cli\u003eall’uso del linguaggio di programmazione SQL per quanto attiene la definizione e la manipolazione di data base.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eIn this course, the students will be introduced to:\u003c/p\u003e\\n\u003cp\u003e• the relational data theory; \u003c/p\u003e\\n\u003cp\u003e• the analysis, design and implementation of relational databases in real applications; \u003c/p\u003e\\n\u003cp\u003e• the use of SQL programming language for databases definition and manipulation.\u003c/p\u003e\",\"objectId\":\"course-0c61aa0b-f7c1-4af8-bff8-11b5e5afa6e7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+53+3T2020a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bef21f0e-8cd9-444a-a32c-5cf76cd08e2e\",\"productName\":\"IoT System Architecture: Design and Evaluation\",\"productSlug\":\"learn/computer-architecture/waseda-university-iot-system-architecture-design-and-evaluation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bef21f0e-8cd9-444a-a32c-5cf76cd08e2e-a84d6e56284f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Waseda University\"],\"partnerKeys\":[\"WasedaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c2bb4096-9dbd-40d1-a4e9-d580dbbc9e48-5d1be3893b0c.png\",\"fullDescription\":\"\u003cp\u003eThis course was created to help learners understand how to design the architecture of IoT systems. \u003c/p\u003e\\n\u003cp\u003eIoT (Internet of Things) systems are inherently distributed, heterogeneous, and complicated, hence designing architecture plays an important role in determining its functionality and quality in the early phase of development. However, designing architecture is not easy, because architects must address a number of system functionalities and quality requirements at the same time. \u003c/p\u003e\\n\u003cp\u003eThis course will give you an understanding of the concept of architecture and it will give you an approach to systematically design and evaluate IoT system architecture. \u003c/p\u003e\\n\u003cp\u003e*This course was reorganized based on Smart Systems and Services innovative professional Education (SmartSE) program, which is a series of the education program Waseda University provides in Japanese. For more information, please visit: \u003ca href=\\\"https://smartse.jp/en/\\\"\u003ehttps://smartse.jp/en/\u003c/a\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to design and evaluate architecture through IoT and AI technologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to recognize the concept of architecture and its importance in IoT system development\u003c/li\u003e\\n\u003cli\u003eHow to design IoT system architecture according to an architecture design methodology called Attribute-Driven Design (ADD)\u003c/li\u003e\\n\u003cli\u003eHow to evaluate IoT system architecture according to an architecture evaluation methodology called Architecture Tradeoff Analysis Method (ATAM)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bef21f0e-8cd9-444a-a32c-5cf76cd08e2e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WasedaX+IoTArchit111x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"88721641-d27b-43ed-9fb9-4450d8dd8d5d\",\"productName\":\"Cybersecurity: The CISO's View\",\"productSlug\":\"learn/cybersecurity/university-of-washington-cybersecurity-the-ciso-s-view\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/88721641-d27b-43ed-9fb9-4450d8dd8d5d-7abc6f234b6b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"\u003cp\u003eThe Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company’s employees as well as its customers depend upon.\u003c/p\u003e\\n\u003cp\u003eThis course delves into the role that the CISO plays in cybersecurity operations.\u003c/p\u003e\\n\u003cp\u003eThroughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals' point of view? How do we keep information secure?\u003c/p\u003e\\n\u003cp\u003eCoursework will fully explore the CISO’s view from the top, as well as the position’s toolkit, which includes policy, procedures and practices, technologies, awareness training, and audit. It will also dive into the approaches taken in private industry, government, academia, and the military.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn about cybersecurity operations and the role played by the Chief Information Security Officer (CISO) in the industry.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIdentify the four domains of cybersecurity and the differences between their rules, regulations, and desired outcomes;\u003c/li\u003e\\n\u003cli\u003eExplain the role of the CISO across all domains, and the differences between CISO roles among the domains;\u003c/li\u003e\\n\u003cli\u003eIdentify cybersecurity specific tools for their appropriate domains and situations.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-88721641-d27b-43ed-9fb9-4450d8dd8d5d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB002x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4e63b5db-745e-480d-a2e0-a750b8af67f5\",\"productName\":\"Networks, Crowds and Markets\",\"productSlug\":\"learn/computer-programming/cornell-university-networks-crowds-and-markets\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4e63b5db-745e-480d-a2e0-a750b8af67f5-43a2b33190df.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Social Sciences\",\"Math\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Cornell University\"],\"partnerKeys\":[\"CornellX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/99661642-a500-4988-bd1b-97877bd6e232-6903c8a95279.png\",\"fullDescription\":\"\u003cp\u003eThe course invites you to examine the interconnectedness of modern life through an exploration of fundamental questions about how our social, economic, and technological worlds are connected. Students will explore game theory, the structure of the Internet, social contagion, the spread of social power and popularity, and information cascades.\u003c/p\u003e\\n\u003cp\u003eThis MOOC is based on an interdisciplinary Cornell University course entitled Networks, taught by professors David Easley, Jon Kleinberg, and Éva Tardos. That course was also the basis for the book, Networks, Crowds, and Markets: Reasoning About a Highly Connected World. This course is designed at the introductory undergraduate level without formal prerequisites.\u003c/p\u003e\",\"shortDescription\":\"Explore the critical questions posed by how the social, economic, and technological realms of the modern world interconnect.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eUse the tools of graph theory as a basis for studying the Internet social networks, and the process of Web search.\u003c/li\u003e\\n\\t\u003cli\u003eApply game theory to analyze strategic behavior in a variety of settings including auction design, Web advertising, network routing, and social marketing.\u003c/li\u003e\\n\\t\u003cli\u003eUnderstand strategic behavior in matching markets that link buyers and sellers.\u003c/li\u003e\\n\\t\u003cli\u003eExplore the relationships between markets, information, and consumer expectations.\u003c/li\u003e\\n\\t\u003cli\u003eAnalyze the processes by which ideas, beliefs, opinions, products, technologies, and social conventions spread through social networks.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4e63b5db-745e-480d-a2e0-a750b8af67f5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CornellX+INFO2040x+1T2016\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"fdae353b-61f1-4b81-aea9-2325cce2001a\",\"productName\":\"Introduction to Urban Geo-Informatics\",\"productSlug\":\"learn/gis-geographic-information-systems/the-hong-kong-polytechnic-university-introduction-to-urban-geo-informatics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/fdae353b-61f1-4b81-aea9-2325cce2001a-5db3ef73861b.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Environmental Studies\",\"Science\"],\"partnerName\":[\"The Hong Kong Polytechnic University\"],\"partnerKeys\":[\"HKPolyUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0e54e104-1705-4479-80ec-5be6cac8b021-92ff94bde414.png\",\"fullDescription\":\"$165\",\"shortDescription\":\"Learning about geospatial technologies, such as GIS, Remote Sensing, GNSS and Underground Mapping, to solve urban environmental issues.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eIssues surrounding the Urban Environment\u003c/li\u003e\\r\\n\u003cli\u003eHistory and skills involved in the different Geospatial Technologies (Remote Sensing, GIS, GNSS, Underground Mapping)\u003c/li\u003e\\r\\n\u003cli\u003eDiscover how Geospatial data is collected, analyzed, and used to shape our world\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-fdae353b-61f1-4b81-aea9-2325cce2001a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKPolyUx+LSGI1001x+1T2018\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3ee9a517-3d25-4b2f-a93b-9b72c22a4dd1\",\"productName\":\"Digital Earth, Deeper Dive\",\"productSlug\":\"learn/earth-sciences/university-of-denver-digital-earth-deeper-dive\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3ee9a517-3d25-4b2f-a93b-9b72c22a4dd1-6aeadfc11fa7.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Science\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$166\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThis\u003c/span\u003e course follows the Digital Earth course and provides a deeper dive into the theoretical foundations and practical applications for social and ecological problem-solving through the application of geotechnologies. Geotechnologies include Geographic Information Systems (GIS), examining the world through imagery collected by drones, aircraft, and satellites (remote sensing), and positioning from GPS or Global Navigation Satellite Systems.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThe purpose of this course is to continue the foundation gained in the Digital Earth coruse for your successful use of mapping tools by introducing you to the ways that digital maps from GIS can \u003c/span\u003ebe created, symbolized, and used in visualizations to solve problems and serve as communication tools to address key 21\u003cspan lang=\\\"EN-US\\\"\u003est\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e Century issues\u003c/span\u003e. Through this course, you will gain fundamental skills in problem solving through spatial analysis through hands-on work. But equally importantly, you will gain understanding of the technological and societal implications that these tools have on 21st Century society and how you can chart your own pathway forward using these tools and perspectives.\u003c/p\u003e\",\"objectId\":\"course-3ee9a517-3d25-4b2f-a93b-9b72c22a4dd1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+DEDD-U031-202450+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ada99cbf-2f29-4a35-b374-fac4216b2a50\",\"productName\":\"DUx: University College: Digital Earth\",\"productSlug\":\"learn/gis-geographic-information-systems/university-of-denver-dux-university-college-digital-earth\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ada99cbf-2f29-4a35-b374-fac4216b2a50-0bec72a6abab.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Energy \u0026 Earth Sciences\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$167\",\"shortDescription\":\"\u003cp\u003eThis course aims to establish a solid foundation in utilizing mapping tools by teaching the creation, symbolization, and application of GIS-based digital maps for problem-solving and communication on pivotal 21st-century issues. Participants will develop essential skills in spatial analysis through practical exercises, and more critically, gain insights into the technological and societal impacts of these tools. This understanding will enable learners to navigate and contribute to 21st-century society effectively using these tools and perspectives.\u003c/p\u003e\",\"productOverview\":\"$168\",\"objectId\":\"course-ada99cbf-2f29-4a35-b374-fac4216b2a50\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+U021-202430+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5ab67b41-50e6-4ae8-af77-12699ced604f\",\"productName\":\"Digital Earth, Deeper Dive - MicroMasters\",\"productSlug\":\"learn/energy-earth-sciences/university-of-denver-digital-earth-deeper-dive-micromasters\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5ab67b41-50e6-4ae8-af77-12699ced604f-550cfae9bf45.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$169\",\"shortDescription\":\"\u003cp\u003eThis course aims to establish a solid foundation in utilizing mapping tools by teaching the creation, symbolization, and application of GIS-based digital maps for problem-solving and communication on pivotal 21st-century issues. Participants will develop essential skills in spatial analysis through practical exercises, and more critically, gain insights into the technological and societal impacts of these tools. This is the 2nd Digital Earth course in a two-part series.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eIn addition to the course outcomes, you will \u003c/span\u003eacquire specialized information regarding: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN\\\"\u003eThe importance of digital maps\u003c/span\u003e for decision making and sustainability.\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHow to create \u003c/span\u003evector, choropleth, and isarithimic maps from data classification techniques and symbology.\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHow to \u003c/span\u003erender a digital elevation models into a 3D images for viewshed and line of sight calculations.\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eHow to communicate information through digital mapping\u003c/span\u003e.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5ab67b41-50e6-4ae8-af77-12699ced604f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+DUx-GIS-DEDDMM-U041-202470+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"05d14fbe-271c-48bb-a3eb-708361c78210\",\"productName\":\"Digital Earth - MicroMasters\",\"productSlug\":\"learn/energy-earth-sciences/university-of-denver-digital-earth\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/05d14fbe-271c-48bb-a3eb-708361c78210-eb8599bc4959.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Data Analysis \u0026 Statistics\",\"Environmental Studies\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"DUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/df269e97-7b6f-469d-82e6-7627ed7de4b3-e0e6ca7afe52.png\",\"fullDescription\":\"$16a\",\"shortDescription\":\"\u003cp\u003eThis course aims to establish a solid foundation in utilizing mapping tools by teaching the creation, symbolization, and application of GIS-based digital maps for problem-solving and communication on pivotal 21st-century issues. Participants develop essential skills in spatial analysis through practical exercises, and more critically, gain insights into the technological and societal impacts of these tools. This is a prerequisite to the Digital Earth, Deeper Dive - MicroMasters course.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAt the end of this course, you will be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscuss the evolution, components, and applications of Geosptial Information Systems\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDiscern among different coordinate systems, datums and map projections\u003c/span\u003e\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eUse basic digital mapping tools\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e*\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-05d14fbe-271c-48bb-a3eb-708361c78210\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DUx+DUx-GIS-DEMM-U041-202450+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c04a69c9-77cd-49dc-a72e-64c466d7d5dd\",\"productName\":\"The Book: Book Sleuthing: What 19th-Century Books Can Tell Us About the Rise of the Reading Public?\",\"productSlug\":\"learn/literature/harvard-university-the-book-book-sleuthing-what-19th-century-books-can-tell-us-about-the-rise-of-the-reading-public\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c04a69c9-77cd-49dc-a72e-64c466d7d5dd-d994d822826c.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Art \u0026 Culture\",\"Literature\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$16b\",\"shortDescription\":\"Go behind the scenes at Harvard’s libraries to discover how readers in the first information age interacted with their books.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eExamine books for clues to the lives of the people who have read them\u003c/li\u003e\\n\\t\u003cli\u003eGain historical perspective on today’s shift from print to digital media by tracing the 19th-century origins of modern mass-produced books\u003c/li\u003e\\n\\t\u003cli\u003eCompare your own reading habits to those of past readers. What conclusions would future historians draw if they could look at your bookshelves?\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c04a69c9-77cd-49dc-a72e-64c466d7d5dd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+HUM1.5x+3T2015\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d56e7ceb-e866-4007-b915-dcc34c7ef8ee\",\"productName\":\"Enterprise Data Management\",\"productSlug\":\"learn/data-management/indiana-university-enterprise-data-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d56e7ceb-e866-4007-b915-dcc34c7ef8ee-0337b9efe55e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Indiana University\"],\"partnerKeys\":[\"IUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8946fb40-f288-4e05-9275-9e9b4689bda8-e58c545e2296.png\",\"fullDescription\":\"$16c\",\"shortDescription\":\"\u003cp\u003eUnderstand structured transactional data and known questions along with unknown, less-organized questions enabled by raw/external datasets in the data lakes. Topics include data strategy and data governance, relational databases/SQL, data integration, master data management, and big data technologies.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eDesign relational databases that are used to manage operational systems.\u003c/li\u003e\\r\\n\u003cli\u003eQuery relational databases using Structured Query Language (SQL).\u003c/li\u003e\\r\\n\u003cli\u003eUnderstand issues relating to data quality, describe the principles of data profiling, and master data management.\u003c/li\u003e\\r\\n\u003cli\u003eUnderstand the need, definition, and types of data integration. \u003c/li\u003e\\r\\n\u003cli\u003eUnderstand the meaning and architecture of data warehouse. \u003c/li\u003e\\r\\n\u003cli\u003eUnderstand how to visualize data using graphical marks. \u003c/li\u003e\\r\\n\u003cli\u003eLearn the physical and cognitive roots of vision. \u003c/li\u003e\\r\\n\u003cli\u003eLearn to build more complicated visualizations and utilize data stories to deliver deeper, wider, and richer information.\u003c/li\u003e\\r\\n\u003cli\u003eUnderstand the important questions that data governance seeks to address.\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-d56e7ceb-e866-4007-b915-dcc34c7ef8ee\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IUx+BUKD-X590+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f2c178f0-21d1-481c-a7e0-7529b78c3a45\",\"productName\":\"Software Engineering Basics for Everyone\",\"productSlug\":\"learn/software-engineering/ibm-software-engineering-basics-for-everyone\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f2c178f0-21d1-481c-a7e0-7529b78c3a45-ee442688d49a.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$16d\",\"shortDescription\":\"\u003cp\u003eBuild the foundation for an in-demand Software Engineering related career. Explore fundamental software engineering principles, processes, architecture, tools, and stacks. Hear from software experts discuss what it takes to be successful.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eExplain software engineering, Software Development Lifecycle (SDLC), and software development tools, technologies, and stacks.\u003c/li\u003e\\n\u003cli\u003eDescribe the difference between types of programming languages and create basic programming constructs such as loops and conditions using Python.\u003c/li\u003e\\n\u003cli\u003eOutline approaches to application architecture and design, patterns, and deployment architectures.\u003c/li\u003e\\n\u003cli\u003eSummarize the skills required in software engineering and describe the career options it provides.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f2c178f0-21d1-481c-a7e0-7529b78c3a45\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CS0131EN+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"adbb5b20-6df0-426e-9e71-1c076796950b\",\"productName\":\"Ethical Hacking Essentials (EHE)\",\"productSlug\":\"learn/information-security/ec-council-ethical-hacking-essentials-ehe\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/adbb5b20-6df0-426e-9e71-1c076796950b-1ce691a5af85.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"EC-Council\"],\"partnerKeys\":[\"EC-Council\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f309112-a97b-4f8a-8dbb-a89e247d0bc3-d603c7bd13bb.png\",\"fullDescription\":\"$16e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eEthical Hacking Essentials (EHE) is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$16f\",\"objectId\":\"course-adbb5b20-6df0-426e-9e71-1c076796950b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EC-Council+EHE-112-52+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"494f368e-13b6-48f6-bf5b-83f15ca0438f\",\"productName\":\"Digital Forensics Essentials (DFE)\",\"productSlug\":\"learn/digital-forensics/ec-council-digital-forensics-essentials-dfe\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/494f368e-13b6-48f6-bf5b-83f15ca0438f-c4e24dca16c6.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"EC-Council\"],\"partnerKeys\":[\"EC-Council\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f309112-a97b-4f8a-8dbb-a89e247d0bc3-d603c7bd13bb.png\",\"fullDescription\":\"$170\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN\\\"\u003eDigital Forensics Essentials (DFE) is a first-of-its-kind MOOC certification that offers foundational knowledge and skills on digital forensics with add-on labs for hands-on experience.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$171\",\"objectId\":\"course-494f368e-13b6-48f6-bf5b-83f15ca0438f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EC-Council+DFE-112-53+3T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"42f20043-d067-4d4a-8952-d6bb9c60b747\",\"productName\":\"Introduction to Bioconductor\",\"productSlug\":\"learn/data-science/harvard-university-introduction-to-bioconductor\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/42f20043-d067-4d4a-8952-d6bb9c60b747-05259b8f46b1.jpg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Biology \u0026 Life Sciences\",\"Science\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$172\",\"shortDescription\":\"\u003cp\u003eThe structure, annotation, normalization, and interpretation of genome scale assays.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eWhat we measure with high-throughput technologies and why\u003c/li\u003e\\n\u003cli\u003eIntroduction to high-throughput technologies\u003cul\u003e\\n\u003cli\u003eNext Generation Sequencing\u003c/li\u003e\\n\u003cli\u003eMicroarrays\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003ePreprocessing and Normalization\u003c/li\u003e\\n\u003cli\u003eThe Bioconductor Genomic Ranges Utilities\u003c/li\u003e\\n\u003cli\u003eGenomic Annotation\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-42f20043-d067-4d4a-8952-d6bb9c60b747\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+PH525.5x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f5aaf678-c877-463e-87e8-38bf783147d0\",\"productName\":\"Digital Supply Chain Management\",\"productSlug\":\"learn/supply-chain-management/sda-bocconi-school-of-management-digital-supply-chain-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f5aaf678-c877-463e-87e8-38bf783147d0-2fdbf0356313.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"SDA Bocconi School of Management\"],\"partnerKeys\":[\"SDA_Bocconi\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d3c464ef-ef59-4c3c-b08e-59f0b9305424-286425888b86.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThe development towards digital supply chains is more an \u003c/span\u003e\u003cstrong\u003e_ ___ evolution\u003c/strong\u003e rather than a revolution. \u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThe emergence and diffusion of new technologies allows companies to \u003cstrong\u003e_ ___ gather, analyze, combine and evaluate information\u003c/strong\u003e in a more feasible and responsive manner compared to the past, but the criticalities they aim to solve have existed for years.\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eThe course aims to \u003cstrong\u003e_ ___ investigate how a transformation towards a more digital approach in operations and supply chain processes\u003c/strong\u003e can \u003cstrong\u003e_ ___ improve the efficiency, quality and level of service\u003c/strong\u003e provided in an increasingly \u003cstrong\u003e_ ___ customer-oriented context.\u003c/strong\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThe course aims to investigate how a transformation towards a more digital approach in operations and supply chain processes can improve the efficiency, quality and level of service provided in an increasingly customer-oriented context.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOnce defined and clarified the key terms and their definitions of the digital supply chain, a review of the key technologies trends and their applications will enable participants - even those with little prior knowledge of these issues - to comprehend the fundamental aspects of such an evolution, not only to reduce costs but to create new value for the company and its customers.\u003c/p\u003e\\n\u003cp\u003eThe learning goals of the course are:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentify the key pillars of the digital evolution of supply chains and explore the role of digital transformation in operations and supply chain management\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentify and address the criticalities of traditional supply chains in the context of digital transformation and study real-world examples of digital transformation in the supply chain\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eGain knowledge about smart factories, the Industrial Internet of Things (IIoT), and their impacts on operations and efficiency.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f5aaf678-c877-463e-87e8-38bf783147d0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:SDA_Bocconi+94295+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0a02b1de-4249-4fd4-bb19-0b80b5cb06ce\",\"productName\":\"Powering Resilient Communities: A Holistic Approach to Food, Energy, and Water Security\",\"productSlug\":\"learn/sustainable-energy/university-of-alaska-fairbanks-renewable-energy-for-arctic-food-and-water-security\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0a02b1de-4249-4fd4-bb19-0b80b5cb06ce-08fbb7920a9f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Food \u0026 Nutrition\",\"Energy \u0026 Earth Sciences\"],\"partnerName\":[\"University of Alaska Fairbanks\"],\"partnerKeys\":[\"AlaskaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8d801db7-a298-4c63-9372-59e00f6e4038-b7c8e8d997b1.png\",\"fullDescription\":\"$173\",\"shortDescription\":\"\u003cp\u003eA research-based course on resilient renewable energy solutions, with an emphasis on microgrids, and Food, Energy, and Water (FEW) security.\u003c/p\u003e\",\"productOverview\":\"$174\",\"objectId\":\"course-0a02b1de-4249-4fd4-bb19-0b80b5cb06ce\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AlaskaX+FEWx+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2231c657-36ea-4af7-ab4e-5ebd8610f568\",\"productName\":\"Remote teams leadership\",\"productSlug\":\"learn/leadership/universitat-politecnica-de-valencia-remote-teams-leadership\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2231c657-36ea-4af7-ab4e-5ebd8610f568-2fefeabe6f54.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"\u003cp\u003eIn remote environments, leading teams in the right way is, if possible, even more essential and, moreover, more complex to perform. For this reason, we want to help prepare people who occupy management positions or who participate in work teams to lead effectively in remote work contexts. \u003c/p\u003e\\n\u003cp\u003eThis course applies to all coordination or management positions where remote teamwork is required. \u003c/p\u003e\\n\u003cp\u003eWe will build the learning through digital resources, examples of experiences, self-diagnoses of the enrolled people and peer feedback to complete a 360º information that allows to draw an action plan to manage the acquired competence.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to lead teams in remote work environments.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eApply different leadership styles in digital environments adapted to the profile of employees\u003c/li\u003e\\n\u003cli\u003eDemonstrate different behaviors to avoid threats to the psychological well-being of employees when using digital technologies\u003c/li\u003e\\n\u003cli\u003eDecide which are the most appropriate ways to improve or upgrade one's own leadership competence in digital environments\u003c/li\u003e\\n\u003cli\u003eAssess the development of leadership competency in digital environments in other people\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2231c657-36ea-4af7-ab4e-5ebd8610f568\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+LCER201.2x_EN+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"70caadde-2995-442b-82b9-b02b10001691\",\"productName\":\"Capstone Economics and Policies for a Circular Economy\",\"productSlug\":\"learn/circular-economy/wageningen-university-research-capstone-economics-and-policies-for-a-circular-economy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/70caadde-2995-442b-82b9-b02b10001691-90055250a3cf.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$175\",\"shortDescription\":\"\u003cp\u003eThis capstone project is the final part of the MicroMasters® Program Economics and Policies for a Circular Economy. Interdisciplinarity is central in this part, linking the various sections in this MicroMasters Program.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cstrong\u003eAfter completing the course, you will be able to:\u003c/strong\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eFind and interpret academic literature\u003c/li\u003e\\n\u003cli\u003eDevelop a methodology by taking into account all disciplines discussed in this MicroMasters Program\u003c/li\u003e\\n\u003cli\u003eApply the methodology to analyze the economic viability of a business project in a circular economy considering its technological, economic, and policy aspects\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-70caadde-2995-442b-82b9-b02b10001691\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+CE03x+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"04014e1d-2797-4066-8ebe-5c619d986d33\",\"productName\":\"Guided Project: Create and Deploy Your First Kubernetes Pod V2\",\"productSlug\":\"learn/kubernetes/ibm-guided-project-create-and-deploy-your-first-kubernetes-pod-v2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/04014e1d-2797-4066-8ebe-5c619d986d33-938599850056.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$176\",\"shortDescription\":\"\u003cp\u003eWhether you’re a beginner or intermediate developer, in just about one hour you can gain hands-on skills with Kubernetes, one of the world’s most popular an essential system for managing containerized applications.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAfter completing this hands-on guided project, you'll be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse the kubectl CLI to extract cluster and pod information\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse imperative and declarative commands and configuration to create and deploy Kubernetes pod\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e (ideal for production environments)\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eExplain how Kubernetes handles application load balancing\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eCreate a ReplicaSet that maintains a set number of replicas\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-04014e1d-2797-4066-8ebe-5c619d986d33\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+GPXX0WG9ENV2+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"37d75bed-7ee0-4ed5-96d7-e8bcbceaffac\",\"productName\":\"Teamwork in face-to-face, remote and hybrid environments\",\"productSlug\":\"learn/teamwork/universitat-politecnica-de-valencia-teamwork-in-face-to-face-remote-and-hybrid-environments\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/37d75bed-7ee0-4ed5-96d7-e8bcbceaffac-0b0244e92979.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"\u003cp\u003eThis course provides skills to work in a team in a remote environment. This is already commonplace in all institutions and organizations, and will become more and more so. \u003c/p\u003e\\n\u003cp\u003eIn remote work environments, teamwork is more complex to perform. On the one hand, there is no established experience in the selection and activation of behaviors adapted to the remote environment, and on the other hand, it is not common to find specific courses where these new behaviors are reinforced. We must bear in mind that it is necessary to activate personal resources that are different from those activated in face-to-face environments. \u003c/p\u003e\\n\u003cp\u003eTherefore, we want to help prepare people who participate in work teams to adapt to these more digital work contexts. \u003c/p\u003e\\n\u003cp\u003eWe will build learning through digital resources, examples of experiences, self-diagnoses of the people enrolled and feedback from peers to complete a 360º information that allows us to draw an action plan to manage the acquired competence.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to work better in both face to face and remote teams.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCreate and structure digital teams\u003c/li\u003e\\n\u003cli\u003eActively cooperate with others in remote spaces\u003c/li\u003e\\n\u003cli\u003eStructure and classify the information generated by the team in order to retrieve and manage it efficiently\u003c/li\u003e\\n\u003cli\u003ePropose new ideas, processes or create solutions to solve team problems through digital technologies\u003c/li\u003e\\n\u003cli\u003eUse the collaboration features of software packages, web-based services and social networks to collaborate in teams\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-37d75bed-7ee0-4ed5-96d7-e8bcbceaffac\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+LCER201.1x_EN+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0d4cbce6-872e-4726-9ff8-d3668b3262de\",\"productName\":\"American Capitalism: A History\",\"productSlug\":\"learn/capitalism/cornell-university-american-capitalism-a-history\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0d4cbce6-872e-4726-9ff8-d3668b3262de-9622f57a932f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Business \u0026 Management\",\"History\"],\"partnerName\":[\"Cornell University\"],\"partnerKeys\":[\"CornellX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/99661642-a500-4988-bd1b-97877bd6e232-6903c8a95279.png\",\"fullDescription\":\"$177\",\"shortDescription\":\"Examine how economic development fueled the United States’ evolution from 13 backwater colonies to a global power.\",\"productOverview\":\"\u003cul\u003e\u003cli class=\\\"p1\\\"\u003e\u003cspan class=\\\"s1\\\"\u003eDescribe the development of American capitalism as a historical process that emerged from political choices, business cultures, entrepreneurial decisions, and technological transformations.\u003c/span\u003e\u003c/li\u003e\\n\\t\u003cli class=\\\"p1\\\"\u003e\u003cspan class=\\\"s1\\\"\u003eRecognize and criticize the policy programs derived from different analyses of capitalism.\u003c/span\u003e\u003c/li\u003e\\n\\t\u003cli class=\\\"p1\\\"\u003e\u003cspan class=\\\"s1\\\"\u003eDescribe how government policies contribute to market success and failure.\u003c/span\u003e\u003c/li\u003e\\n\\t\u003cli class=\\\"p1\\\"\u003e\u003cspan class=\\\"s1\\\"\u003eExercise reading, writing, and analytical skills vital to historical interpretation.\u003c/span\u003e\u003c/li\u003e\\n\\t\u003cli class=\\\"p1\\\"\u003e\u003cspan class=\\\"s1\\\"\u003eDisplay a critical sense of how capitalism is not a static economic system but changes over time.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0d4cbce6-872e-4726-9ff8-d3668b3262de\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:CornellX+HIST1514x+1T2015\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b4e63dc2-8886-4b8a-ac5a-e0b455cb7874\",\"productName\":\"Introduction to Payment Gateway\",\"productSlug\":\"learn/ecommerce/state-bank-of-india-introduction-to-payment-gateway\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b4e63dc2-8886-4b8a-ac5a-e0b455cb7874-6462b74e0508.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"State Bank of India\"],\"partnerKeys\":[\"State-Bank-of-India\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6fc80e42-95b2-47c6-a5e8-8d76f104cebd-dd0954c7476b.png\",\"fullDescription\":\"$178\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eThis course is designed to provide the readers with an understanding of Payment Gateways, various payment gateway models, the critical security measures involved in processing online transactions, common types of online payment frauds and the future trends in payment gateways.\u003c/span\u003eThe course would be useful to business owners, developers, and others interested in the world of digital payments.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003ea.\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e The essentials of a Payment Gateway and the various stake holders involved in the online payment process.\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eb.\u003cspan lang=\\\"EN-US\\\"\u003e Various models of payment gateways, their relative advantages and disadvantages. \u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003ec.\u003cspan lang=\\\"EN-US\\\"\u003e Security of payment gateways. Essentials of PCIDSS compliance and SSL certificates\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003ed.\u003cspan lang=\\\"EN-US\\\"\u003e Prevention of frauds in online commerce\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003ee.\u003cspan lang=\\\"EN-US\\\"\u003e Impact of emerging technologies on payment gateways and the outlook for future.\u003c/span\u003e\u003c/p\u003e\",\"objectId\":\"course-b4e63dc2-8886-4b8a-ac5a-e0b455cb7874\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:State-Bank-of-India+SBIIT008x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4aafe81c-c340-4fd5-b3db-cc47f0effd36\",\"productName\":\"Introduction to Industrial Image Processing\",\"productSlug\":\"learn/engineering/rwth-aachen-university-icovis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4aafe81c-c340-4fd5-b3db-cc47f0effd36-e5f23b4a04af.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"RWTH Aachen University\"],\"partnerKeys\":[\"RWTHx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8607c85e-2a12-4c51-8906-3a67848cf2a7-3e0a310f77c3.png\",\"fullDescription\":\"\u003cp\u003eThe aim of this course is to provide an overview of current technologies and trends in image processing and their industrial application. The theory and practice of industrial image processing is covered using the complete chain - from image creation and image processing to the derivation of a measurement result or decision. You will learn the basics and skills for model-based evaluation of spatially resolved image information so that not only innovative but also robust solutions for industrial applications can be implemented.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThe MOOC teaches the basics of industrial image processing - the hardware components, common algorithms and applications.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBasics of industrial image acquisition and processing\u003c/li\u003e\\n\u003cli\u003eOverview over the components of machine vision systems\u003c/li\u003e\\n\u003cli\u003eAlgorithms for feature amplification and detection in images\u003c/li\u003e\\n\u003cli\u003eIntroduction to detection and classification of objects in images\u003c/li\u003e\\n\u003cli\u003eBasics of photogrammetry for extracting 3D information from 2D images\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4aafe81c-c340-4fd5-b3db-cc47f0effd36\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RWTHx+ICOVISx+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"07c9c4fa-192f-434d-9ab6-d4d1d7dbef2b\",\"productName\":\"Quantum Computing for Your Classroom 10-12\",\"productSlug\":\"learn/quantum-computing/university-of-british-columbia-quantum-computing-for-your-classroom-10-12\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/07c9c4fa-192f-434d-9ab6-d4d1d7dbef2b-e88c9257ce14.png\",\"productType\":\"Course\",\"attributes\":[\"Physics\",\"Computer Science\"],\"partnerName\":[\"University of British Columbia\"],\"partnerKeys\":[\"UBCx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eQuantum computing is one of the primary emerging new technologies of our time. Currently there is an “understanding gap” between scientists engaged in research and the business community looking to transition research to commercialization. This course seeks to help bridge that gap by providing activities and knowledge of quantum computing that high school educators can integrate into their existing classrooms, providing the children of today with the futureproof skills needed for tomorrow.\u003c/span\u003e\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eQuantum Computing for Your Classroom is an activity focused, self-paced course designed to help educators integrate an exciting new field into their physics and computer science classrooms.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$179\",\"objectId\":\"course-07c9c4fa-192f-434d-9ab6-d4d1d7dbef2b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UBCx+QC1012+2T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3ee1770c-91c9-44ee-93a8-c50375b57713\",\"productName\":\"Guided Project: Create and Deploy Your First Kubernetes Pod\",\"productSlug\":\"learn/kubernetes/ibm-guided-project-create-and-deploy-your-first-kubernetes-pod\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3ee1770c-91c9-44ee-93a8-c50375b57713-fdf5687a6143.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$17a\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eWhether you’re a beginner or intermediate developer, in just about one hour you can gain hands-on skills with Kubernetes, one of the world’s most popular an essential system for managing containerized applications.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAfter completing this hands-on guided project, you'll be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse the kubectl CLI to extract cluster and pod information\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse imperative and declarative commands and configuration to create and deploy Kubernetes pod\u003c/span\u003e\u003cspan lang=\\\"EN-US\\\"\u003e (ideal for production environments)\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eExplain how Kubernetes handles application load balancing \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eCreate a ReplicaSet that maintains a set number of replicas\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-3ee1770c-91c9-44ee-93a8-c50375b57713\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+GPXX0WG9EN+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7b6d9bbf-3720-40ac-8b13-9b8dd774e10e\",\"productName\":\"Global Marketing Strategy\",\"productSlug\":\"learn/marketing-strategy/arizona-state-university-global-marketing-strategy\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7b6d9bbf-3720-40ac-8b13-9b8dd774e10e-a7398635a4fe.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Arizona State University\"],\"partnerKeys\":[\"ASUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/766a3716-f962-425b-b56e-e214c019b229-1fd2c1d49461.png\",\"fullDescription\":\"$17b\",\"shortDescription\":\"Understand how to assess global market opportunities and challenges while developing successful global marketing strategies.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eTo evaluate and build economic, functional, experiential, and social value or a combination thereof within the complex and dynamic political/legal, economic, competitive, technological, cultural, and other environmental forces that managers face in the global arena\u003c/li\u003e\\n\\t\u003cli\u003eTo clarify the scope and challenges of global marketing\u003c/li\u003e\\n\\t\u003cli\u003eTo assess the impact of external forces on global marketing decisions\u003c/li\u003e\\n\\t\u003cli\u003eTo develop a disruptive positioning strategy for a firm that is struggling to differentiate itself from competition\u003c/li\u003e\\n\\t\u003cli\u003eAwareness of alternative market-entry strategies.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7b6d9bbf-3720-40ac-8b13-9b8dd774e10e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ASUx+TGM551x+1T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"37e67dee-6b18-4cc2-a489-247eb377fc71\",\"productName\":\"Fundamentals of Digital Marketing\",\"productSlug\":\"learn/digital-marketing/the-university-of-maryland-college-park-fundamentals-of-digital-marketing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/37e67dee-6b18-4cc2-a489-247eb377fc71-8ef8ee01ac70.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$17c\",\"shortDescription\":\"\u003cp\u003eLearn the varied and changing approaches to digital marketing, such as mobile and omnichannel marketing and attribution and marketing mix modeling to inform your organization’s digital marketing strategy.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e1.1 Digital Marketing Strategy\u003c/p\u003e\\n\u003cp\u003e1.2 Inbound and Outbound Marketing (also touching on social media marketing)\u003c/p\u003e\\n\u003cp\u003e1.3 Mobile Marketing - Apps and Promotions\u003c/p\u003e\\n\u003cp\u003e1.4 Multi-Sided Platforms\u003c/p\u003e\\n\u003cp\u003e1.5 Overview of OmniChannel Marketing\u003c/p\u003e\\n\u003cp\u003e1.6 Attribution and Marketing Mix Modeling\u003c/p\u003e\",\"objectId\":\"course-37e67dee-6b18-4cc2-a489-247eb377fc71\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+DM01+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2d87cc8a-d13a-412e-89d8-f33a10de75c2\",\"productName\":\"Digital Humanities in Practice: From Research Questions to Results\",\"productSlug\":\"learn/metadata/harvard-university-digital-humanities-in-practice-from-research-questions-to-results\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2d87cc8a-d13a-412e-89d8-f33a10de75c2-196804cea530.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$17d\",\"shortDescription\":\"\u003cp\u003eCombine literary research with data science to find answers in unexpected ways. Learn basic coding tools to help save time and draw insights from thousands of digital documents at once.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, learners will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eUnderstand which digital methods are most suitable to meaningfully analyze large databases of text\u003c/li\u003e\\n\u003cli\u003eIdentify the resources needed to complete complex digital projects and learn about their possible limitations\u003c/li\u003e\\n\u003cli\u003eDownload existing datasets and create new ones by scraping websites and using APIs\u003c/li\u003e\\n\u003cli\u003eEnrich metadata and tag text to optimize the results of your analysis\u003c/li\u003e\\n\u003cli\u003eAnalyze thousands of books with digital methods such as topic modeling, vector models, and concept search\u003c/li\u003e\\n\u003cli\u003eTest your knowledge by writing and editing code in Python, and use these skills to explore new methods of search\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2d87cc8a-d13a-412e-89d8-f33a10de75c2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HarvardX+DH102+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"df686c9a-ea5d-421c-8889-9b8f82d120cd\",\"productName\":\"Environmental Protection and Sustainability\",\"productSlug\":\"learn/environmental-science/israelx-environmental-protection-and-sustainability\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/df686c9a-ea5d-421c-8889-9b8f82d120cd-ea1ce2b8bc06.png\",\"productType\":\"Course\",\"attributes\":[\"Environmental Studies\"],\"partnerName\":[\"IsraelX\"],\"partnerKeys\":[\"IsraelX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"$17e\",\"shortDescription\":\"\u003cp\u003eUncover better solutions to help manage a wide range of environmental problems and challenges facing our world today.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eBasic principles of environmental protection\u003c/li\u003e\\n\u003cli\u003eBiodiversity conservation practices\u003c/li\u003e\\n\u003cli\u003eSolutions for water and air pollution challenges\u003c/li\u003e\\n\u003cli\u003eMajor opportunities for sustainability\u003c/li\u003e\\n\u003cli\u003eHow human development can be sustainable\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-df686c9a-ea5d-421c-8889-9b8f82d120cd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+EPS1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"38e678c9-527f-42af-bb44-174c3bb73f93\",\"productName\":\"Sustainable Construction Management\",\"productSlug\":\"learn/construction/the-university-of-maryland-college-park-sustainable-construction-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/38e678c9-527f-42af-bb44-174c3bb73f93-08939286c367.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Business \u0026 Management\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"The University of Maryland, College Park\",\"University System of Maryland\"],\"partnerKeys\":[\"UMD\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ac5b634b-1d88-43d5-8199-1142a2e4fc96-0f3719f6fbd4.png\",\"fullDescription\":\"$17f\",\"shortDescription\":\"\u003cp\u003eLearn Sustainable Construction Management practices, and how to implement a sustainable green project. Sustainability has become essential for private and public owners who want to incorporate the economic, social, and environmental aspects of their project to improve the triple bottom line.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow the construction industry is adapting to sustainability\u003c/li\u003e\\n\u003cli\u003eIndustry leaders in sustainability\u003c/li\u003e\\n\u003cli\u003eLife cycle cost analysis of sustainable projects \u003c/li\u003e\\n\u003cli\u003eHow the latest construction process can be sustainable\u003c/li\u003e\\n\u003cli\u003eHow to manage the environmental impact of a project\u003c/li\u003e\\n\u003cli\u003eSustainable Facility Management\u003c/li\u003e\\n\u003cli\u003eIs sustainable development cost effective?\u003c/li\u003e\\n\u003cli\u003eUnderstanding natural resources in sustainable development projects\u003c/li\u003e\\n\u003cli\u003eProject management controls in sustainable construction management projects\u003c/li\u003e\\n\u003cli\u003eHow to minimize construction waste\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-38e678c9-527f-42af-bb44-174c3bb73f93\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+CMAN-4+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"af33e274-ff32-4f1a-ab60-49d0884049c1\",\"productName\":\"Relational Database Management Systems\",\"productSlug\":\"learn/databases/university-of-maryland-baltimore-county-relational-database-management-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/af33e274-ff32-4f1a-ab60-49d0884049c1-8366a549e767.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Maryland Baltimore County\",\"University System of Maryland\"],\"partnerKeys\":[\"UMBC\",\"USMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/097ca727-d3f4-43d0-8baf-9baf23c1314b-29d4b0840da2.png\",\"fullDescription\":\"\u003cp\u003eThe Relational Database Management Systems course provides you with a basic understanding of relational databases. You will create databases and gain real-world experience with several popular database technologies and systems. Furthermore, you will learn how to create database tables and store information in them – while developing a foundational understanding of various database design and schema topics to help decrease data retrieval.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eLearn how to create and interact with a relational database. The course includes Data Definition Language (DDL) used for database creation and Data Manipulation Language (DML) used for inserting, updating and deleting data in the database.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eHow to implement databases in multiple database management systems.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCreate database tables with the appropriate columns and data types.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEnsure data integrity with foreign keys.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eIncrease performance with indexes.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCreate stored procedures.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eCreate database triggers.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstablish database backups and restores.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-af33e274-ff32-4f1a-ab60-49d0884049c1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:USMx+IS6331+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7566ec20-b7cd-4300-8c94-7eebfd01cb88\",\"productName\":\"Guided Project: Create your first RESTful API with Express V2\",\"productSlug\":\"learn/rest-api/ibm-guided-project-create-your-first-restful-api-with-express-v2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7566ec20-b7cd-4300-8c94-7eebfd01cb88-074edead70c5.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$180\",\"shortDescription\":\"\u003cp\u003eIn under one hour, level up your JavaScript skills using Express.js to build a simple REST API. This hands-on guided project is ideal for developers interested in learning how to create APIs easily.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAfter completing this hands-on guided project, you'll be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRecognize RESTful design principles\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse the Express framework to implement a server-side application\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDemonstrate a high-level understanding of HTTP requests and responses\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDevelop and test an API while following good design practices\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7566ec20-b7cd-4300-8c94-7eebfd01cb88\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+GPXX0F2FENV2+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a302ba42-9b80-479a-9059-44c76a325a48\",\"productName\":\"Transmission electron microscopy for materials science\",\"productSlug\":\"learn/physics/ecole-polytechnique-federale-de-lausanne-transmission-electron-microscopy-for-materials-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a302ba42-9b80-479a-9059-44c76a325a48-e158d403339c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Physics\"],\"partnerName\":[\"École polytechnique fédérale de Lausanne\"],\"partnerKeys\":[\"EPFLx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6f244695-7416-4c6c-a2a9-97769b6acb56-a2dc5dd735ab.png\",\"fullDescription\":\"$181\",\"shortDescription\":\"\u003cp\u003eLearn about the fundamentals of transmission electron microscopy in materials sciences: you will be able to understand papers where TEM has been used and have the necessary theoretical basis for taking a practical training on the TEM.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eYou will be able to understand papers where TEM has been used and have the necessary theoretical basis for taking a practical training on the TEM.\u003c/p\u003e\",\"objectId\":\"course-a302ba42-9b80-479a-9059-44c76a325a48\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:EPFLx+electron-microscopy-1+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"45aba65f-75e9-4d99-b567-6a35cd6f7efa\",\"productName\":\"What to Finance in Health and at What Price?\",\"productSlug\":\"learn/finance/inter-american-development-bank-what-to-finance-in-health-and-at-what-price\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/45aba65f-75e9-4d99-b567-6a35cd6f7efa-dc8115218227.png\",\"productType\":\"Course\",\"attributes\":[\"Health \u0026 Safety\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Inter-American Development Bank\"],\"partnerKeys\":[\"IDBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f87a494a-5b61-4c1c-b9ff-0fefec519326-6ea0a51177d0.png\",\"fullDescription\":\"$182\",\"shortDescription\":\"\u003cp\u003eLearn from more than 40 experts from around the world about two key strategies to improve the efficiency of public spending on health and support countries to move towards Universal Health Coverage (UHC): explicit priority setting in health and instruments to achieve more affordable prices for medicines.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIdentify the economic and social benefits associated with implementing explicit priority setting mechanisms in health and interventions that help obtain more affordable prices for medicines, recognizing their contribution to the goal of achieving universal health coverage (UHC).\u003c/p\u003e\",\"objectId\":\"course-45aba65f-75e9-4d99-b567-6a35cd6f7efa\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IDBx+IDB25.1x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d2868c46-5a91-4766-a2a4-891bcc5af93b\",\"productName\":\"Building a Cybersecurity Toolkit\",\"productSlug\":\"learn/cybersecurity/university-of-washington-building-a-cybersecurity-toolkit\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d2868c46-5a91-4766-a2a4-891bcc5af93b-1375602e8c65.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Washington\"],\"partnerKeys\":[\"UWashingtonX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/a7530503-bd7f-49c4-afbe-22824a191282-25b122e47f8d.png\",\"fullDescription\":\"$183\",\"shortDescription\":\"\u003cp\u003eDevelop a set of skills and characteristics that expand beyond technical proficiency to become a successful cybersecurity professional.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eBy the end of this course, you will be able to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eIdentify what tools and skills are necessary to form today’s Professional Cybersecurity toolkit;\u003c/li\u003e\\n\u003cli\u003eMatch appropriate tools to different purposes in the cybersecurity management process;\u003c/li\u003e\\n\u003cli\u003eSynthesize insights gained in course exploration of toolkit skill sets, working toward self-evaluation of talents and interests aligned to cybersecurity’s array of roles\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d2868c46-5a91-4766-a2a4-891bcc5af93b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UWashingtonX+CYB003x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"975987fb-7051-4d64-bb3a-14eb62ff4076\",\"productName\":\"Microrobotics\",\"productSlug\":\"learn/engineering/eth-zurich-microrobotics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/975987fb-7051-4d64-bb3a-14eb62ff4076-5d7eebab6f73.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"ETH Zurich\"],\"partnerKeys\":[\"ETHx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/9c5eef81-4eac-4f0d-9ca1-c668ccce5d73-af28b99903dc.png\",\"fullDescription\":\"$184\",\"shortDescription\":\"\u003cp\u003eThe first MOOC on robots at small scale. You will learn the concepts, functioning principles, building methods and state-of-the-art applications of microrobots.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eYou will learn what a microrobot is, how it functions, and in which way you could build and control a microrobot. You will also learn the state-of-the-art research topics and applications of microrobots and challenges in building them.\u003c/p\u003e\",\"objectId\":\"course-975987fb-7051-4d64-bb3a-14eb62ff4076\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ETHx+MR-01x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"797b793b-55ed-4728-bce0-83a93054f9c7\",\"productName\":\"Guided Project: Create your first RESTful API with Express\",\"productSlug\":\"learn/javascript/ibm-guided-project-create-your-first-restful-api-with-express\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/797b793b-55ed-4728-bce0-83a93054f9c7-89e7cc1968a5.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$185\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eIn under one hour, level up your JavaScript skills using Express.js to build a simple REST API. This hands-on guided project is ideal for developers interested in learning how to create APIs easily.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAfter completing this hands-on guided project, you'll be able to:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eRecognize RESTful design principles\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eUse the Express framework to implement a server-side application\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDemonstrate a high-level understanding of HTTP requests and responses\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eDevelop and test an API while following good design practices\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-797b793b-55ed-4728-bce0-83a93054f9c7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+GPXX0F2FEN+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7b72aca9-0f77-428a-b6d1-e8aeffe8c89b\",\"productName\":\"Fundamentals of Digital Marketing, Social Media, and E-Commerce\",\"productSlug\":\"learn/business-administration/the-wharton-school-of-the-university-of-pennsylvania-fundamentals-of-digital-marketing-social-media-and\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7b72aca9-0f77-428a-b6d1-e8aeffe8c89b-0f9e55429565.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"The Wharton School of the University of Pennsylvania\"],\"partnerKeys\":[\"Wharton\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/06788cb1-4ba8-4349-aa66-e11ac8b644ef-216362adda56.png\",\"fullDescription\":\"$186\",\"shortDescription\":\"Build the marketing skills you need to succeed in the Digital Economy from Wharton, consistently ranked #1 globally for marketing education.\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eHow to leverage new models in business and e-commerce to increase profitability\u003c/li\u003e\\r\\n\u003cli\u003eSuccessful Social media and digital marketing techniques\u003c/li\u003e\\r\\n\u003cli\u003eReal-world application of digital marketing and e-commerce methods\u003c/li\u003e\\r\\n\u003cli\u003eHow to market yourself and your products more effectively and efficiently\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-7b72aca9-0f77-428a-b6d1-e8aeffe8c89b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:Wharton+DigitalMarketing1.1x+3T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"dcd83204-dbf4-4124-a09a-92c1ab3cedc7\",\"productName\":\"Industrial IoT Fundamentals on AWS\",\"productSlug\":\"learn/amazon-web-services-aws/amazon-web-services-industrial-iot-fundamentals-on-aws\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/dcd83204-dbf4-4124-a09a-92c1ab3cedc7-0fee93278ab8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Amazon Web Services\"],\"partnerKeys\":[\"AWS\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/31705519-3082-4c18-aa23-1caf9a038b1c-21ab36bd68bc.png\",\"fullDescription\":\"$187\",\"shortDescription\":\"\u003cp\u003eIn this course, you'll get an Introduction to Industrial IoT and understand the profound difference between IoT and IIoT. Additionally, you'll get an introduction to IoT Greengrass, a powerful software suite that extends the benefits of AWS IoT Core to the edge.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIntroduction to Industrial IoT\u003c/li\u003e\\n\u003cli\u003eWhat is the difference between IoT vs IIoT\u003c/li\u003e\\n\u003cli\u003eDifference between sensors, gateways and cloud things\u003c/li\u003e\\n\u003cli\u003eIntroduction to AWS IoT Greengrass\u003c/li\u003e\\n\u003cli\u003eUse of Machine Learning in IIoT\u003c/li\u003e\\n\u003cli\u003eSecurity in Industrial IoT\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-dcd83204-dbf4-4124-a09a-92c1ab3cedc7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AWS+IIOT-1+3T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7533a3f2-05f6-42fd-aa16-bdf2ee465a93\",\"productName\":\"Digital Networks Essentials\",\"productSlug\":\"learn/computer-networking/imt-digital-networks-essentials\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7533a3f2-05f6-42fd-aa16-bdf2ee465a93-699b7e560318.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"IMT\"],\"partnerKeys\":[\"IMTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/55a6dc9c-5bc9-45e1-be34-a94bcc87bb15-c3509d119e45.png\",\"fullDescription\":\"\u003cp\u003eEvery business today depends on connectivity, and now there is increasing demand for engineers who can design, develop and manage data networks – and keep them secure as well.\u003c/p\u003e\\n\u003cp\u003eThis applied computer science MOOC will give you the hands-on know-how to master the network technologies used every day to communicate and access information via the web and phones.\u003c/p\u003e\\n\u003cp\u003eYou’ll learn the vocabulary, concepts and mechanisms common to all digital networks, and explore the TCP, UDP and IP protocols that support all online communications.\u003c/p\u003e\\n\u003cp\u003eYou’ll also see how a global network is organized and how its components work together, and understand the importance of standards and protocols. This course is designed for students or professionals with a background in science or computing.\u003c/p\u003e\\n\u003cp\u003ePractical coursework is carried out in a Unix virtual environment that can be installed on any modern computer.\u003c/p\u003e\\n\u003cp\u003eSign up now and sharpen up your network knowledge!\u003c/p\u003e\",\"shortDescription\":\"Learn through hands-on experience how data flows through the internet, your phone and the IP protocols that support all online communications.\",\"productOverview\":\"\u003cul\u003e\u003cli\u003eHow to analyze the properties of a service and determine its network needs\u003c/li\u003e\\n\\t\u003cli\u003eThe essentials of network architectures, mechanisms (flow control, error and loss correction, delay management, etc.), protocol stacks and more\u003c/li\u003e\\n\\t\u003cli\u003eAll about the IP, TCP and UDP Internet protocols and their properties (quality of service, congestion management, etc.)\u003c/li\u003e\\n\\t\u003cli\u003eThe right way to develop an addressing plan for an organization, choose an appropriate routing algorithm and configure the routing\u003c/li\u003e\\n\\t\u003cli\u003eHow to use a network analyzer (Wireshark, in this case)\u003c/li\u003e\\n\\t\u003cli\u003eReading and interpreting the contents of a frame captured on a network\u003c/li\u003e\\n\\t\u003cli\u003eHow to read and understand a data or telecom network standard\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7533a3f2-05f6-42fd-aa16-bdf2ee465a93\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IMTx+NET01x+1T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1db521ca-6c5f-4067-a1f8-87dd44968ec0\",\"productName\":\"Discrete Time Signals and Systems\",\"productSlug\":\"learn/computer-programming/rice-university-discrete-time-signals-and-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1db521ca-6c5f-4067-a1f8-87dd44968ec0-d0679b25f642.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\",\"Engineering\"],\"partnerName\":[\"Rice University\"],\"partnerKeys\":[\"RICEx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/3e0f3544-6626-4373-afb9-b21e0e66a571-9317ec003c4d.png\",\"fullDescription\":\"$188\",\"shortDescription\":\"\u003cp\u003eEnter the world of signal processing: analyze and extract meaning from the signals around us!\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\r\\n\u003cli\u003eTypes of Fundamental Signals\u003c/li\u003e\\r\\n\u003cli\u003eVector Description of Signals \u003c/li\u003e\\r\\n\u003cli\u003eIntroduction to Discrete Time Systems\u003c/li\u003e\\r\\n\u003cli\u003eConvolution\u003c/li\u003e\\r\\n\u003cli\u003eThe Discrete Fourier Transform (DFT) and Fast Fourier Transform (FFT)\u003c/li\u003e\\r\\n\u003cli\u003eThe Discrete-Time Fourier Transform (DTFT)\u003c/li\u003e\\r\\n\u003cli\u003eThe Z-Transform\u003c/li\u003e\\r\\n\u003cli\u003eIntroduction to Analysis and Design of Discrete-Time Filters\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-1db521ca-6c5f-4067-a1f8-87dd44968ec0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RiceX+ELEC301x+2T2020a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7c7c03e7-e17b-43f7-9401-d3b3e30add4b\",\"productName\":\"Software Development Capstone Project\",\"productSlug\":\"learn/software-development/university-of-british-columbia-software-development-capstone-project\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7c7c03e7-e17b-43f7-9401-d3b3e30add4b-f91ef80ad30f.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of British Columbia\"],\"partnerKeys\":[\"UBCx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eac96c61-1462-4084-a0b2-12525b74a9e1-8377159ff774.png\",\"fullDescription\":\"$189\",\"shortDescription\":\"\u003cp\u003eApply all the skills you have learned to work through the challenging and rewarding task of designing a full-stack system.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eFull-stack web development using Typescript and Node.js\u003c/li\u003e\\n\u003cli\u003eHow teams of developers build software\u003c/li\u003e\\n\u003cli\u003eAgile methodology\u003c/li\u003e\\n\u003cli\u003eHands on experience building a non-trivial software system\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7c7c03e7-e17b-43f7-9401-d3b3e30add4b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UBCx+SoftEngPrjx+1T2018\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4be7e80c-d742-419c-9c75-aede8776325b\",\"productName\":\"Health Informatics Technology in Population Healthcare Analytics\",\"productSlug\":\"learn/health-informatics/doane-university-health-informatics-technology-in-population-healthcare-analytics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4be7e80c-d742-419c-9c75-aede8776325b-46fb792b00e6.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Medicine\"],\"partnerName\":[\"Doane University\"],\"partnerKeys\":[\"DoaneX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e9e90c9f-85ec-4ae5-bea8-2ecae2258446-85b6b8c0a212.png\",\"fullDescription\":\"$18a\",\"shortDescription\":\"\u003cp\u003eExplore health informatics solutions that answer population health challenges.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDefine Population Health, Health Informatics and Public Health\u003c/li\u003e\\n\u003cli\u003eDescribe the difference and connection between Population Health and Informatics\u003c/li\u003e\\n\u003cli\u003eCompare how population health is being managed through Health Informatics\u003c/li\u003e\\n\u003cli\u003eApply the concepts of informatics to understand how healthcare is changing the health of the population\u003c/li\u003e\\n\u003cli\u003eDiscuss emerging trends in health informatics\u003c/li\u003e\\n\u003cli\u003eRecognize informatics solutions for public health challenges\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4be7e80c-d742-419c-9c75-aede8776325b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DoaneX+HPH-604x+2T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"211b771f-ee6b-4217-a112-2e094fad6d9d\",\"productName\":\"Healthcare Analytics and Decision Making\",\"productSlug\":\"learn/healthcare/doane-university-healthcare-analytics-and-decision-making\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/211b771f-ee6b-4217-a112-2e094fad6d9d-e1e0b0ef656e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\",\"Medicine\"],\"partnerName\":[\"Doane University\"],\"partnerKeys\":[\"DoaneX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e9e90c9f-85ec-4ae5-bea8-2ecae2258446-85b6b8c0a212.png\",\"fullDescription\":\"$18b\",\"shortDescription\":\"\u003cp\u003eHealthcare leaders deal with important challenges that can affect public health. Learn about health informatics solutions and financial systems needed to manage planning, quality assurance, risk management, and evidence-based decision-making.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the concepts around Health Informatics and how it affects Public and Population Health.\u003c/li\u003e\\n\u003cli\u003eCompare how Health Informatics is being used around the world in healthcare systems .\u003c/li\u003e\\n\u003cli\u003eUse informatics to evaluate current healthcare practices.\u003c/li\u003e\\n\u003cli\u003eDiscuss emerging trends in health informatics.\u003c/li\u003e\\n\u003cli\u003eHow to evaluate the relevance of economics in all aspects of healthcare.\u003c/li\u003e\\n\u003cli\u003eHow to analyze economic concepts and models as they apply to healthcare.\u003c/li\u003e\\n\u003cli\u003eHow to identify the diverse aspects of healthcare financing.\u003c/li\u003e\\n\u003cli\u003eHow to assess economic problems in order to develop and implement economic policy.\u003c/li\u003e\\n\u003cli\u003eHow to evaluate the economic advantages and policy options of healthcare market reform.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-211b771f-ee6b-4217-a112-2e094fad6d9d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DoaneX+HCA-621x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b682f97a-df7e-498a-826d-d11cad29f1a7\",\"productName\":\"Financial information and its analysis\",\"productSlug\":\"learn/financial-analysis/tecnologico-de-monterrey-financial-information-and-its-analysis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b682f97a-df7e-498a-826d-d11cad29f1a7-64e92eb0586b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$18c\",\"shortDescription\":\"\u003cp\u003eApplies accounting and financial fundamentals to assess the financial situation of the company and inform the decision-making process.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eThrough this course you will :\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eAcquire the essential knowledge for the accounting management and financial information\u003c/li\u003e\\n\u003cli\u003eKnow healthy financials of the company and decide on pricing structures, rent vs buy, sales conditions, operating cycle, managing working capital and more.\u003c/li\u003e\\n\u003cli\u003eBegin to read the financial information of companies to understand their operating strategy and thus better understand possible future investment alternatives.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b682f97a-df7e-498a-826d-d11cad29f1a7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+EQ-FIA.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a1fc337f-c308-4379-9d6f-7c24eda51d91\",\"productName\":\"Health Informatics: The Cutting Edge\",\"productSlug\":\"learn/health-informatics/the-georgia-institute-of-technology-health-informatics-the-cutting-edge\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a1fc337f-c308-4379-9d6f-7c24eda51d91-50327dcdb32a.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Health \u0026 Safety\"],\"partnerName\":[\"The Georgia Institute of Technology\"],\"partnerKeys\":[\"GTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8537d31f-01b4-40fd-b652-e17b38eefe41-4c6537c07d54.png\",\"fullDescription\":\"\u003cp\u003eAdopting digital health records and sharing the data they contain is a critical step forward. However, since successful management of chronic disease must involve patients, using informatics tools and systems to engage them is now a major area of focus for academic and industry research and development. Much of our focus so far has been on the care of patients one at a time. Another major area of research and development involves the aggregation of data from large groups of patients to understand population (or public) health issues such as the factors external to traditional medicine that cause disease and that impact on our ability to treat it. Finally, digital health data is increasingly being used for research on methods to deploy predictive analytics to improve the diagnosis and treatment of disease as well as to run hospitals and health systems more cost effectively.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eSome of the key focus areas for health informatics research and development\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eWorking familiarity with the major health care data standards\u003c/li\u003e\\n\u003cli\u003eAwareness of the web-based tools for accessing the data standards\u003c/li\u003e\\n\u003cli\u003eHL7 as the global health care interoperability standards organization\u003c/li\u003e\\n\u003cli\u003eHL7 interoperability standards history\u003c/li\u003e\\n\u003cli\u003eThe HL7 interoperability standards that preceded FHIR\u003c/li\u003e\\n\u003cli\u003eThe FHIR interoperability standard\u003c/li\u003e\\n\u003cli\u003eThe SMART on FHIR EHR connected app platform\u003c/li\u003e\\n\u003cli\u003eFamiliarity with web based tools for learning and utilizing FHIR and SMART on FHIR\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a1fc337f-c308-4379-9d6f-7c24eda51d91\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GTx+HI2018xIII+1T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5f0e63ca-98e1-4886-9b88-9e2aa492895c\",\"productName\":\"Becoming an Entrepreneur\",\"productSlug\":\"learn/entrepreneurship/massachusetts-institute-of-technology-becoming-an-entrepreneur\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5f0e63ca-98e1-4886-9b88-9e2aa492895c-82e52818e9b9.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$18d\",\"shortDescription\":\"\u003cp\u003eLearn the business skills and startup mindset needed to embark on your entrepreneurial path from the premier program for aspiring entrepreneurs, MIT Launch.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eOvercoming the top myths of entrepreneurship\u003c/li\u003e\\n\u003cli\u003eDefining your goals as an entrepreneur and startup\u003c/li\u003e\\n\u003cli\u003eIdentifying business opportunities\u003c/li\u003e\\n\u003cli\u003ePerforming market research and choosing your target customer\u003c/li\u003e\\n\u003cli\u003eDesigning and testing your offering\u003c/li\u003e\\n\u003cli\u003ePlanning your business logistics, plus pitching and selling to customers\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5f0e63ca-98e1-4886-9b88-9e2aa492895c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+LaunchX+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a094878d-ba37-4f35-8bfd-fd1af00836ef\",\"productName\":\"Big Data Strategies to Transform Your Business\",\"productSlug\":\"learn/big-data/delft-university-of-technology-big-data-strategies-to-transform-your-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a094878d-ba37-4f35-8bfd-fd1af00836ef-1736801b5a6d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$18e\",\"shortDescription\":\"\u003cp\u003eMake your organization’s business strategy and model, as well as your own career path, future-proof by using big data’s disruptive power.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentify the stakeholders and characteristics of your sector in the era of big data\u003c/li\u003e\\n\u003cli\u003eIdentify potential big data induced changes in strategy, business model, organization and job descriptions\u003c/li\u003e\\n\u003cli\u003eSubstantially change existing strategy, business model, organization or adopt new ones as required\u003c/li\u003e\\n\u003cli\u003eFind and develop strategically important tasks for yourself in your organization\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a094878d-ba37-4f35-8bfd-fd1af00836ef\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+BD1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"793d5028-a6cd-4f51-a852-312a73f37ce6\",\"productName\":\"Introduction to Portuguese / Iniciação à Língua Portuguesa\",\"productSlug\":\"learn/language/fundacao-para-a-ciencia-e-a-tecnologia-iniciacao-a-lingua-portuguesa\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/793d5028-a6cd-4f51-a852-312a73f37ce6-e010c0186791.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Language\",\"Art \u0026 Culture\"],\"partnerName\":[\"Fundação para a Ciência e a Tecnologia\",\"Universidade do Porto\"],\"partnerKeys\":[\"PortugalX\",\"UPortoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ad746a32-a177-4d1c-ac53-dc5436b5a817-8bbbd729965c.png\",\"fullDescription\":\"$18f\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003e[EN] \u003cbr /\u003e\\r\\nIn this course, you will get to know Porto better in the company of a fun group of students and learn to communicate in Portuguese in basic everyday situations.\u003c/span\u003e\u003c/p\u003e\\r\\n\u003cp\u003e[PT] \u003cbr /\u003e\\r\\nNeste curso, ficará a conhecer melhor o Porto na companhia de um grupo de estudantes divertidos e aprenderá a comunicar em português em situações básicas do quotidiano.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e[EN]\u003c/p\u003e\\r\\n\u003cul\u003e\\r\\n\u003cli\u003e\u003cspan lang=\\\"EN-US\\\"\u003eprovide basic knowledge of the Portuguese language in basic everyday communication situations;\u003c/span\u003e\u003c/li\u003e\\r\\n\u003cli\u003eoffer basic linguistic and pragmatic contents;\u003c/li\u003e\\r\\n\u003cli\u003epresent some aspects of Portuguese culture;\u003c/li\u003e\\r\\n\u003cli\u003epromote opportunities for integration and cultural exchange.\u003c/li\u003e\\r\\n\u003c/ul\u003e\\r\\n\u003cp\u003e[PT] O que vai aprender\u003c/p\u003e\\r\\n\u003cul\u003e\\r\\n\u003cli\u003eproporcionar a aprendizagem inicial da língua portuguesa em situações básicas de comunicação quotidiana;\u003c/li\u003e\\r\\n\u003cli\u003eapresentar conteúdos linguísticos e pragmáticos básicos;\u003c/li\u003e\\r\\n\u003cli\u003edar a conhecer alguns aspetos da cultura portuguesa;\u003c/li\u003e\\r\\n\u003cli\u003epromover oportunidades de integração e de intercâmbio cultural.\u003c/li\u003e\\r\\n\u003c/ul\u003e\",\"objectId\":\"course-793d5028-a6cd-4f51-a852-312a73f37ce6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:PortugalX+ILP+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b2f8776c-dc19-4ed7-91e6-8f0d304e2495\",\"productName\":\"Psicologia dell'apprendimento\",\"productSlug\":\"learn/psychology/universita-degli-studi-di-napoli-federico-ii-psicologia-dell-apprendimento\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b2f8776c-dc19-4ed7-91e6-8f0d304e2495-4947ef87bef6.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$190\",\"shortDescription\":\"\u003cp\u003eUn’analisi delle diverse forme dell’apprendimento per comprendere come operiamo le nostre scelte, la natura profondamente esperienziale dei processi di apprendimento e lo stretto legame che questi hanno con il contesto in cui l’individuo è inserito\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eProcessi di apprendimento e strutture cognitive\u003c/li\u003e\\n\u003cli\u003eLe teorie dei processi di apprendimento\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eTechnology Enhanced Learning (TEL) e nuovi scenari di insegnamento/apprendimento\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eLearning processes and cognitive structures\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eLearning process theories\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eTechnology Enhanced Learning (TEL) and new scenarios for teaching/learning\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b2f8776c-dc19-4ed7-91e6-8f0d304e2495\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+Fed09+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"a43ffbc3-1353-478d-bc5b-06438fcfc403\",\"productName\":\"Introducción a los Sistemas de Información Gerencial (MIS): Una guía de supervivencia\",\"productSlug\":\"learn/information-systems/universidad-carlos-iii-de-madrid-introduccion-a-los-sistemas-de-informacion-gerencial-mis-una-guia-de-supervivencia\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/a43ffbc3-1353-478d-bc5b-06438fcfc403-b6db63c04e70.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ffbbf698-c445-4595-9466-b7cf8564a74f-329c8bde00db.png\",\"fullDescription\":\"$191\",\"shortDescription\":\"\u003cp\u003eObtén las habilidades y el conocimiento necesarios para tener éxito en un mundo corporativo dominado por los sistemas de información gerencial (SIG o MIS).\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eEntender los sistemas de información gerencial (MIS) y su papel en las organizaciones de hoy\u003c/li\u003e\\n\u003cli\u003eIdentificar cómo el MIS moldea y controla mi puesto de trabajo (el actual y el futuro puesto al que puedo querer optar) y cómo usar esta información para mejorar tu propio desempeño y satisfacción en el trabajo y mejorar tus perspectivas de carrera\u003c/li\u003e\\n\u003cli\u003eFamiliarizarte con las principales tendencias en infraestructuras MIS (Cloud, Big Data, ERPs, outsourcing) y cómo estas tendencias afectarán a los puestos de trabajo y a las estrategias de negocio\u003c/li\u003e\\n\u003cli\u003eSalvar la segunda \\\"brecha digital\\\", vinculada a los Sistemas de Información (una vez alcanzados los conocimientos básicos de informática), que existe en muchos empleos profesionales\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-a43ffbc3-1353-478d-bc5b-06438fcfc403\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UC3Mx+IM.2-ESx+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b2da2185-fbdb-404e-ac69-23077f18548a\",\"productName\":\"Introduzione ai circuiti elettrici\",\"productSlug\":\"learn/circuits/universita-degli-studi-di-napoli-federico-ii-introduzione-ai-circuiti-elettrici\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b2da2185-fbdb-404e-ac69-23077f18548a-47e7758d1e6e.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Engineering\"],\"partnerName\":[\"Università degli Studi di Napoli Federico II\"],\"partnerKeys\":[\"FedericaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0b3b2258-7f32-4fb1-807a-87c79543347a-6c8ff3bf8f98.png\",\"fullDescription\":\"$192\",\"shortDescription\":\"\u003cp\u003eUna introduzione allo studio dei circuiti elettrici, fondamentale nella formazione ingegneristica, per familiarizzare con un approccio sistematico e metodologico alla modellistica e all’analisi di sistemi complessi.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ei fondamenti della teoria dei circuiti elettrici\u003c/li\u003e\\n\u003cli\u003edescrizione delle grandezze elettriche di riferimento\u003c/li\u003e\\n\u003cli\u003edefinire il circuito con le sue leggi\u003c/li\u003e\\n\u003cli\u003eanalisi di circuiti lineari in condizioni di funzionamento stazionario, sinusoidale e dinamico\u003c/li\u003e\\n\u003cli\u003e\\n\u003cul\u003e\\n\u003cli\u003ethe fundamentals of electric circuit theory\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003ethe description of electric strength\u003c/li\u003e\\n\u003cli\u003edefine circuits and their laws\u003c/li\u003e\\n\u003cli\u003eanalysis of linear circuits under steady-state, sinusoidal and dynamic conditions.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b2da2185-fbdb-404e-ac69-23077f18548a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:FedericaX+Fed.X-43+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ab82335a-30fa-4f5e-820a-fa4b25f2e2f6\",\"productName\":\"Atención primaria en salud para Cáncer de Estómago\",\"productSlug\":\"learn/healthcare/pontificia-universidad-javeriana-atencion-primaria-en-salud-para-cancer-de-estomago\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ab82335a-30fa-4f5e-820a-fa4b25f2e2f6-385cc00985c1.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$193\",\"shortDescription\":\"\u003cp\u003eEste MOOC está dirigido a médicos del nivel primario de atención, con el fin de fortalecer o actualizar sus conocimientos y capacidades para la prevención, la detección, y el diagnóstico del cáncer de estómago, favoreciendo que también se tenga una mayor claridad sobre el manejo que deben brindar los servicios de atención primaria al paciente en las fases de tratamiento y recuperación del cáncer.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eApropiar la ruta de atención sobre el cáncer gástrico a través de la comprensión de sus conceptos claves, detección y modelo de atención adecuado para desarrollar una mejor articulación del paciente favoreciendo los resultados en salud.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eComprender los conceptos claves del cáncer de estómago mediante el reconocimiento de su epidemiología y factores de riesgo que permitan implementar estrategias para la prevención primaria.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eComprender el modelo de atención en cáncer de estómago mediante la identificación del abordaje diagnóstico y la ruta de atención definida para contrastar su alcance e impacto en los resultados en salud de los pacientes.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ab82335a-30fa-4f5e-820a-fa4b25f2e2f6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+C-APESPCDE+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b970ab78-9051-4efb-abc8-7ba9bf7ca07c\",\"productName\":\"Gestión inteligente de los destinos turísticos\",\"productSlug\":\"learn/tourism-management/universidad-del-rosario-gestion-inteligente-de-los-destinos-turisticos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b970ab78-9051-4efb-abc8-7ba9bf7ca07c-aa8adf41ac10.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\",\"Computer Science\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$194\",\"shortDescription\":\"\u003cp\u003eDescubre cómo las tecnologías de información y comunicación, junto con herramientas digitales, potencian la competitividad y sostenibilidad de destinos turísticos. Aprende gestión, liderazgo, promoción y análisis de datos, adquiere habilidades relevantes para una carrera en constante evolución e impulsa de manera eficiente destinos turísticos.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConocer los conceptos clave y las herramientas necesarias para la gestión inteligente de destinos turísticos, permitiendo impulsar su competitividad y sostenibilidad.\u003c/li\u003e\\n\u003cli\u003eIdentificar datos y estadísticas de manera efectiva en la toma de decisiones para la gestión de destinos turísticos, mejorando la eficiencia y el rendimiento.\u003c/li\u003e\\n\u003cli\u003eIdentificar las tecnologías emergentes y comprender cómo aplicarlas, para transformar y optimizar la gestión de destinos turísticos, garantizando una experiencia más eficiente y atractiva para los visitantes.\u003c/li\u003e\\n\u003cli\u003eRealizar un ejercicio práctico de aplicación de conocimientos sobre gestión inteligente de destinos turísticos, para motivar la generación de ideas que se puedan adaptar a contextos específicos corto, mediano o largo plazo.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b970ab78-9051-4efb-abc8-7ba9bf7ca07c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX115+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d435ec30-85b1-4ec5-ad81-42b835a373c8\",\"productName\":\"La Tecnología en Siembra Directa - Agricultura por ambientes\",\"productSlug\":\"learn/agriculture/universidad-nacional-de-cordoba-la-tecnologia-en-siembra-directa-agricultura-por-ambientes\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d435ec30-85b1-4ec5-ad81-42b835a373c8-97350cdef81a.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Biology \u0026 Life Sciences\",\"Science\",\"Engineering\"],\"partnerName\":[\"Universidad Nacional de Córdoba\"],\"partnerKeys\":[\"UNCordobaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/24d95e06-fead-4ef5-ad47-3a90f66157e8-acbda63564d5.png\",\"fullDescription\":\"$195\",\"shortDescription\":\"\u003cp\u003eEn este MOOC veremos cómo se logra la eficiencia del Sistema SD con el acompañamiento del desarrollo de maquinaria especialmente diseñada. Esto obliga a la industria avanzar en innovación que permita adaptarse a diferentes situaciones agroecológicas.\u003c/p\u003e\",\"productOverview\":\"$196\",\"objectId\":\"course-d435ec30-85b1-4ec5-ad81-42b835a373c8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UNCordobaX+SD004X+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9765b8b6-7bb1-4289-b67d-ce680b211552\",\"productName\":\"Herramientas para el Análisis de Big Data\",\"productSlug\":\"learn/data-analysis/tecnologico-de-monterrey-herramientas-para-el-analisis-de-big-data\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9765b8b6-7bb1-4289-b67d-ce680b211552-c8c6b12f4bb2.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$197\",\"shortDescription\":\"\u003cp\u003eConoce las herramientas para el procesamiento, modelación, análisis, almacenamiento y acceso de los datos. Aprende en este curso online los beneficios del cómputo en la nube para los proyectos de ciencia de datos en las organizaciones y conoce las herramientas más populares.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eLos objetivos de este curso en línea son los siguientes:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003ePresentar las diferentes herramientas tanto comerciales como de Open Source que permitan la manipulación, administración y análisis de datos.\u003c/li\u003e\\n\u003cli\u003eConocer que es una base de datos y su importancia en los proyectos de ciencia de datos.\u003c/li\u003e\\n\u003cli\u003eConocer los beneficios que los servicios del cómputo en la nube proveen a los proyectos de ciencia de datos.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9765b8b6-7bb1-4289-b67d-ce680b211552\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+CDHA.2X+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"52506a91-97cd-49b0-b419-bf2d5f8101a2\",\"productName\":\"Debates contemporáneos en género y sexualidad\",\"productSlug\":\"learn/gender-equity/universidad-del-rosario-debates-contemporaneos-en-genero-y-sexualidad\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/52506a91-97cd-49b0-b419-bf2d5f8101a2-4a73a4e0c795.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Humanities\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$198\",\"shortDescription\":\"\u003cp\u003eAnte activismos fundamentalistas, modelos hegemónicos de belleza y masculinidades violentas, los feminismos y activismos trans plantean otras formas de habitar el mundo desde el género y la sexualidad. Conoce más en este curso.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eReconocer la relevancia del neoliberalismo y el neoconservadurismo en la política sexual contemporánea.\u003c/li\u003e\\n\u003cli\u003e\\n\u003cul\u003e\\n\u003cli\u003eEntender el papel de las TIC en la formación de subjetividades sexuales y de género.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cul\u003e\\n\u003cli\u003eIdentificar el papel de las masculinidades en la profundización o cuestionamiento de órdenes jerárquicos\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003c/li\u003e\\n\u003cli\u003eIdentificar horizontes de justicia de movimientos sociales en género y sexualidad.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-52506a91-97cd-49b0-b419-bf2d5f8101a2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX119+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f01c7b0e-f6dd-4c3f-b2b0-5d307f7283f0\",\"productName\":\"Responsabilidad Social Corporativa y su impacto sobre la Gestión de la Tecnología de la Información\",\"productSlug\":\"learn/social-responsibility/open-education-consortium-responsabilidad-social-corporativa-y-su-impacto-sobre-la-gestion-de-la-tecnologia-de-la-informacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f01c7b0e-f6dd-4c3f-b2b0-5d307f7283f0.jpg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Open Education Consortium\"],\"partnerKeys\":[\"OECx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0d334838-fc50-4f0b-a103-8b6ff80d260b-505dd6e0e3ac.png\",\"fullDescription\":\"$199\",\"shortDescription\":\"Transformando las organizaciones hacia un liderazgo digital a través de la Responsabilidad Social Corporativa y Gobernanza Corporativa de TI, desde la Universidad Politécnica de Madrid.\",\"productOverview\":null,\"objectId\":\"course-f01c7b0e-f6dd-4c3f-b2b0-5d307f7283f0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:OECx+B1156+1T2015\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6d2f91f0-715c-4c78-ad89-beb5bdf75fc3\",\"productName\":\"Economía Digital – Aspectos Regulatorios\",\"productSlug\":\"learn/business-law/pontificia-universidad-javeriana-economia-digital-aspectos-regulatorios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6d2f91f0-715c-4c78-ad89-beb5bdf75fc3-07018c9eea56.jpg\",\"productType\":\"Course\",\"attributes\":[\"Social Sciences\",\"Law\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"El objetivo del programa es realizar una introducción a los temas legales que regulan y tienen efectos sobre la economía digital. De esta forma, el programa busca brindar a todos los profesionales que se relacionen con la economía digital las herramientas jurídicas necesarias para entender las leyes que se relacionan con la industria de la tecnología, las nuevas formas de entretenimiento y la información.\",\"shortDescription\":\"MOOC en español para enseñar aspectos legales de la economía digital y aprender cómo se puede cambiar el modo en el que se hacen los negocios.\",\"productOverview\":\"\u003cp\u003eEl resultado será generar un pensamiento y análisis crítico en los estudiantes, respecto de los retos propios de la nueva revolución económica que está ocurriendo como consecuencia del acelerado desarrollo de las tecnologías de la información y las comunicaciones. Así entonces, el estudiante tendrá conocimientos en materia de:\u003c/p\u003e\\n\\n\u003col\u003e\u003cli\u003eEntendimiento de los conceptos Sociedad de la Información, Economía Digital y Tecnologías de la Información y las Comunicaciones.\u003c/li\u003e\\n\\t\u003cli\u003ePrincipales normas que interactúan con los negocios propios de la economía digital.\u003c/li\u003e\\n\\t\u003cli\u003eAspectos prácticos regulatorios en materia de derechos de autor, derechos de publicidad, derecho de propiedad intelectual y normas de representación e imagen que interactúan con este tipo de negocios.\u003c/li\u003e\\n\\t\u003cli\u003eNormas que reglamentan las relaciones con los usuarios, en materia de protección al consumidor y el uso de la información de los mismos desde el punto de vista del derecho de Habeas Data.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-6d2f91f0-715c-4c78-ad89-beb5bdf75fc3\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+EcoDig.1602x.06+2T2017\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"759db122-3782-4f72-8215-67be70e4b2f8\",\"productName\":\"Fundamentos de Ciberseguridad: un enfoque práctico\",\"productSlug\":\"learn/cybersecurity/inter-american-development-bank-fundamentos-de-ciberseguridad-un-enfoque-practico\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/759db122-3782-4f72-8215-67be70e4b2f8-b7948b4d5a19.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Inter-American Development Bank\",\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"IDBx\",\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f87a494a-5b61-4c1c-b9ff-0fefec519326-6ea0a51177d0.png\",\"fullDescription\":\"$19a\",\"shortDescription\":\"\u003cp\u003e\u003cstrong\u003eAprende a pensar como un hacker, pero actúa como un experto en ciberseguridad.\u003c/strong\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLos principales conceptos sobre amenazas, como son el cibercrimen o la ciberguerra.\u003c/li\u003e\\n\u003cli\u003eTécnicas y herramientas aplicadas en informática forense.\u003c/li\u003e\\n\u003cli\u003eProcesos y herramientas de ingeniería inversa.\u003c/li\u003e\\n\u003cli\u003eConceptos y herramientas sobre la gestión de redes para ciberdefensa.\u003c/li\u003e\\n\u003cli\u003eTipos y características de malware y amenazas persistentes avanzadas (APTs).\u003c/li\u003e\\n\u003cli\u003eGestión de vulnerabilidades, junto con pruebas de penetración.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-759db122-3782-4f72-8215-67be70e4b2f8\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IDB_UC3Mx+IDB_UC3M.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6fe3e760-691f-4ca1-a98c-47cd8e77c1ec\",\"productName\":\"Fundamentos de Comunicaciones Ópticas\",\"productSlug\":\"learn/optics/universitat-politecnica-de-valencia-fundamentos-de-comunicaciones-opticas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6fe3e760-691f-4ca1-a98c-47cd8e77c1ec-eed8b0c4e057.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$19b\",\"shortDescription\":\"\u003cp\u003eSe tratan conceptos básicos de las comunicaciones ópticas como el guiado, los modos, la atenuación o la dispersión y el diseño de sistemas.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eEn este curso aprenderás los conceptos básicos relacionados con las comunicaciones ópticas:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComprenderás la importancia de las redes ópticas en la actualidad atendiendo a la evolución de la demanda y los servicios\u003c/li\u003e\\n\u003cli\u003eSe explicarán los fundamentos del guiado de la luz en la fibra óptica\u003c/li\u003e\\n\u003cli\u003eTrataremos las características de los modos propagados por fibras multimodo y monomodo\u003c/li\u003e\\n\u003cli\u003eSe estudiarán la atenuación y la dispersión, como efectos fundamentales de propagación en la fibra óptica, así como las limitaciones que éstos suponen en alcance y capacidad máxima\u003c/li\u003e\\n\u003cli\u003eSe explicará la generación de señal óptica en LEDs y láseres\u003c/li\u003e\\n\u003cli\u003eHablaremos de a detección y recuperación de la información transmitida por la fibra\u003c/li\u003e\\n\u003cli\u003eAprenderás a realizar los cálculos necesarios para diseñar un sistema de comunicaciones ópticas, con la posibilidad de emplear técnicas multicanal WDM o SCM en estos sistemas\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6fe3e760-691f-4ca1-a98c-47cd8e77c1ec\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+FCO201x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3bb6a986-a04d-4221-a48d-211a613c70a6\",\"productName\":\"Discursos visuales: análisis de imágenes digitales con contexto de género\",\"productSlug\":\"learn/gender-studies/pontificia-universidad-javeriana-discursos-visuales-analisis-de-imagenes-digitales-con-contexto-de-genero\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3bb6a986-a04d-4221-a48d-211a613c70a6-4e51d3778627.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Design\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$19c\",\"shortDescription\":\"\u003cp\u003eAnalicemos las metáforas y estereotipos de género que se reproducen comúnmente en las piezas gráficas que circulan en redes sociales y cómo reorientarlas a nuevas propuestas.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e• Comprender las nuevas formas de mediatización y el comportamiento de las redes sociales en la participación ciudadana.\u003c/p\u003e\\n\u003cp\u003e• Conocer las propuestas de activismo en género y los conflictos respecto al lenguaje y el espacio digital en el que se llevan a cabo.\u003c/p\u003e\\n\u003cp\u003e• Analizar discursos sociales digitales y detectar la hegemonía reproducida.\u003c/p\u003e\\n\u003cp\u003e• Reconocer el protagonismo de las imágenes en las redes sociales y su impacto social.\u003c/p\u003e\\n\u003cp\u003e• Identificar las metáforas y estereotipos de género que se reproducen comúnmente en las imágenes compartidas en redes sociales.\u003c/p\u003e\\n\u003cp\u003e• Construir una propuesta de nuevos valores que enmarquen la creación de piezas gráficas y subviertan los mensajes esteoretipados de género.\u003c/p\u003e\",\"objectId\":\"course-3bb6a986-a04d-4221-a48d-211a613c70a6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+BDVAIDCG-02+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"edd1ba30-eb69-41bf-9bed-08a029a41916\",\"productName\":\"Tecnología para el sector agroindustrial\",\"productSlug\":\"learn/engineering/logyca-tecnologia-para-el-sector-agroindustrial\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/edd1ba30-eb69-41bf-9bed-08a029a41916-4e8101045226.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Environmental Studies\",\"Energy \u0026 Earth Sciences\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"$19d\",\"shortDescription\":\"\u003cp\u003eEste curso proporciona conocimientos prácticos sobre tecnologías avanzadas en el sector agroindustrial, como agricultura de precisión, drones, sensores avanzados y automatización. También explora la implementación de plataformas tecnológicas como Sumercé.tienda para mejorar la comercialización y competitividad. Los participantes aprenderán a aplicar estas innovaciones para optimizar sus operaciones y aumentar su eficiencia.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eLos estudiantes de este curso podrán profundizar en el uso y aplicación de tecnologías avanzadas en el sector agroindustrial, como agricultura de precisión, drones, sensores avanzados y automatización; para optimizar sus operaciones y aumentar su eficiencia.\u003c/p\u003e\",\"objectId\":\"course-edd1ba30-eb69-41bf-9bed-08a029a41916\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:logycaX+TSC01+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"062604ca-efcc-403a-b9f8-d9eb1b5a8ee6\",\"productName\":\"Productividad Profesional Optimizada con IA: ChatGPT\",\"productSlug\":\"learn/business-administration/universidades-anahuac-productividad-empresarial-con-ia-chatgpt\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/062604ca-efcc-403a-b9f8-d9eb1b5a8ee6-bce97476def8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$19e\",\"shortDescription\":\"\u003cp\u003eMaximiza tu productividad empresarial con nuestro curso de aprovechamiento del ChatGPT. Aprende a automatizar tareas y mejorar la eficiencia de tu negocio con soluciones eficientes y personalizadas en tiempo real.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUtilización de la herramienta ChatGPT.\u003c/li\u003e\\n\u003cli\u003eAutomatización de respuestas empresariales.\u003c/li\u003e\\n\u003cli\u003eMejora de eficiencia en atención al cliente.\u003c/li\u003e\\n\u003cli\u003eAnálisis y síntesis inteligente de información propia.\u003c/li\u003e\\n\u003cli\u003eAnálisis de datos para la toma de decisiones.\u003c/li\u003e\\n\u003cli\u003eDesarrollo de diálogos personalizados.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-062604ca-efcc-403a-b9f8-d9eb1b5a8ee6\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.MO.10x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6bd6e546-6b2f-40a6-86f9-45f9eb55db6a\",\"productName\":\"Arquitectura de la información y datos digitales\",\"productSlug\":\"learn/computer-architecture/universidades-anahuac-arquitectura-de-la-informacion-y-datos-digitales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6bd6e546-6b2f-40a6-86f9-45f9eb55db6a-1ac85b232ae1.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$19f\",\"shortDescription\":\"\u003cp\u003eProponer proyectos basados en la integración de la infraestructura tecnológica requerida para la interacción sociodigital y el uso de datos digitales.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eReconocer los pilares tecnológicos de la arquitectura de la información en el contexto de la evolución digital, así como los elementos inmersivos de multialfabetización en la era digital.\u003c/li\u003e\\n\u003cli\u003eIdentificar los elementos del código de etiquetado para el posicionamiento en buscadores a partir del diseño de la arquitectura de la información.\u003c/li\u003e\\n\u003cli\u003eConstruir modelos de negocio basados en la propuesta de valor de la inmersión tecnológica, la economía de la atención y las necesidades socioculturales derivadas de la virtualidad.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6bd6e546-6b2f-40a6-86f9-45f9eb55db6a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAP.CP2.2x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"157a05ea-3b97-4606-bfb7-52d17aa9f198\",\"productName\":\"Pensamiento creativo para todos: prácticas y herramientas\",\"productSlug\":\"learn/design-thinking/universidad-del-rosario-pensamiento-creativo-para-todos-practicas-y-herramientas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/157a05ea-3b97-4606-bfb7-52d17aa9f198-0b95f2e02aed.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Art \u0026 Culture\",\"Business \u0026 Management\",\"Design\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1a0\",\"shortDescription\":\"\u003cp\u003eEn este curso desarrollarás competencias relacionadas con el pensamiento creativo orientadas al quehacer cotidiano y profesional. Mediante ejercicios prácticos y reflexivos, aprenderás a liderar procesos creativos, potenciando tu capacidad de crear.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cstrong\u003eEstudiarás sobre qué es “ser creativo”\u003c/strong\u003e , el abordaje de la creatividad como proceso y no como evento —entendiendo por qué es relevante para cualquier individuo—, e identificarás qué limita el proceso creativo y lo que le permite salirse de esa caja.\u003c/li\u003e\\n\u003cli\u003eAprovecharás la diversidad y la cantidad como paradigmas capaces de superar a la —a veces utópica— calidad.\u003c/li\u003e\\n\u003cli\u003ePercibirás el error y la incertidumbre como fuentes de inspiración y orientación hacia rumbos inexplorados y originales.\u003c/li\u003e\\n\u003cli\u003eDesarrollarás las competencias relacionadas a la observación atenta y profunda, y la identificación de patrones que permitan relacionar elementos aparentemente sin conexión.\u003c/li\u003e\\n\u003cli\u003eDescubrirás el poder del juego como práctica para aprovechar y multiplicar las competencias creativas a nivel grupal.\u003c/li\u003e\\n\u003cli\u003eAprenderás sobre las buenas prácticas y herramientas para fortalecer el caudal de ideas y soluciones, y cuándo y cómo aplicarlas.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-157a05ea-3b97-4606-bfb7-52d17aa9f198\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX95+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"762b6126-5208-4551-a3d2-cc2cd04ba38f\",\"productName\":\"Herramientas para la colaboración en las redes de valor\",\"productSlug\":\"learn/logistics/logyca-herramientas-para-la-colaboracion-en-las-redes-de-valor\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/762b6126-5208-4551-a3d2-cc2cd04ba38f-7cd8a593ea44.jpg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Economics \u0026 Finance\",\"Social Sciences\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"\u003cp\u003eLa colaboración es un modelo donde los socios de negocio alinean sus objetivos, procesos y herramientas tecnológicas, para incrementar el flujo de información a través de la red de valor, por tanto, es necesario contar con un kit de herramientas que permitan implementarla de diferentes maneras. \u003c/p\u003e\\n\u003cp\u003eEn este curso, estableceremos las herramientas de colaboración y los casos de éxito que han impulsado a las organizaciones internacionales y nacionales a aplicar esta metodología en sus procesos logísticos obteniendo amplios beneficios. En este sentido, realizaremos un recorrido por los principales casos de colaboración en última milla, transporte de larga distancia, el uso efectivo de activos y todo el manejo de información desde diferentes realidades organizacionales lo permite contribuir al entendimiento del modelo de red de valor de una empresa e incentiva a su aplicación.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAprende los conceptos básicos para la implementación de un modelo de colaboración en una red de valor y sus elementos de gestión. Además, conoce los estudios logísticos sobre colaboración de última milla, transporte, uso de activos e información.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eLos elementos fundamentales en la estructuración de una estrategia colaborativa exitosa en una empresa.\u003c/li\u003e\\n\u003cli\u003eLa metodología a implementar en el desarrollo de una estrategia colaborativa.\u003c/li\u003e\\n\u003cli\u003eCasos prácticos, sus retos y recomendaciones.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-762b6126-5208-4551-a3d2-cc2cd04ba38f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:logycaX+HCO002+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5dce2dab-7db2-4cf9-b193-2c8a1e77a642\",\"productName\":\"Guía de herramientas para la colaboración empresarial en crisis\",\"productSlug\":\"learn/coronavirus/logyca-guia-de-herramientas-para-la-colaboracion-empresarial-frente-al-covid-19\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5dce2dab-7db2-4cf9-b193-2c8a1e77a642-956c953df301.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"$1a1\",\"shortDescription\":\"\u003cp\u003eAprende cómo la colaboración en la red de valor es una herramienta primordial para la gestión del riesgo, generando un alto nivel de resiliencia ante situaciones de crisis como el COVID-19.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eIdentificar el nivel de madurez en las empresas para enfrentar una crisis.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eDefinir un plan de respuesta estratégico.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eAlineación de proveedores en una red de valor mediante acuerdos conjuntos.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eGenerar alianzas estratégicas para la innovación.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eDirigir, medir y controlar las prácticas implementadas.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5dce2dab-7db2-4cf9-b193-2c8a1e77a642\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:logycaX+GHC019+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"95737e5b-657c-4910-85ea-82f3e713e378\",\"productName\":\"Información financiera y su análisis\",\"productSlug\":\"learn/finance/tecnologico-de-monterrey-informacion-financiera-y-su-analisis\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/95737e5b-657c-4910-85ea-82f3e713e378-f53d9cd84b0f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1a2\",\"shortDescription\":\"\u003cp\u003eAplica fundamentos contables y financieros para evaluar la situación financiera de la empresa e informar el proceso de toma de decisiones.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eA través de este curso podrás:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eAdquirir los conocimientos esenciales para el manejo de la información contable y financiera.\u003c/li\u003e\\n\u003cli\u003eConocer la salud de la empresa y decidir sobre estructuras de precios, rentar vs comprar, condiciones de venta, ciclo de operación, administración del capital de trabajo y más.\u003c/li\u003e\\n\u003cli\u003eEmpezarás a leer la información contable de las empresas para entender su estrategia de operación y así entender mejor posibles alternativas de inversión a futuro.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-95737e5b-657c-4910-85ea-82f3e713e378\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+HC_IFA.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"65f1baf3-b695-46d4-8909-5f04ae6ad0f7\",\"productName\":\"Fundamentos de la Tecnología Blockchain\",\"productSlug\":\"learn/blockchain/pontificia-universidad-javeriana-fundamentos-de-la-tecnologia-blockchain\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/65f1baf3-b695-46d4-8909-5f04ae6ad0f7-20fa62e7ad2c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Economics \u0026 Finance\",\"Engineering\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"\u003cp\u003eLa tecnología Blockchain está revolucionando los sistemas de información y la forma en que transferimos valor a través de Internet, abriendo un nuevo abanico de oportunidades para mejorar las organizaciones, eliminar intermediarios y diseñar modelos de negocio más eficientes.\u003c/p\u003e\\n\u003cp\u003eCon la llegada de Bitcoin y los criptoactivos, también surgió la oportunidad de utilizar una nueva tecnología que permite reducir costos y optimizar procesos organizacionales, generando una ventaja competitiva para los individuos y organizaciones que logren adaptarse primero. \u003c/p\u003e\\n\u003cp\u003eEn este curso explicaremos en detalle qué es Bitcoin y la tecnología blockchain, además de las principales aplicaciones de esta tecnología y los desafíos que existen para lograr su adopción.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eCurso para aprender sobre Bitcoin, la tecnología blockchain, cómo funciona, casos de uso y cómo cambiará nuestras vidas.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eEl origen de Bitcoin y la tecnología blockchain\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEl funcionamiento general de la tecnología blockchain.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eLas principales características de los diferentes criptoactivos\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEl potencial de los contratos inteligentes y sus aplicaciones\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eLas diferencias entre blockchains privadas, blockchains públicas y blockchains híbridas\u003c/p\u003e\",\"objectId\":\"course-65f1baf3-b695-46d4-8909-5f04ae6ad0f7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+FTBx+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bf2e4658-f640-4c6e-b7df-319c1f460178\",\"productName\":\"Crear música con tecnología\",\"productSlug\":\"learn/music-theory/berklee-college-of-music-crear-musica-con-tecnologia\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bf2e4658-f640-4c6e-b7df-319c1f460178-e877fa7a729b.jpg\",\"productType\":\"Course\",\"attributes\":[\"Music\"],\"partnerName\":[\"Berklee College of Music\"],\"partnerKeys\":[\"BerkleeX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/267a63a9-5bc3-4b49-8bc0-f31b39b45f53-9778ab6db7ca.png\",\"fullDescription\":\"$1a3\",\"shortDescription\":\"\u003cp\u003eAprende sobre el proceso de producción de música y tecnología musical -incluyendo la grabación, la edición y la mezcla- y sobre las herramientas disponibles para crear música contemporánea en tu computadora.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eEntender cómo viaja el sonido\u003c/li\u003e\\n\u003cli\u003eEntender cómo configurar tu estación de trabajo de audio digital EADU y cómo grabamos y capturamos señales\u003c/li\u003e\\n\u003cli\u003eIdentificar las partes de una mezcladora musical y describir cómo funcionan\u003c/li\u003e\\n\u003cli\u003eDefinir las diferentes categorías de los efectos de sonido\u003c/li\u003e\\n\u003cli\u003eIdentificar problemas como ruido o distorsión en tus archivos de audio\u003c/li\u003e\\n\u003cli\u003eEntender cómo y cuándo usar efectos dinámicos\u003c/li\u003e\\n\u003cli\u003eCrear amplitud y espacio es tu mezcla musical\u003c/li\u003e\\n\u003cli\u003eEntender el lenguaje del timbre\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bf2e4658-f640-4c6e-b7df-319c1f460178\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:BerkleeX+OMPRD-100x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"75462303-5c91-4b21-abd2-878dbba30b9c\",\"productName\":\"Competencias digitales para la enseñanza mediada por tecnología\",\"productSlug\":\"learn/teaching-strategies/universidades-anahuac-competencias-digitales-para-la-ensenanza-mediada-por-tecnologia\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/75462303-5c91-4b21-abd2-878dbba30b9c-424b86e6b05b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1a4\",\"shortDescription\":\"\u003cp\u003eConviértete en un agente de cambio de la transformación educativa en el mundo de la docencia. Conoce y aprende sobre las características y principios de la educación mediada por tecnología y descubre qué herramientas son necesarias para ser un docente de vanguardia.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentificar las características de la revolución tecnológica y digital \u003c/li\u003e\\n\u003cli\u003eComprender los principios de la sociedad del conocimiento\u003c/li\u003e\\n\u003cli\u003eAnalizar dimensiones y niveles de desarrollo de las competencias digitales \u003c/li\u003e\\n\u003cli\u003eComparar modalidades de aprendizaje mediadas por tecnología y tendencias educativas \u003c/li\u003e\\n\u003cli\u003eRevisar estrategias y herramientas para la colaboración académica en red\u003c/li\u003e\\n\u003cli\u003eIdentificar las competencias digitales necesarias para la práctica docente\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-75462303-5c91-4b21-abd2-878dbba30b9c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAX.MO.1x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ada33fb7-60f2-4619-bf02-5e9fe3c7d68f\",\"productName\":\"Prototipado de proyectos tecnológico-sociales\",\"productSlug\":\"learn/design/universidad-del-rosario-prototipado-de-proyectos-tecnologico-sociales\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ada33fb7-60f2-4619-bf02-5e9fe3c7d68f-3b34f6bd14b3.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Design\",\"Electronics\",\"Social Sciences\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1a5\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eAprende a implementar prototipos funcionales que requieran un intercambio de información e intervención en el mundo físico con el apoyo de dispositivos electrónicos e internet.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eComprender las tecnologías de punta en el contexto de la revolución 4.0.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eIdentificar la gestión de proyectos tecnológicos.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eConocer el prototipado en Internet de las cosas.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eDiseñar y desarrollar prototipos funcionales en IoT.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eIdentificar el uso enfocado de la plataforma Glide para el desarrollo de aplicaciones celulares, Build, la tarjeta de desarrollo Photon, y Google Sheets como base de datos básica.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eIntegrar las diferentes plataformas para la implementación de una solución integral IoT.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eRealizar una rápida validación de la solución.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ada33fb7-60f2-4619-bf02-5e9fe3c7d68f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX30+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1c0a044e-3dce-47ef-a8b5-806d32eff2b9\",\"productName\":\"Inteligencia Artificial para negocios\",\"productSlug\":\"learn/artificial-intelligence/tecnologico-de-monterrey-inteligencia-artificial-para-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1c0a044e-3dce-47ef-a8b5-806d32eff2b9-7facf530ed3c.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1a6\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eA través de este curso podrás analizar los conceptos relacionados al aprendizaje automático, las técnicas más comunes y su alcance; además podrás aplicar soluciones de inteligencia artificial para poner en práctica en tu negocio.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eRelaciona la inteligencia artificial en la situación actual de los negocios.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eEmplea elementos y conceptos de la inteligencia artificial en ejercicios prácticos.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eExperimenta herramientas de inteligencia artificial para soluciones en procesos de negocio.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1c0a044e-3dce-47ef-a8b5-806d32eff2b9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+IAN.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"238abb10-3434-4abf-b628-278a12121e0b\",\"productName\":\"Introducción a la Ciencia de Datos y el Big Data\",\"productSlug\":\"learn/big-data/tecnologico-de-monterrey-introduccion-a-la-ciencia-de-datos-y-el-big-data\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/238abb10-3434-4abf-b628-278a12121e0b-3939b352381b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1a7\",\"shortDescription\":\"\u003cp\u003eObtén un panorama general de lo que es Data Science o Ciencia de Datos y cómo aplicarla en las organizaciones. Aprende a tomar decisiones basadas en los datos.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Introducir al alumno en los conceptos claves sobre la Ciencia de Datos y Big Data.\u003c/p\u003e\\n\u003cp\u003e- Comprender la forma en la que se gesta un proyecto de Ciencia de Datos.\u003c/p\u003e\\n\u003cp\u003e- Identificar los proyectos de esta disciplina que se pueden realizar en las diferentes áreas funcionales de una organización a través de casos de éxito en las diferentes industrias.\u003c/p\u003e\",\"objectId\":\"course-238abb10-3434-4abf-b628-278a12121e0b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+CDICD.1X+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c6836d74-3147-4269-85fc-eb400fd1b3bd\",\"productName\":\"ChatGPT - Usos y Estrategias\",\"productSlug\":\"learn/chatgpt/tecnologico-de-monterrey-chatgpt-usos-y-estrategias\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c6836d74-3147-4269-85fc-eb400fd1b3bd-716d1d5f0a9f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Science\",\"Education \u0026 Teacher Training\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1a8\",\"shortDescription\":\"\u003cp\u003eConoce la historia de la Inteligencia Artificial y aprende a utilizar efectivamente ChatGPT mediante diferentes estrategias para implementar su uso responsable en entornos educativos y laborales. Analiza diferentes ejemplos prácticos y aplica tus conocimientos para complementar tus actividades operativas incrementando tu productividad. Estudia las consideraciones éticas, capacidades y limitaciones de plataformas como ChatGPT, permitiéndote hacer uso consciente y responsable de las plataformas asistidas por IA.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eDentro de los objetivos del curso Chat GPT - Usos y Estrategias se encuentran los siguientes:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eComprender los fundamentos y elementos clave de la Inteligencia Artificial con enfoque en Procesamiento Natural del Lenguaje y lo que es el modelo ChatGPT.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eUtilizar ChatGPT efectivamente para generar información procesable y poder implementarlo responsablemente en el campo educativo y laboral.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentificar las capacidades y limitaciones de ChatGPT, atendiendo conceptos clave como la privacidad de los datos, la confiabilidad de la información y el plagio.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c6836d74-3147-4269-85fc-eb400fd1b3bd\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+GPTUYE.1X+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c15a33e3-a00d-4618-94d5-132e65ac8954\",\"productName\":\"Visualización de Datos y Storytelling\",\"productSlug\":\"learn/data-visualization/tecnologico-de-monterrey-visualizacion-de-datos-y-storytelling\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/c15a33e3-a00d-4618-94d5-132e65ac8954-8068bcd9016f.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1a9\",\"shortDescription\":\"\u003cp\u003eAprende en este curso en línea que es la visualización de datos, sus usos; los elementos que la conforman y la forma de poder utilizarla para el apoyo en la toma de las mejores decisiones para las empresas basadas en el análisis de datos.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eLos objetivos de este curso online son los siguientes:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComprender que es la visualización de datos.\u003c/li\u003e\\n\u003cli\u003eConocer la importancia que tiene la visualización de datos en la ciencia de datos.\u003c/li\u003e\\n\u003cli\u003eConocer los elementos que componen una visualización de datos y que herramientas existen para aplicarla.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-c15a33e3-a00d-4618-94d5-132e65ac8954\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+CDVDS.3X+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"03e4cbd7-1cba-4f00-81a9-4e133f91a71c\",\"productName\":\"Introducción a Ciencias de Datos y Estadística Básica para Negocios\",\"productSlug\":\"learn/statistics/tecnologico-de-monterrey-introduccion-a-ciencias-de-datos-y-estadistica-basica-para-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/03e4cbd7-1cba-4f00-81a9-4e133f91a71c-32afbf5581c5.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eEste curso te permitirá desarrollar habilidades como un tomador de decisiones con base a las siguientes competencias:\u003c/span\u003e\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eanálisis de elementos estadístico de la información\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003econceptos y fundamentos estadísticos para la aplicación del área de ciencia de datos.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003ePor medio de la estadística descriptiva, el estudio y análisis de distribuciones de probabilidad discreta y continua, así como la estimación por intervalos para la media y la proporción es como lograrás desarrollar ambas competencias.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEn este curso adquirirás los métodos estadísticos para la toma de decisiones en los negocios, así como herramientas tecnológicas para desarrollar habilidades cuantitativas.\u003c/p\u003e\\n\u003cp\u003eÁreas como el “big data” requieren un conocimiento muy claro de la estadística; en las áreas de negocios, la tecnología pone a nuestro alcance diversas aplicaciones que requieren una sólida formación en estadística para su correcto uso e interpretación.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eA través de este curso los participantes podrán:\u003c/p\u003e\\n\u003cp\u003e● Aplicar métodos básicos estadísticos al entorno de los negocios\u003c/p\u003e\\n\u003cp\u003e● Utilizar herramientas tecnológicas para desarrollar habilidades cuantitativas\u003c/p\u003e\\n\u003cp\u003e● Interpretar los resultados de métodos estadísticos aplicados a los negocios\u003c/p\u003e\",\"objectId\":\"course-03e4cbd7-1cba-4f00-81a9-4e133f91a71c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+HC_CDE.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"18e31ce2-66dc-4a16-904d-9ec5c87a3411\",\"productName\":\"Habilidades de pensamiento y solución de problemas\",\"productSlug\":\"learn/humanities/tecnologico-de-monterrey-habilidades-de-pensamiento-y-solucion-de-problemas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/18e31ce2-66dc-4a16-904d-9ec5c87a3411-cd7f0d52fed8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Social Sciences\",\"Ethics\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1aa\",\"shortDescription\":\"\u003cp\u003eEl participante podrá ser capaz de utilizar diversas formas y habilidades del pensamiento o métodos de indagación (methods of inquiry) al aproximarse al análisis de problemas complejos. Contará con una visión más completa y aprenderá a poner a prueba su propio juicio y las bases de sus suposiciones al resolver problemas y diseñar soluciones. Las habilidades de pensamiento le permitirán sintetizar en un todo coherente (coherent whole) la información recopilada desde diversas perspectivas.\u003c/p\u003e\",\"productOverview\":\"$1ab\",\"objectId\":\"course-18e31ce2-66dc-4a16-904d-9ec5c87a3411\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+HPYSP.1X+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"572b734b-ad99-42f2-b173-eb334d54d0bf\",\"productName\":\"Visualización de Datos - Impacto en la Gestión Empresarial\",\"productSlug\":\"learn/computer-programming/tecnologico-de-monterrey-visualizacion-de-datos-y-su-impacto-en-la-gestion-empresarial\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/572b734b-ad99-42f2-b173-eb334d54d0bf-9815a4657356.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Data Analysis \u0026 Statistics\",\"Design\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1ac\",\"shortDescription\":\"\u003cp\u003eLa importancia y la necesidad de la visualización de datos permite dar sentido a los datos y utilizar la información en beneficio de toda una organización. Sin una visualización e interpretación correcta de datos adecuada, es un desafío constante el comunicar de manera rápida y oportuna los hallazgos de los datos que permitan identificar patrones e información relevante para interactuar con los datos y lograr una mejor toma decisiones a través de ellos y los elementos visuales.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eLos objetivos del curso son los sigueintes:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentificar los principales elementos que intervienen en la construcción de la visualización de datos permitiendo a los niveles gerenciales medios y altos una mayor facilidad en la toma de decisiones.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eComprender la taxonomía e interpretación de los datos que facilitan a la gerencia media la medición del impacto en su negocio para comunicar de forma efectiva la visualización de la información a las audiencias internas y externas.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDistinguir algunos de los principales elementos que son necesarios para emplear de manera efectiva la visualización de datos a través de las 3 herramientas: Tableau, Power BI y Python.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-572b734b-ad99-42f2-b173-eb334d54d0bf\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+VDIGE.1X+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"799e0d05-7a7b-4539-9eed-aa6742a484ea\",\"productName\":\"Energía: pasado, presente y futuro\",\"productSlug\":\"learn/energy/tecnologico-de-monterrey-energia-pasado-presente-y-futuro\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/799e0d05-7a7b-4539-9eed-aa6742a484ea-fd1c5370c859.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Science\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1ad\",\"shortDescription\":\"\u003cp\u003ePresenta una panorámica histórica y prospectiva sobre cómo la energía es un factor de cambio en el desarrollo de la sociedad.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eA través de este curso lograrás:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eExplicar cómo impacta la forma en que la sociedad obtiene energía a través de una revisión histórica para entender la relación entre la disponibilidad del recurso energético y su aprovechamiento.\u003c/li\u003e\\n\u003cli\u003eDiscriminar entre alternativas para una transición energética sostenible mediante el análisis de su evolución para contribuir en el uso más eficiente de la energía.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-799e0d05-7a7b-4539-9eed-aa6742a484ea\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+EPPE1ed1+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ec15bd20-bfcd-4e88-8c2b-fbf770e8a38c\",\"productName\":\"Teamwork \u0026 Collaboration\",\"productSlug\":\"learn/teamwork/rochester-institute-of-technology-teamwork-collaboration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ec15bd20-bfcd-4e88-8c2b-fbf770e8a38c-74dc2ae2acd1.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Business \u0026 Management\"],\"partnerName\":[\"Rochester Institute of Technology\"],\"partnerKeys\":[\"RITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/de3e9ff0-477d-4496-8cfa-a98f902e5830-71b79f0ac34a.png\",\"fullDescription\":\"\u003cp\u003eIn today’s workplace, professionals don’t work alone, and rarely work with just one other person. More often, we are required to work in groups to strategize, design solutions, ideate, motivate, manage, and execute.\u003c/p\u003e\\n\u003cp\u003eThis course, part of the Leadership Essentials Professional Certificate program, complements business communication skills and expands those competencies to provide a foundation for decision-making, consensus-building, and problem-solving within a group environment.\u003c/p\u003e\\n\u003cp\u003eIn this course, learners will analyze and evaluate their own experiences of leading and participating in teams, and will relate them to industry examples.\u003c/p\u003e\\n\u003cp\u003eTopics in the course also include:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eTeam formation and development\u003c/li\u003e\\n\u003cli\u003eBuilding, leading, organizing, and motivating teams\u003c/li\u003e\\n\u003cli\u003eManaging conflict in groups to build productive professional relationships\u003c/li\u003e\\n\u003cli\u003eCollaboration among cross-functional teams\u003c/li\u003e\\n\u003cli\u003eInterpersonal relationship dynamics in small groups\u003c/li\u003e\\n\u003c/ul\u003e\",\"shortDescription\":\"\u003cp\u003eLearn essential teamwork and collaboration skills to lead, build and motivate teams in the workplace.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHow to understand the complexities of group dynamics and interactions\u003c/li\u003e\\n\u003cli\u003eHow to motivate by improving group climate\u003c/li\u003e\\n\u003cli\u003eHow to develop skills in leadership, problem-solving, conflict management, and other critical group dynamics\u003c/li\u003e\\n\u003cli\u003eHow to assess team effectiveness and success\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ec15bd20-bfcd-4e88-8c2b-fbf770e8a38c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:RITx+LEAD102+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"652bffa1-cd44-47ff-a5dc-4226c968e5c0\",\"productName\":\"Geoscience: the Earth and its Resources\",\"productSlug\":\"learn/geosciences/delft-university-of-technology-geoscience-the-earth-and-its-resources\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/652bffa1-cd44-47ff-a5dc-4226c968e5c0-629cae7eb7e8.jpg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\"],\"partnerName\":[\"Delft University of Technology\"],\"partnerKeys\":[\"DelftX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c484a523-d396-4aff-90f4-bb7e82e16bf6-f9e6cc4a4c94.png\",\"fullDescription\":\"$1ae\",\"shortDescription\":\"\u003cp\u003eYour introduction to modern Earth Sciences with application to the Geology of hydrocarbon, hydrogeology and geothermal energy.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003ethe basics of plate tectonics\u003c/li\u003e\\n\u003cli\u003eprocesses which control the formation of mountains and sedimentary basins\u003c/li\u003e\\n\u003cli\u003ehow sediments are formed, transported and deposited\u003c/li\u003e\\n\u003cli\u003ehow rocks are deformed and how knowledge of deformation increases the reliability of subsurface predictions\u003c/li\u003e\\n\u003cli\u003ehydrocarbon geology\u003c/li\u003e\\n\u003cli\u003ehydrogeology\u003c/li\u003e\\n\u003cli\u003egeology of geothermal energy (from high to low temperatures)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-652bffa1-cd44-47ff-a5dc-4226c968e5c0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:DelftX+GEO101x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e116d3cd-3914-48d4-ac4d-c5c5d531abb5\",\"productName\":\"Mechanics of Deformable Structures: Part 2\",\"productSlug\":\"learn/engineering/massachusetts-institute-of-technology-mechanics-of-deformable-structures-part-2\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e116d3cd-3914-48d4-ac4d-c5c5d531abb5-4da3475c6298.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Design\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1af\",\"shortDescription\":\"\u003cp\u003eStudy the foundational mechanical engineering subject “Strength of Materials”. In this course you will learn to analyze multi-axial states of stress and strain, selecting “objective” failure criteria, and to predict linear elastic structural response using energy methods.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHooke’s law for isotropic linear elastic materials and homogeneous problems in linear elasticity. Pressure vessels. Superposition of loading conditions.\u003c/li\u003e\\n\u003cli\u003eTraction on a face. Stress transformation. Principal stress components. Stress and strain invariants. Tresca and Mises yield criteria.\u003c/li\u003e\\n\u003cli\u003eElastic strain energy. Castigliano methods. Potential energy formulations. Approximate solutions and the Rayleigh Ritz method\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e116d3cd-3914-48d4-ac4d-c5c5d531abb5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.02.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"69eb1e0c-917f-453c-a205-34fc98da1779\",\"productName\":\"Advanced Fluid Mechanics 1: Fundamentals\",\"productSlug\":\"learn/fluid-mechanics/massachusetts-institute-of-technology-advanced-fluid-mechanics-1-fundamentals\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/69eb1e0c-917f-453c-a205-34fc98da1779-c4e771511969.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b0\",\"shortDescription\":\"\u003cp\u003eLearn the fundamental principles underlying fluid dynamics; including the kinematics of deformation, hydrostatics \u0026amp; buoyancy, inviscid flow and the application of Bernoulli’s theorems, as well as applications of control volume analysis for more complex problems of engineering interest.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eContinuum mechanics \u003c/li\u003e\\n\u003cli\u003eHydrostatics\u003c/li\u003e\\n\u003cli\u003eBuoyancy and rigid body accelerations\u003c/li\u003e\\n\u003cli\u003eInviscid flow\u003c/li\u003e\\n\u003cli\u003eApplication of Bernoulli’s theorems\u003c/li\u003e\\n\u003cli\u003eApplications of control volume analysis for more complex fluid flow problems of engineering interest\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-69eb1e0c-917f-453c-a205-34fc98da1779\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.25.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e1f53ba4-bacc-418a-b3e7-1ef71b8f6ce7\",\"productName\":\"Elements of Structures\",\"productSlug\":\"learn/engineering/massachusetts-institute-of-technology-elements-of-structures\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e1f53ba4-bacc-418a-b3e7-1ef71b8f6ce7-ce81a243f730.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b1\",\"shortDescription\":\"\u003cp\u003eAn introduction to the strength of materials, this course will teach you to understand and predict the mechanical response of deformable solids like rods, beams and shafts using computational analysis.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eIn this course, you will:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eUse free body diagrams to formulate equilibrium equations\u003c/li\u003e\\n\u003cli\u003eIdentify geometric constraints to formulate compatibility equations\u003c/li\u003e\\n\u003cli\u003eUnderstand the concepts of stress and strain at a material point.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eFor three fundamental types of slender structural elements (elastic bars, beams and shafts) you will learn:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eTo calculate internal stress and strain fields in the loaded elements\u003c/li\u003e\\n\u003cli\u003eTo predict the deformation in the loaded elements\u003c/li\u003e\\n\u003cli\u003eTo design structural elements so as to prevent failure\u003c/li\u003e\\n\u003cli\u003eTo use numerical methods (MATLAB) in structural engineering application\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e1f53ba4-bacc-418a-b3e7-1ef71b8f6ce7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.01x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5bd8728d-08d6-471f-be8e-cb50179d43ad\",\"productName\":\"Mechanics of Deformable Structures: Part 1\",\"productSlug\":\"learn/engineering/massachusetts-institute-of-technology-mechanics-of-deformable-structures-part-1\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5bd8728d-08d6-471f-be8e-cb50179d43ad-138d4137a8ae.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Architecture\",\"Design\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b2\",\"shortDescription\":\"\u003cp\u003eStudy the foundational mechanical engineering subject “Strength of Materials”. Learn to predict deformation and failure in structures composed of elastic, elastic-plastic and viscoelastic elements.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUse Free Body Diagrams to formulate equilibrium equations in structural assemblages\u003c/li\u003e\\n\u003cli\u003eIdentify geometric constraints to formulate compatibility equations in structural assemblages\u003c/li\u003e\\n\u003cli\u003eUnderstand the formulation of thermo-elastic, elastic-perfectly-plastic and linear viscoelastic models for the material response\u003c/li\u003e\\n\u003cli\u003eAnalyze and predict the mechanical behavior of statically determinate and statically indeterminate assemblages with deormable bars in axial loading.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-5bd8728d-08d6-471f-be8e-cb50179d43ad\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+2.02.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"859a9046-bd9a-4022-93d1-96454ede5509\",\"productName\":\"Mechanical Behavior of Materials, Part 3: Time Dependent Behavior and Failure\",\"productSlug\":\"learn/mechanics/massachusetts-institute-of-technology-mechanical-behavior-of-materials-part-3-time-dependent-behavior-and-failure\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/859a9046-bd9a-4022-93d1-96454ede5509-153ca556a6d5.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b3\",\"shortDescription\":\"\u003cp\u003eExplore materials from the atomic to the continuum level, and apply your learning to mechanics and engineering problems.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConcepts and problem solving skills relating to viscoelasticity, plasticity, and high temperature creep of crystalline solids\u003c/li\u003e\\n\u003cli\u003eConcepts and problem solving skills relating to fracture, and fatigue\u003c/li\u003e\\n\u003cli\u003eThe relationship between the behavior of materials at an atomistic level and thecontinuum response of materials\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-859a9046-bd9a-4022-93d1-96454ede5509\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+3.032.3x+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"1f997487-1728-4031-b33c-854946757c3f\",\"productName\":\"Mechanical Behavior of Materials, Part 2: Stress Transformations, Beams, Columns, and Cellular Solids\",\"productSlug\":\"learn/mechanics/massachusetts-institute-of-technology-mechanical-behavior-of-materials-part-2-stress-transformations-beams-columns-and-cellular-solids\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/1f997487-1728-4031-b33c-854946757c3f-06a0ac830ddc.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b4\",\"shortDescription\":\"\u003cp\u003eExplore materials from the atomic to the continuum level, and apply your learning to mechanics and engineering problems.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConcepts relating to stress transformation, including equivalent stresses, principal stresses, and maximum shear stress\u003c/li\u003e\\n\u003cli\u003eHow to solve stress transformation problems using Mohr’s circle\u003c/li\u003e\\n\u003cli\u003eHow to solve problems relating to beam bending and column buckling\u003c/li\u003e\\n\u003cli\u003eHow the stiffness and strength of cellular materials depend on their mechanisms of deformation and failure\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-1f997487-1728-4031-b33c-854946757c3f\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+3.032.2x+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bb18c710-2e6b-4138-9d0c-6be03be32c87\",\"productName\":\"Mechanical Behavior of Materials, Part 1: Linear Elastic Behavior\",\"productSlug\":\"learn/engineering/massachusetts-institute-of-technology-mechanical-behavior-of-materials-part-1-linear-elastic-behavior\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bb18c710-2e6b-4138-9d0c-6be03be32c87-c175cdb7035d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1b5\",\"shortDescription\":\"\u003cp\u003eExplore materials from the atomic to the continuum level, and apply your learning to mechanics and engineering problems.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eThe behavior of linear elastic materials\u003c/li\u003e\\n\u003cli\u003eThe atomic basis for linear elasticity\u003c/li\u003e\\n\u003cli\u003eHow to solve mechanics problems relating to stress, strain, and strain energy\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-bb18c710-2e6b-4138-9d0c-6be03be32c87\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:MITx+3.032.1x+3T2020\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"8904f537-7914-4cd4-aa63-552a5db3a7b1\",\"productName\":\"Introduction to Semiconductors, PN Junctions and Bipolar Junction Transistors\",\"productSlug\":\"learn/semiconductors/the-hong-kong-university-of-science-and-technology-introduction-to-semiconductors-pn-junctions-and-bipolar-junction-transistors\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8904f537-7914-4cd4-aa63-552a5db3a7b1-ea624ea2cee8.jpg\",\"productType\":\"Course\",\"attributes\":[\"Electronics\"],\"partnerName\":[\"The Hong Kong University of Science and Technology\"],\"partnerKeys\":[\"HKUSTx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b736b120-95f6-4ac5-83d0-138fedbbbda2-ed8f10dbd8ba.png\",\"fullDescription\":\"\u003cp\u003eThis online course is the first part of the Principle of Semiconductor Devices Professional Certificate Program. \u003c/p\u003e\\n\u003cp\u003eIn this course, we will start with the fundamental concept of semiconductors as a tutorial for doping and the formation of PN junctions. Major and minority carrier currents in PN junctions under forward bias and reverse bias will be explained based on drift and diffusion physics. The course will further explain the operating principle of photodiodes, solar cells, light-emitting diodes (LED) and metal-semiconductor contact. \u003c/p\u003e\\n\u003cp\u003eAs an extension of PN junction theory, the concept will be extended to form bipolar junction transistors (BJT). The different operation modes of a BJT, including forward active, reverse active, saturation and cutoff under common emitter mode, will be introduced. The gain and amplifying mechanism of a BJT will be explained based on the carrier actions. The detailed behavior of the BJT will be summarized by a circuit model.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eThis online course uses engaging animations to help you visualize the operating principles of many common semiconductor devices. The course covers PN junctions, photodiodes, solar cells, light-emitting diodes, metal-semiconductor contact, and Bipolar Junction Transistors.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003edescribe the motion of carriers in a semiconductor material\u003c/li\u003e\\n\u003cli\u003eillustrate the operational principles of some common electronic devices including PN Junction Diode, Schottky Diode, Photo Diodes, Solar Cells, LED, and Bipolar Junction Transistor\u003c/li\u003e\\n\u003cli\u003eidentify the most important parameters to adjust for meeting certain design specifications\u003c/li\u003e\\n\u003cli\u003econstruct the circuit models of some common electronic devices\u003c/li\u003e\\n\u003cli\u003ecommunication in the language of semiconductor\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-8904f537-7914-4cd4-aa63-552a5db3a7b1\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUSTx+ELEC3500.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e782198d-3977-4d14-8b15-69be3e1ee91b\",\"productName\":\"Fundamentos de datos estructurados para analítica con SQL\",\"productSlug\":\"learn/sql/pontificia-universidad-javeriana-fundamentos-de-datos-estructurados-para-analitica-con-sql\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e782198d-3977-4d14-8b15-69be3e1ee91b-a5f03d881c9e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Engineering\",\"Business \u0026 Management\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1b6\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-CO\\\"\u003eCurso introductorio en lenguaje de computación,\u003c/span\u003e con ejemplos orientados a sistemas de gestión de bases de datos relacionales en ambientes tecnológicos local, nube pública y /o empresarial.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-TRAD\\\"\u003eComprender qué son las bases de datos relacionales y los sistemas de gestión de bases de datos.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-TRAD\\\"\u003eUsar el lenguaje estructurado de consultas como herramienta fundamental para la extracción, inserción, eliminación y modificación de datos.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-TRAD\\\"\u003eUsar procedimientos almacenados, vistas y \u003cem\u003etriggers\u003c/em\u003e como herramientas tradicionales en la extracción de datos.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-e782198d-3977-4d14-8b15-69be3e1ee91b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+B-FDEASQLX+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ee45af01-fbf1-431c-b5b6-a22945644115\",\"productName\":\"¿Cómo planificar viviendas verdes y resilientes?\",\"productSlug\":\"learn/climate-change/inter-american-development-bank-como-planificar-viviendas-verdes-y-resilientes\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ee45af01-fbf1-431c-b5b6-a22945644115-a27cd7465c7f.png\",\"productType\":\"Course\",\"attributes\":[\"Environmental Studies\"],\"partnerName\":[\"Inter-American Development Bank\"],\"partnerKeys\":[\"IDBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f87a494a-5b61-4c1c-b9ff-0fefec519326-6ea0a51177d0.png\",\"fullDescription\":\"$1b7\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-ES\\\"\u003e¿Quieres aprend\u003c/span\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eer \u003c/span\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eestrategias \u003c/span\u003eque posibiliten la mitigación y adaptación al cambio climático en las viviendas de América Latina y el Caribe? ¿Y que con ello mejore el confort de sus habitantes además de reducir gastos de mantenimiento?\u003c/p\u003e\\n\u003cp\u003eSi trabajas o estás interesado en el sector de la vivienda, como desarrollador, como funcionario público, como emprendedor en innovaciones tecnológicas o como un usuario de ellas, y quieres aprender estrategias para un diseño de viviendas verdes y resilientes, este curso es para ti.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eSituación de déficit habitacional en la región.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eFundamentos de \u003c/span\u003eviviendas verdes y resilientes.\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eRetos \u003c/span\u003ey oportunidades para el desarrollo de viviendas verdes resilientes.\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eHoja de ruta de cinco pasos para el diseño de vivienda verde y resiliente del BID.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eEstrategias de diseño verde y resiliente con ecotecnologías.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eIncentivos financieros y no financieros para la vivienda verde.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ee45af01-fbf1-431c-b5b6-a22945644115\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IDBx+IDB67.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"38362c5d-d3ac-4416-856e-8165382026fc\",\"productName\":\"Epidemics I\",\"productSlug\":\"learn/epidemics/university-of-hong-kong-epidemics-i\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/38362c5d-d3ac-4416-856e-8165382026fc-3c5a82e0075c.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\",\"Science\"],\"partnerName\":[\"The University of Hong Kong\"],\"partnerKeys\":[\"HKUx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5024b547-2d68-4bfd-9e9e-1e5f96c13375-c9b5e39fb8af.png\",\"fullDescription\":\"$1b8\",\"shortDescription\":\"\u003cp\u003eExplore the science, prevention and control of epidemics in this free online course. In addition to lectures by leading scientists in this field from HKU, this course will feature a supplementary module on COVID-19 and panel discussions with world-leading experts in epidemics.\u003c/p\u003e\\n\u003cp\u003eThis is the first (origins of novel pathogens) of the four courses, covers these topics:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eEpidemics: Past, Present and Future\u003c/li\u003e\\n\u003cli\u003eDiscussion on Ebola and Zika Outbreak, and Supplementary Module on NextGeneration Informatics for Global Health\u003c/li\u003e\\n\u003cli\u003eEcology, Evolution and Emergence of Infectious Diseases\u003c/li\u003e\\n\u003cli\u003eMedical Detective: Bug Hunting in Epidemics\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eHistoric transitions and emergence of epidemic infections\u003c/li\u003e\\n\u003cli\u003eFactors leading to infectious disease emergence and re-emergence\u003c/li\u003e\\n\u003cli\u003eRegions with higher risk and estimated economic costs of emerging infectious disease\u003c/li\u003e\\n\u003cli\u003eEcology, evolution and emergence of infectious diseases such as Zika, Ebola, H5N1, H7N9, H1N1 and Swine Influenza\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDiscovery, proof of association and causation, and control (case review on SARS) \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e流行病的历史性转变和形成\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e形成传染病和传染病重现的因素\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e传染病风险较高和估计经济成本较高的地区\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e寨卡、埃博拉、H5N1、H7N9、H1N1和猪流感等传染病的生态、演变和形成\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003e发现、关联和因果关系的证明以及控制(SARS病例回顾)\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-38362c5d-d3ac-4416-856e-8165382026fc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HKUx+hku01x.1+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"54165d28-0d16-46c3-baeb-cddb887fc3b2\",\"productName\":\"¿Cómo comunicar en la transformación digital?\",\"productSlug\":\"learn/digital-transformation/pontificia-universidad-javeriana-transformacion-digital-para-comunicadores\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/54165d28-0d16-46c3-baeb-cddb887fc3b2-759f302b2a31.png\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Data Analysis \u0026 Statistics\",\"Communication\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1b9\",\"shortDescription\":\"$1ba\",\"productOverview\":\"$1bb\",\"objectId\":\"course-54165d28-0d16-46c3-baeb-cddb887fc3b2\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+TDPx+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"00a17e64-195c-48a4-81f9-69d36e437e79\",\"productName\":\"Análisis de datos empresariales con R\",\"productSlug\":\"learn/r-programming/universidades-anahuac-analisis-de-datos-empresariales-con-r\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/00a17e64-195c-48a4-81f9-69d36e437e79-41961478631e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Computer Science\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1bc\",\"shortDescription\":\"\u003cp\u003eAnaliza los datos con R y R Studio aplicando nuevas técnicas para tomar decisiones orientadas a los negocios, contemplando información de diversas variables simultáneamente y sé parte de la transformación empresarial.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUtilizarás R y R studio como herramienta de programación y análisis estadístico\u003c/li\u003e\\n\u003cli\u003eAprenderás a aplicar modelos de tratamiento de datos multivariado con R\u003c/li\u003e\\n\u003cli\u003ePodrás deducir patrones de comportamiento de encuestas y propiedades de productos\u003c/li\u003e\\n\u003cli\u003eSerás capaz de generar tableros de resultados para datos multivariados\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-00a17e64-195c-48a4-81f9-69d36e437e79\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.CP4.2x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0a6abd77-8aeb-4f24-8f4d-990338963bf0\",\"productName\":\"Escudo Digital: Ciberseguridad para Protección de Datos y Sistemas\",\"productSlug\":\"learn/computer-science/universidades-anahuac-escudo-digital-ciberseguridad-para-proteccion-de-datos-y-sistemas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0a6abd77-8aeb-4f24-8f4d-990338963bf0-2eecd01d7089.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1bd\",\"shortDescription\":\"\u003cp\u003eEste curso permite adquirir conocimientos para proteger sistemas, redes y datos, generar habilidades para responder a ciberataques, comprender los riesgos de seguridad informática e identificar vulnerabilidades y gestionar la seguridad de la información.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eComprender los fundamentos de seguridad de la información y ciberseguridad\u003c/li\u003e\\n\u003cli\u003eIdentificar conceptos asociados a amenazas y vulnerabilidades de seguridad\u003c/li\u003e\\n\u003cli\u003eComprender las estrategias de gestión de riesgos y cumplimiento normativo\u003c/li\u003e\\n\u003cli\u003eAnalizar estrategias y controles para el aseguramiento de la red\u003c/li\u003e\\n\u003cli\u003eIdentificar los diversos tipos de malware y los controles asociados a su prevención\u003c/li\u003e\\n\u003cli\u003eGenerar estrategias para navegar en internet de forma segura\u003c/li\u003e\\n\u003cli\u003eIdentificar diversas técnicas de ingeniería social y las estrategias para evitar ser víctima de ataques de ingeniería social.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0a6abd77-8aeb-4f24-8f4d-990338963bf0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.MO.11x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"37b8e7ba-3f2e-401a-93c3-7f5c35017269\",\"productName\":\"Analítica avanzada y seguridad cibernética\",\"productSlug\":\"learn/cybersecurity/universidad-galileo-analitica-avanzada-y-seguridad-cibernetica\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/37b8e7ba-3f2e-401a-93c3-7f5c35017269-3219b69a82bf.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Computer Science\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"$1be\",\"shortDescription\":\"\u003cp\u003eLa digitalización del sector energético brinda una gran oportunidad para alcanzar una matriz energética diversificada y sostenible. Sin embargo existen grandes retos por delante, los cuales pueden ser superados gracias a los avances en los sistemas de analítica avanzada.\u003c/p\u003e\\n\u003cp\u003ePor otra parte, la digitalización del sector energético requiere la implementación de las mejores prácticas para proteger los sistemas y la información de ciberataques y así, mejorar la seguridad operativa y la confiabilidad de los sistemas.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-AR\\\"\u003eConceptos básicos y principales técnicas de analítica avanzada.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-AR\\\"\u003e\u003c/span\u003e\u003cspan lang=\\\"ES-AR\\\"\u003eCasos de uso y aplicaciones en el sector energético de la analítica avanzada.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-AR\\\"\u003e\u003c/span\u003e\u003cspan lang=\\\"ES-AR\\\"\u003eImportancia de la seguridad cibernética en la digitalización del sector energético.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-AR\\\"\u003eTecnologías de seguridad cibernética.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES-AR\\\"\u003eMejores prácticas aplicables a la seguridad cibernética de los sistemas eléctricos.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-37b8e7ba-3f2e-401a-93c3-7f5c35017269\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GalileoX+Energia006+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"53974092-6c05-4dae-8f80-666c76fafd34\",\"productName\":\"Introducción al Internet de las Cosas\",\"productSlug\":\"learn/iot-internet-of-things/universidad-galileo-introduccion-al-internet-de-las-cosas\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/53974092-6c05-4dae-8f80-666c76fafd34-7f8abbf0aa02.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"$1bf\",\"shortDescription\":\"\u003cp\u003ePrácticamente cualquier objeto puede conectarse al Internet. Desde lavadoras hasta componentes sofisticados de aviones y aún cultivos inteligentes. La habilidad de conectar cosas y capturar información útil está transformando a las organizaciones en cada sector de la industria y está abriendo nuevas especializaciones de carrera. Descubre esto y más en este curso de introducción al internet de las cosas.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eEl objetivo principal del curso es explorar el campo de las “cosas” sensores y su conexión con el Internet de las Cosas. En este curso aprenderá:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eAnalizar las “cosas” y conexiones que conforman el IoT.\u003c/li\u003e\\n\u003cli\u003eConstruir sistemas de sensores y actuadores utilizando microcontroladores.\u003c/li\u003e\\n\u003cli\u003eExplorar el uso de Tecnologías de Cloud y Fog en sistemas de IoT.\u003c/li\u003e\\n\u003cli\u003eInvestigar sistemas IoT que puedan resolver problemas globales en manufactura, salud y sistemas de energía.\u003c/li\u003e\\n\u003cli\u003eDiseñar y construir prototipos de IoT.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-53974092-6c05-4dae-8f80-666c76fafd34\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GalileoX+IOT001+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d3377b9d-faab-4d4e-ad63-ac626638b7c9\",\"productName\":\"Fundamentos de Logística Humanitaria\",\"productSlug\":\"learn/logistics/logyca-fundamentos-de-logistica-humanitaria\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d3377b9d-faab-4d4e-ad63-ac626638b7c9-dff375f8e690.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Social Sciences\",\"Philanthropy\"],\"partnerName\":[\"LOGYCA\"],\"partnerKeys\":[\"logycaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f35f3d73-e1f1-42fa-88af-8637276d3281-3f3ddfe2630f.png\",\"fullDescription\":\"\u003cp\u003eEn este curso, aprenderemos acerca del funcionamiento de la logística humanitaria, conceptos básicos y cómo desde el ámbito empresarial podemos convertirnos en proveedores, almacenadores y transportadores de ayudas para emergencias externas.\u003c/p\u003e\\n\u003cp\u003eLa logística humanitaria nos permite llevar a cabo un plan de acción, el cual contiene información detallada para prevenir y atender de manera eficaz, desastres y catástrofes que el cambio climático y la globalización pueden provocar afectando nuestro entorno.\u003c/p\u003e\\n\u003cp\u003eNos encargaremos de suministrarle algunos consejos de cómo manejar una emergencia de manera eficaz.\u003c/p\u003e\\n\u003cp\u003e¡Los invito a disfrutar y sacar el mayor provecho de este curso que logycaX ha diseñado para ustedes!\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAprenderemos a gestionar las emergencias a través del proceso de logística humanitaria, además, conoceremos desde los conceptos básicos relacionados con desastres hasta las herramientas tecnológicas que se usan para atender de manera eficaz estas situaciones.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eConocer e identificar la importancia de la logística humanitaria a nivel empresarial.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eConstruir el proceso logístico que se debe llevar a cabo para la gestión y atención a emergencias.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eReconocer cuáles son las tendencias de logística humanitaria que se manejan en la actualidad.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d3377b9d-faab-4d4e-ad63-ac626638b7c9\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:logycaX+FLH005+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f0f7668c-4cd5-4551-87be-7e9d2a2e4741\",\"productName\":\"Habilidades informacionales para la vida\",\"productSlug\":\"learn/life-skills/universidad-del-rosario-habilidades-informacionales-para-la-vida\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f0f7668c-4cd5-4551-87be-7e9d2a2e4741-1d0f4cc760de.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Communication\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1c0\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eFortalece tus habilidades informacionales para la interacción eficiente, ética y segura en el mundo digital. Aprende estrategias para la utilización y aprovechamiento de herramientas y recursos digitales en la búsqueda, evaluación, organización y comunicación de información, así como para el uso seguro de internet. \u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eEstablecer búsquedas efectivas, filtrar el contenido digital y organizar la información que utilizas.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eInteractuar con los principales motores de búsqueda tanto para buscar como para administrar la información.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eCitar y referenciar la información que usas.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eEvaluar y gestionar información de fuentes digitales e Internet.\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eTransformar la información en conocimiento para tomar decisiones informadas y resolver problemas en contextos variados y emergentes a nivel personal y social. \u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-f0f7668c-4cd5-4551-87be-7e9d2a2e4741\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX47+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f69a2d47-3d43-4a96-ab53-6878da4c617b\",\"productName\":\"Introducción a la computación en la nube (Cloud computing)\",\"productSlug\":\"learn/cloud-computing/universitat-politecnica-de-valencia-introduccion-a-la-computacion-en-la-nube-cloud-computing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/f69a2d47-3d43-4a96-ab53-6878da4c617b-c7b64a8da313.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\",\"Universitat Politècnica de València\"],\"partnerKeys\":[\"IBM\",\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$1c1\",\"shortDescription\":\"\u003cp\u003eDomine los conceptos básicos en Cloud Computing, desde modelos de servicio e implementación, hasta arquitectura en la nube, seguridad, nuevas tecnologías y posibles carreras.\u003c/p\u003e\",\"productOverview\":\"$1c2\",\"objectId\":\"course-f69a2d47-3d43-4a96-ab53-6878da4c617b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM_UPValenciaX+CC0101ES+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4f319730-1894-43c7-8c44-55763c53d17b\",\"productName\":\"Aplicaciones de IA con Watson\",\"productSlug\":\"learn/artificial-intelligence/ibm-aplicaciones-de-ia-con-watson\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4f319730-1894-43c7-8c44-55763c53d17b-a0ef4ef67cbe.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$1c3\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-PE\\\"\u003eAcelera las capacidades de inteligencia artificial de tu chatbot con IBM Watson Discovery y con la tecnología de Watson Assistant. Aprende a usar y programar herramientas y servicios auxiliares como Tone Analyzer y Personal Insights para crear consultas y extraer información de repositorios de big data.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e\u003cspan lang=\\\"EN-US\\\"\u003eAl inscribirse en este curso en línea, es probable que hayas estudiado inteligencia artificial, construido chatbots y tal vez incluso hayas utilizado Watson Assistant en el camino. Pero, ¿sabías que puedes acelerar el coeficiente intelectual de tu chatbot con IBM Watson Discovery, un servicio diseñado para revelar el valor oculto en los datos? Discovery se especializa en tomar los datos, estructurados o no, y extraer de ellos respuestas y patrones.\u003c/span\u003e\u003c/p\u003e\",\"objectId\":\"course-4f319730-1894-43c7-8c44-55763c53d17b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CB0106SP+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3eca89f1-1798-44b6-a445-f45024b56c55\",\"productName\":\"The What and How of Esports Management!\",\"productSlug\":\"learn/sports-business/hp-the-what-and-how-of-esports-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3eca89f1-1798-44b6-a445-f45024b56c55-a30e0c360f94.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Business \u0026 Management\"],\"partnerName\":[\"HP\"],\"partnerKeys\":[\"HP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\",\"fullDescription\":\"$1c4\",\"shortDescription\":\"\u003cp\u003eFrom managing Esports teams and events to marketing and content creation, learn the intricacies of Esports management with this comprehensive course from HP. \u003cstrong\u003eReceive a verified certificate for free using referral code\u003c/strong\u003e 6FJGJOTX7MFH5M2H\u003cstrong\u003e.\u003c/strong\u003e\u003c/p\u003e\",\"productOverview\":\"$1c5\",\"objectId\":\"course-3eca89f1-1798-44b6-a445-f45024b56c55\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HP+HPGG01.en+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7310ab7d-bd9a-4415-8bae-4517d7e18804\",\"productName\":\"Transformando la educación con IA: ChatGPT\",\"productSlug\":\"learn/chatgpt/universidad-galileo-transformando-la-educacion-con-ia-chat-gpt\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7310ab7d-bd9a-4415-8bae-4517d7e18804-929db83124b5.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Computer Science\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"$1c6\",\"shortDescription\":\"\u003cp\u003eDescubre cómo la inteligencia artificial, especialmente el modelo de lenguaje ChatGPT, puede ser utilizado para potenciar el proceso de enseñanza y aprendizaje.\u003c/p\u003e\",\"productOverview\":\"$1c7\",\"objectId\":\"course-7310ab7d-bd9a-4415-8bae-4517d7e18804\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GalileoX+GalileoXAI002+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"98c12e74-0f11-467e-ba5d-cf5bd98bb880\",\"productName\":\"Herramientas de ciberseguridad y métodos de aplicación\",\"productSlug\":\"learn/cybersecurity/universidades-anahuac-herramientas-de-ciberseguridad-y-metodos-de-aplicacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/98c12e74-0f11-467e-ba5d-cf5bd98bb880-dee0b38f61dc.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1c8\",\"shortDescription\":\"\u003cp\u003eConoce las nuevas herramientas y las buenas prácticas para gestionar sistemas de ciberseguridad que protejan los datos de tu organización.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentificarás los conceptos básicos de seguridad y su interrelación.\u003c/li\u003e\\n\u003cli\u003eComprenderás la importancia de la gestión de identidades, autenticación y accesos en la seguridad.\u003c/li\u003e\\n\u003cli\u003eAprenderás a proteger la base de datos de una organización a través de fundamentos de criptografía, monitoreo, generación de copias de seguridad y gestión de datos.\u003c/li\u003e\\n\u003cli\u003eGestionarás amenazas que vuelven vulnerable a la organización a partir de diferentes metodologías de inteligencia y respuesta a incidentes.\u003c/li\u003e\\n\u003cli\u003eAbrirás tu perspectiva identificando los próximos avances tecnológicos que se vincularán con estrategias y metodologías de ciberseguridad.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-98c12e74-0f11-467e-ba5d-cf5bd98bb880\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UVA.CP6.2x+2T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"944f18f4-831f-4ba4-a1c4-bb32827b1c53\",\"productName\":\"Matemáticas para la U\",\"productSlug\":\"learn/math/universidad-del-rosario-matematicas-para-la-u\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/944f18f4-831f-4ba4-a1c4-bb32827b1c53-7c4e460e59e8.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Math\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1c9\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eEn diversos cursos, el estudiante deberá aplicar competencias básicas en matemáticas, el propósito del presente curso es facilitar el desarrollo de dichas competencias por parte del estudiante. Adicionalmente, se pretende fortalecer la constancia y los buenos hábitos de estudio, considerando al estudiante como el actor principal de su aprendizaje, animando su participación activa y la progresión a un ritmo individualizado. Los temas centrales de este curso son: Números Reales, Exponentes y Radicales, Expresiones Algebraicas, Polinomios, Ecuaciones, Desigualdades, y Funciones.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eManejar los conceptos matemáticos básicos (aritmética, algebra, introducción a las funciones) y establecer conexiones entre estos conceptos. \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eAplicar los conceptos aprendidos en situaciones concretas de la vida cotidiana. \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eUsar la información aplicando modelos matemáticos y estrategias adaptadas para resolver problemas. \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eComunicar claramente la información por medio del lenguaje matemático. \u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eUtilizar las herramientas tecnológicas apropiadas (calculadora o computadora), en la ejecución de una tarea de naturaleza matemática.\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-944f18f4-831f-4ba4-a1c4-bb32827b1c53\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX15+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"18ea2328-22e0-4735-8c35-47260ff8b768\",\"productName\":\"Cribado en Revisiones Sistemáticas de Literatura con IA y metodología PRISMA, más allá del ChatGPT\",\"productSlug\":\"learn/science/universitat-politecnica-de-valencia-revision-sistematica-de-literatura-para-la-gestion-basada-en-evidencias-conocimientos-basicos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/18ea2328-22e0-4735-8c35-47260ff8b768-419186c76a32.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$1ca\",\"shortDescription\":\"\u003cp\u003ePotencia tus revisiones sistemáticas de literatura: sentence transformers como copiloto de cribado\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAprenderás a formular preguntas de investigación claras y a realizar búsquedas automáticas eficientes para obtener resultados relevantes en tu revisión sistemática.\u003c/li\u003e\\n\u003cli\u003eDominarás la elaboración del diagrama PRISMA, una herramienta clave para reportar revisiones sistemáticas con transparencia, precisión y reproducibilidad.\u003c/li\u003e\\n\u003cli\u003eDesarrollarás habilidades críticas para evaluar la solidez de los estudios, identificar posibles sesgos y determinar la relevancia de los hallazgos para tu investigación.\u003c/li\u003e\\n\u003cli\u003eUtilizarás herramientas como \\\"sentence transformers\\\" y modelos de IA para optimizar el proceso de cribado, manejando grandes volúmenes de información de manera eficiente.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-18ea2328-22e0-4735-8c35-47260ff8b768\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+RSL101x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4fb4cba4-aba9-4868-bdc7-430cfac96aad\",\"productName\":\"Impacto de la Inteligencia Artificial en la Innovación de Negocios\",\"productSlug\":\"learn/artificial-intelligence/universidades-anahuac-impacto-de-la-inteligencia-artificial-en-la-innovacion-de-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4fb4cba4-aba9-4868-bdc7-430cfac96aad-9514c515b3b5.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1cb\",\"shortDescription\":\"\u003cp\u003eEn este curso aprenderás sobre los factores importantes que se requieren para fundar un negocio exponencial, desde la importancia del contexto de la cuarta revolución industrial, hasta la definición de tu propósito como organización de la mano de la Inteligencia Artificial.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAprenderás qué es un negocio exponencial y los diferentes modelos que existen.\u003c/li\u003e\\n\u003cli\u003eAnalizarás las diferentes tecnologías exponenciales y de inteligencia artificial que están surgiendo en tu industria\u003c/li\u003e\\n\u003cli\u003eExplorarás las diferentes tendencias en el desarrollo y aplicación de las tecnologías de Inteligencia Artificial en tu industria.\u003c/li\u003e\\n\u003cli\u003eAprenderás la metodología de Running Lean y de producto mínimo viable para darle sentido a las acciones de tu empresa.\u003c/li\u003e\\n\u003cli\u003eSentarás el propósito de tu empresa mediante diferentes metodologías.\u003c/li\u003e\\n\u003cli\u003eDesarrollarás un prototipo que te permitirá validar y mejorar tu propuesta de producto mínimo viable.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4fb4cba4-aba9-4868-bdc7-430cfac96aad\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UVA.CP8.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"be260c23-3979-4ecf-8b0b-2c84b6184966\",\"productName\":\"Protección de datos personales en la era digital\",\"productSlug\":\"learn/data-privacy/pontificia-universidad-javeriana-proteccion-de-datos-personales-en-la-era-digital\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/be260c23-3979-4ecf-8b0b-2c84b6184966-16c311d42423.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Computer Science\",\"Communication\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1cc\",\"shortDescription\":\"\u003cp\u003eConozca conceptos, principios, roles, tendencias y tensiones sobre privacidad y protección de datos personales que surgen al procesar datos personales en la era digital.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eNociones fundamentales de privacidad y protección de datos.\u003c/li\u003e\\n\u003cli\u003eHistoria, principios, posiciones y enfoques de la protección de datos y la interrelación entre la protección de datos personales y la privacidad.\u003c/li\u003e\\n\u003cli\u003eConceptos básicos y elementos comunes de las leyes de protección de datos aplicadas a la tecnología, responsabilidad de los distintos agentes, aplicación territorial y necesidades de armonización regulatoria.\u003c/li\u003e\\n\u003cli\u003eProtección de datos personales en el ecosistema digital; Retos y tensiones derivados del uso de plataformas, herramientas y servicios digitales y cómo afrontarlos.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-be260c23-3979-4ecf-8b0b-2c84b6184966\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+GDD1.1x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"784094cc-8fbd-40d1-a7a9-e052a7e01ecc\",\"productName\":\"Introducción al Internet de las Cosas (IoT)\",\"productSlug\":\"learn/electronics/universitat-politecnica-de-valencia-introduccion-al-internet-de-las-cosas-iot\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/784094cc-8fbd-40d1-a7a9-e052a7e01ecc-741d07fd8fec.png\",\"productType\":\"Course\",\"attributes\":[\"Electronics\",\"Communication\",\"Computer Science\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"\u003cp\u003eEl internet de las cosas (Internet of things o IoT) es el presente y el futuro de la tecnología. Tanto si tienes algo de experiencia con la electrónica y deseas desarrollar proyectos como si no tienes ninguna, este curso online te dara los conocimientos iniciales necesarios para comenzar a crear dispositivos increibles capaces de medir y controlar señales físicas. Este curso de informática y electrónica te introduce en este campo usando placas Arduino y ESP. Este es un curso preliminar en el que tratamos conceptos básicos de electrónica y programación. Si ya conoces estos conceptos básicos, la segunda parte de este curso será de su interés, ya que será donde comenzaremos a crear dispositivos inteligentes.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEste es un curso en línea preliminar en el que tratamos los conceptos básicos de electronica y programación utilizando placas Arduino y ESP.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eComprender los conceptos básicos de la electrónica para programar microcontroladores (digitales, analógicos, PWM, buses de comunicación, temporizadores, etc.)\u003c/li\u003e\\n\u003cli\u003eProgramar dispositivos Arduino y ESP\u003c/li\u003e\\n\u003cli\u003eLeer datos de sensores ambientales (temperatura, humedad, luz)\u003c/li\u003e\\n\u003cli\u003eControlar actuadores como un ventilador, una luz o una bomba de agua usando un relé\u003c/li\u003e\\n\u003cli\u003eMostrar información en pantallas LCD para imprimir datos de su dispositivo\u003c/li\u003e\\n\u003cli\u003eUsar botones y LEDs (y también LEDs RGB) para generar una interfaz de usuario básica\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-784094cc-8fbd-40d1-a7a9-e052a7e01ecc\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+IOTES101.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ab195554-1436-46cf-9fa2-6c1dd180be14\",\"productName\":\"Ciencia de Datos Aplicada al Marketing\",\"productSlug\":\"learn/data-science/universidades-anahuac-ciencia-de-datos-aplicada-al-marketing\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ab195554-1436-46cf-9fa2-6c1dd180be14-5eecfd193e9d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1cd\",\"shortDescription\":\"\u003cp\u003eToma decisiones en marketing basadas en los datos.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentificar variables importantes en la extracción de datos \u003c/li\u003e\\n\u003cli\u003eRealizar encuestas de acuerdo al tipo de información que se desea obtener\u003c/li\u003e\\n\u003cli\u003eUtilizar como herramientas de análisis Excel y SPSS\u003c/li\u003e\\n\u003cli\u003eConocer diversas técnicas de análisis estadístico multivariable\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ab195554-1436-46cf-9fa2-6c1dd180be14\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAMY.MO.2x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d453d315-34c7-4649-9c85-4390309d3a06\",\"productName\":\"Trabajo en equipo en entornos presenciales, remotos e híbridos\",\"productSlug\":\"learn/remote-work/universitat-politecnica-de-valencia-trabajo-en-equipo-en-entornos-presenciales-remotos-e-hibridos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d453d315-34c7-4649-9c85-4390309d3a06-63be85b7cdbe.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$1ce\",\"shortDescription\":\"\u003cp\u003eAprende a trabajar mejor en equipo tanto presenciales como remotos\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eCrear y estructurar equipos digitales\u003c/li\u003e\\n\u003cli\u003eCooperar activamente con otras personas en los espacios remotos\u003c/li\u003e\\n\u003cli\u003eEstructurar y clasificar la información generada por el equipo para recuperarla y gestionarla eficientemente\u003c/li\u003e\\n\u003cli\u003eProponer nuevas ideas, procesos o crear soluciones para resolver problemas en equipo a través de las tecnologías digitales\u003c/li\u003e\\n\u003cli\u003eUtilizar las funciones de colaboración de los paquetes de software, los servicios basados en web y las redes sociales para colaborar en equipo\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-d453d315-34c7-4649-9c85-4390309d3a06\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+LCER201.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"dc33f90f-af6b-459c-9d2f-9cb3d3f9b276\",\"productName\":\"Habilidades de Comunicación interpersonal adaptada a equipos remotos\",\"productSlug\":\"learn/business-administration/universitat-politecnica-de-valencia-habilidades-de-comunicacion-interpersonal-adaptada-a-equipos-remotos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/dc33f90f-af6b-459c-9d2f-9cb3d3f9b276-296fa6dc248d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$1cf\",\"shortDescription\":\"\u003cp\u003eMejora tus habilidades de comunicación en equipos remotos\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eSeleccionar y mostrar un estilo asertivo en entornos digitales\u003c/li\u003e\\n\u003cli\u003eInteractuar a través de una variedad de tecnologías digitales y comprender los medios de comunicación digital apropiados para un contexto dado\u003c/li\u003e\\n\u003cli\u003eSer capaz de crear representaciones del conocimiento (p.e. mapas mentales, diagramas, “rich pictures” y modelos visuales) utilizando medios digitales\u003c/li\u003e\\n\u003cli\u003eConocer las normas de comportamiento en el uso de las comunicaciones en entornos digitales\u003c/li\u003e\\n\u003cli\u003eDecidir cuándo y cómo dar feedback/feedforward en entornos digitales\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-dc33f90f-af6b-459c-9d2f-9cb3d3f9b276\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+LCER201.3x+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"76e7a574-c9bf-4e3c-8485-2caf39eed33a\",\"productName\":\"Una guía completa del diseño de juegos\",\"productSlug\":\"learn/computer-science/hp-una-guia-completa-del-diseno-de-juegos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/76e7a574-c9bf-4e3c-8485-2caf39eed33a-6e9010c34a04.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"HP\"],\"partnerKeys\":[\"HP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\",\"fullDescription\":\"$1d0\",\"shortDescription\":\"\u003cp\u003eDesde la creación de mundos de juego inmersivos y el diseño de mecánicas de juego atrapantes hasta el dominio de la narración y la creación de niveles, explora las particularidades del diseño de juegos con este completo curso de HP. \u003cstrong\u003eRecibe un certificado verificado de forma gratuita con este código de referencia\u003c/strong\u003e\u003cstrong\u003e6FJGJOTX7MFH5M2H\u003c/strong\u003e\u003c/p\u003e\",\"productOverview\":\"$1d1\",\"objectId\":\"course-76e7a574-c9bf-4e3c-8485-2caf39eed33a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HP+HPGG02.es+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b2d49b02-9abf-4736-a3c4-801d52ec5e75\",\"productName\":\"Liderazgo de equipos remotos\",\"productSlug\":\"learn/remote-work/universitat-politecnica-de-valencia-liderazgo-de-equipos-remotos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b2d49b02-9abf-4736-a3c4-801d52ec5e75-32b5a2c86f26.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"\u003cp\u003eEn entornos remotos el liderar equipos de forma correcta, es, si cabe, más esencial y, además, más complejo de realizar. Por ello, queremos ayudar a preparar a las personas que ocupan puestos de mando o que participan en equipos de trabajo a liderar de manera efectiva en contextos de trabajo remoto.\u003c/p\u003e\\n\u003cp\u003eEste curso se aplica en todos los puestos de trabajo de coordinación o gestión en los que se requiera trabajar en equipo de forma remota.\u003c/p\u003e\\n\u003cp\u003eConstruiremos el aprendizaje mediante recursos digitales, ejemplos de experiencias, auto-diagnósticos de las personas inscritas y feedback de pares para completar una información 360º que permita trazar un plan de acción de gestión de la competencia adquirida.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAprende a liderar equipos en entornos de trabajo remotos\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAplicar diferentes estilos de liderazgo en entornos digitales adaptados al perfil de colaboradores\u003c/li\u003e\\n\u003cli\u003eMostrar diferentes comportamientos para evitar amenazas para el bienestar psicológico de los colaboradores cuando se utilizan las tecnologías digitales\u003c/li\u003e\\n\u003cli\u003eDecidir cuáles son las formas más apropiadas para mejorar o actualizar la propia competencia de liderazgo en entornos digitales\u003c/li\u003e\\n\u003cli\u003eEvaluar el desarrollo en otras personas de la competencia de liderazgo en entornos digitales\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b2d49b02-9abf-4736-a3c4-801d52ec5e75\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+LCER201.2x+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"59008c74-35a2-46eb-9add-96970951f403\",\"productName\":\"Introducción a la analítica de negocios\",\"productSlug\":\"learn/business-analytics/universidad-del-rosario-introduccion-a-la-analitica-de-negocios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/59008c74-35a2-46eb-9add-96970951f403-bf9f0ea13d38.png\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1d2\",\"shortDescription\":\"\u003cp\u003eEn este curso se presentarán los conceptos básicos y claves de la analítica de datos empresarial respondiendo a las preguntas qué es, para qué sirve y cómo puede ser usada para resolver problemas de gran complejidad, a través de un conjunto de herramientas que le ayudarán a comprender su funcionamiento de la analítica de negocios.\u003c/p\u003e\",\"productOverview\":\"\u003col\u003e\\n\u003cli\u003eComprender el proceso global de la analítica de datos en la estrategia corporativa y herramientas disponibles para su gestión, modelamiento, y uso.\u003c/li\u003e\\n\u003cli\u003eReconocer el rol de la analítica de datos como sistema de generación de valor y toma de decisiones efectiva.\u003c/li\u003e\\n\u003cli\u003eDescribir adecuadamente las principales herramientas de modelamiento con analítica de datos, su uso y aplicabilidad.\u003c/li\u003e\\n\u003cli\u003eConocer la visualización de información, su correcto análisis y generación de reportes, para facilitar la interpretación de los resultados.\u003c/li\u003e\\n\u003c/ol\u003e\",\"objectId\":\"course-59008c74-35a2-46eb-9add-96970951f403\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX39+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"32b2856c-62fe-49e9-8e17-f0b4eaccf644\",\"productName\":\"Fundamentos de las comunicaciones móviles: en la palma de tu mano\",\"productSlug\":\"learn/engineering/universidad-carlos-iii-de-madrid-fundamentos-de-las-comunicaciones-moviles-en-la-palma-de-tu-mano\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/32b2856c-62fe-49e9-8e17-f0b4eaccf644-9e217dec29a9.png\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Communication\"],\"partnerName\":[\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ffbbf698-c445-4595-9466-b7cf8564a74f-329c8bde00db.png\",\"fullDescription\":\"\u003cp\u003eLas comunicaciones móviles son un motor de la economía y lideran el crecimiento de las telecomunicaciones a nivel mundial. Su evolución ha sido vertiginosa hasta el punto de que hoy en día existen más teléfonos móviles (activos) que personas en el planeta. Por tanto, gran parte de las personas que nos rodean tienen un teléfono celular, saben utilizar el terminal, pero, ¿cuántas de ellas conocen el funcionamiento de un sistema de comunicaciones móviles?\u003cbr /\u003e\\nCon este curso en línea queremos dar a conocer, en un lenguaje sencillo y sin necesidad de conocimientos previos de ingeniería, los fundamentos, arquitectura, evolución y tecnologías clave de los sistemas de comunicaciones móviles.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEste curso en línea presenta las comunicaciones móviles de forma accesible a cualquier persona que tenga interés por conocer en detalle sus fundamentos.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eEste curso en línea te ayudará a responder las siguientes preguntas: \u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e¿Cómo se transmite la información y llega hasta nosotros en cualquier lugar del mundo sin necesidad de cables?\u003c/li\u003e\\n\u003cli\u003e¿Qué elementos forman un sistema de comunicaciones móviles y cómo funcionan?\u003c/li\u003e\\n\u003cli\u003e¿Cómo tiene lugar la comunicación en movilidad, en cualquier lugar y para cualquier persona?\u003c/li\u003e\\n\u003cli\u003e¿Cómo sabe el sistema dónde nos encontramos para hacernos llegar la llamada?\u003c/li\u003e\\n\u003cli\u003e¿Cuál es la evolución previsible y qué podremos hacer con los móviles en un futuro cercano?\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-32b2856c-62fe-49e9-8e17-f0b4eaccf644\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UC3Mx+TSC.1-ESx+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"02a6e8a4-d95b-4a0c-9c45-9aa5fa916827\",\"productName\":\"Integridad académica en la educación digital\",\"productSlug\":\"learn/education/universidad-galileo-integridad-academica-en-la-educacion-digital\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/02a6e8a4-d95b-4a0c-9c45-9aa5fa916827-4c451c7856ae.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"Universidad Galileo\"],\"partnerKeys\":[\"GalileoX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/bc4110ab-affc-4aa3-9b65-f3df49e6379f-5fbf95d129d1.png\",\"fullDescription\":\"$1d3\",\"shortDescription\":\"\u003cp\u003eConoce la importancia de la integridad académica, los aspectos, generalidades y medios de aplicación en la educación digital.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eAl finalizar el curso los participantes tendrán la capacidad de:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eIdentificar las bases y generalidades de la integridad académica desde su definición hasta su aplicación en la labor docente. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDescribir la aplicación de los valores que rigen el proceso de integridad académica en la educación digital.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eReconocer acciones relacionadas a la deshonestidad académica. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstablecer estrategias para construir una cultura de integridad académica dentro de la institución educativa. \u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eDiscriminar el uso de la tecnología como aliada de la integridad académica aplicadas a su contexto.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-02a6e8a4-d95b-4a0c-9c45-9aa5fa916827\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GalileoX+Integridad_001+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"99d94f94-8358-4cbf-887f-8dbf06e12119\",\"productName\":\"Neurociencias y movimiento humano con IA\",\"productSlug\":\"learn/medicine/universidad-del-rosario-neurociencias-y-movimiento-humano-con-ia\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/99d94f94-8358-4cbf-887f-8dbf06e12119-07a61f2f1add.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Health \u0026 Safety\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1d4\",\"shortDescription\":\"\u003cp\u003eExplora los principios fundamentales de la neuroanatomía y la relación entre el cerebro y el movimiento humano mediante un enfoque práctico y aplicado con el uso de inteligencia artificial. Aborda trastornos neurológicos como el Parkinson y promueve estrategias no farmacológicas, como el ejercicio físico, para potenciar la neuroplasticidad y mejorar la calidad de vida.\u003c/p\u003e\",\"productOverview\":\"$1d5\",\"objectId\":\"course-99d94f94-8358-4cbf-887f-8dbf06e12119\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX139+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e463af35-245d-4720-b295-e3bf95beeed7\",\"productName\":\"Prompt Engineering and Advanced ChatGPT\",\"productSlug\":\"learn/computer-programming/edx-advanced-chatgpt\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e463af35-245d-4720-b295-e3bf95beeed7-e55c06d48912.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"edX\"],\"partnerKeys\":[\"edX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f8cb2c9-589b-4d1e-88c1-b01a02db3a9c-42611123eb6a.png\",\"fullDescription\":\"$1d6\",\"shortDescription\":\"\u003cp\u003eWelcome to Advanced ChatGPT! This course is designed to teach advanced techniques in ChatGPT, an artificial intelligence chatbot developed by OpenAI and launched in November 2022. We’ll cover advanced techniques for prompting ChatGPT, applications for multiple use cases, integrating it with other tools, and developing applications on top while considering its limitations. We hope you have a great time learning about ChatGPT.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the advanced techniques that can be used to prompt ChatGPT, including the use of natural language processing and machine learning. \u003c/li\u003e\\n\u003cli\u003eExplore the different applications of ChatGPT in various industries, such as healthcare, finance, education, and customer service, among others. \u003c/li\u003e\\n\u003cli\u003eLearn how to integrate ChatGPT with other tools and technologies, such as NLP and ML, to create more advanced and effective chatbot applications. \u003c/li\u003e\\n\u003cli\u003eDevelop a deep understanding of the limitations of ChatGPT and how to work around them to build robust and effective chatbot applications.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-e463af35-245d-4720-b295-e3bf95beeed7\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:edX+ChatGPT102+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"bc0813b9-3e3a-4250-b0be-2659fe8ed36d\",\"productName\":\"Model-based Systems Engineering: Foundations\",\"productSlug\":\"learn/engineering/israelx-model-based-systems-engineering-foundations\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/bc0813b9-3e3a-4250-b0be-2659fe8ed36d-9660894b906d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Science\"],\"partnerName\":[\"IsraelX\",\"Technion\"],\"partnerKeys\":[\"IsraelX\",\"Technion\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"$1d7\",\"shortDescription\":\"\u003cp\u003eThe course provides basic knowledge and tools for Model-based Systems Engineering with Object-Process Methodology, focusing on conceptual modeling of a system, giving learners a competitive advantage over their peers.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e● The basics of Model-based Systems Engineering (MBSE) \u003c/p\u003e\\n\u003cp\u003e● The basics of Object-Process Methodology (OPM) \u003c/p\u003e\\n\u003cp\u003e● How to construct conceptual models in OPM using OPCloud \u003c/p\u003e\\n\u003cp\u003e● How to communicate the purpose, function, and enablers of a system via a conceptual model \u003c/p\u003e\\n\u003cp\u003e● How to construct conceptual models of technological, social and natural systems \u003c/p\u003e\\n\u003cp\u003e● How to identify the function, structure, and behavior of a system \u003c/p\u003e\\n\u003cp\u003e● How to manage the complexity of a system model \u003c/p\u003e\\n\u003cp\u003eHow to model synchronous and asynchronous systems\u003c/p\u003e\",\"objectId\":\"course-bc0813b9-3e3a-4250-b0be-2659fe8ed36d\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+MBSE101+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"dd47b06f-c3ee-45b3-840f-a295bfefd3db\",\"productName\":\"Big Data sin misterios\",\"productSlug\":\"learn/big-data/inter-american-development-bank-big-data-sin-misterios\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/dd47b06f-c3ee-45b3-840f-a295bfefd3db-5a01e86f0c57.jpg\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Economics \u0026 Finance\",\"Business \u0026 Management\"],\"partnerName\":[\"Inter-American Development Bank\"],\"partnerKeys\":[\"IDBx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/f87a494a-5b61-4c1c-b9ff-0fefec519326-6ea0a51177d0.png\",\"fullDescription\":\"$1d8\",\"shortDescription\":\"\u003cp\u003eTransforma los datos en valor. Aprende el potencial de Big Data para aumentar la eficiencia y eficacia de tu organización en este MOOC desarrollado con Telefónica.\u003c/p\u003e\\n\u003cp\u003e51,5 % de los estudiantes que participaron en la encuesta dicen que el curso les servirá para mejorar la capacidad para formular, implementar, y/o evaluar políticas públicas.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eEn este curso, aprenderás:\u003c/p\u003e\\n\u003cp\u003e1. Los principales fundamentos del Big Data y el cambio de paradigma que está transformando las organizaciones.\u003c/p\u003e\\n\u003cp\u003e2. Ejemplos reales de casos de uso Big Data.\u003c/p\u003e\\n\u003cp\u003e3. Los componentes y fases de la metodología de procesamiento de grandes datos.\u003c/p\u003e\\n\u003cp\u003e4. Qué es el gobierno del dato y cuáles son los elementos necesarios para que sea eficaz y eficiente.\u003c/p\u003e\\n\u003cp\u003e5. Qué es la analítica avanzada de datos.\u003c/p\u003e\\n\u003cp\u003e6. Cuáles son las tecnologías catalizadoras del Big Data.\u003c/p\u003e\\n\u003cp\u003e7. Las herramientas de visualización de datos más eficaces para presentar los resultados a las diferentes audiencias.\u003c/p\u003e\",\"objectId\":\"course-dd47b06f-c3ee-45b3-840f-a295bfefd3db\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IDBx+IDB35x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"746380c2-bfe5-4500-9109-080008fa5e5e\",\"productName\":\"Visualización y presentación de datos\",\"productSlug\":\"learn/computer-science/pontificia-universidad-javeriana-visualizacion-y-presentacion-de-datos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/746380c2-bfe5-4500-9109-080008fa5e5e-08d1898a22af.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1d9\",\"shortDescription\":\"\u003cp\u003eAprende sobre conceptos relacionados a la visualización de datos, así como estrategias para manipular, visualizar y comunicar datos efectivamente usando Google Data Studio.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAplicar técnicas para el diseño y elaboración de visualizaciones de datos a través de la comprensión de las características de los datos, la deconstrucción de los elementos visuales y la representación visual expresiva y efectiva, apoyándose en tecnologías para definir visualizaciones que comuniquen con expresividad y efectividad el mensaje\u003c/li\u003e\\n\u003cli\u003eIdentificar las características de los datos a través del estudio de los tipos de datasets disponibles, las tipologías de los datos y las razones que motivan las visualizaciones para habilitar el mapeo de los datos con la representación visual adecuada, comunicando el mensaje objetivo de la visualización\u003c/li\u003e\\n\u003cli\u003eEmplear un conjunto de datos que aborde una problemática de estudio relevante, utilizando software especializado, a través de la creación de visualizaciones de datos que promuevan la comprensión y comunicación efectiva de la información.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-746380c2-bfe5-4500-9109-080008fa5e5e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+C-VPD1+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e97163cb-54d8-421e-83c6-1b55c980dcab\",\"productName\":\"The Divine Comedy: Dante's Journey to Freedom, Part 1\",\"productSlug\":\"learn/literature/georgetown-university-the-divine-comedy-dante-s-journey-to-freedom-part-1\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e97163cb-54d8-421e-83c6-1b55c980dcab.jpg\",\"productType\":\"Course\",\"attributes\":[\"Humanities\",\"Literature\",\"Philosophy \u0026 Ethics\"],\"partnerName\":[\"Georgetown University\"],\"partnerKeys\":[\"GeorgetownX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/300a9275-e360-4599-92db-8c2222d5f614-712b2867e667.png\",\"fullDescription\":\"$1da\",\"shortDescription\":\"Jorge Luis Borges, the great Argentine writer, said that no one should deny themselves the pleasure of reading Dante's Divine Comedy. In this course, you will discover precisely what Borges meant.\",\"productOverview\":\"$1db\",\"objectId\":\"course-e97163cb-54d8-421e-83c6-1b55c980dcab\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:GeorgetownX+HUMX421-02x+1T2016\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6d5be686-a896-48f4-8377-c160e936057a\",\"productName\":\"Marketing Digital: Desde SEO hasta Analítica de Datos\",\"productSlug\":\"learn/digital-marketing/universidades-anahuac-marketing-digital-desde-seo-hasta-analitica-de-datos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6d5be686-a896-48f4-8377-c160e936057a-d80f41fed410.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Communication\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1dc\",\"shortDescription\":\"\u003cp\u003eSumérgete en el corazón del marketing digital, descifra las claves del éxito en la era digital y transforma tu conexión con el mundo en línea. ¡Eleva tu estrategia y destaca en el panorama empresarial del siglo XXI!\\\"\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eReconoce los cimientos del marketing digital.\u003c/li\u003e\\n\u003cli\u003eDescribe el customer journey y marketing funnel.\u003c/li\u003e\\n\u003cli\u003eIdentifica y genera estrategias para la experiencia del cliente.\u003c/li\u003e\\n\u003cli\u003eDescubre el Social Media y canales promocionales.\u003c/li\u003e\\n\u003cli\u003eDistingue las particularidades de los motores de búsqueda.\u003c/li\u003e\\n\u003cli\u003eValora la publicidad y posicionamiento pagado.\u003c/li\u003e\\n\u003cli\u003eComprende la medición y rastreo de métricas.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6d5be686-a896-48f4-8377-c160e936057a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UVA.CP10.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ebc9a296-fc6b-4a79-b3ad-64228b123da5\",\"productName\":\"Redes de computadores\",\"productSlug\":\"learn/computer-networking/universidad-del-rosario-redes-de-computadores\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ebc9a296-fc6b-4a79-b3ad-64228b123da5-1a29d17afb9e.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Math\",\"Engineering\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1dd\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES\\\"\u003eAprende los fundamentos de las redes de computadores, incluyendo su arquitectura, protocolos y los aspectos a considerar para hacerlas seguras.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"ES\\\"\u003eComprender la arquitectura actual de internet basada en el modelo TCP/IP\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003eEntender los principios de los protocolos de la capa de aplicación HTTP y DNS\u003c/li\u003e\\n\u003cli\u003eEntender el funcionamiento de los protocolos de la capa de transporte TCP y UDP\u003c/li\u003e\\n\u003cli\u003eReconocer la forma como se realiza el direccionamiento IP\u003c/li\u003e\\n\u003cli\u003eComprender los algoritmos de enrutamiento más esenciales\u003c/li\u003e\\n\u003cli\u003eDiferenciar los medios de transmisión más comunes dentro de una red de computadores\u003c/li\u003e\\n\u003cli\u003eEntender las diferencias esenciales entre una red cableada y una inalámbrica\u003c/li\u003e\\n\u003cli\u003eIdentificar vulnerabilidades comunes en protocolos de red\u003c/li\u003e\\n\u003cli\u003eReconocer los mecanismos de protección más comunes usados para el aseguramiento de una red de computadores.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-ebc9a296-fc6b-4a79-b3ad-64228b123da5\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX45+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"46549be2-11d6-4d35-b7a1-42ba7df4728c\",\"productName\":\"Introducción al Internet de las cosas (IoT) y sus aplicaciones\",\"productSlug\":\"learn/iot-internet-of-things/universidad-del-rosario-introduccion-al-internet-de-las-cosas-iot-y-sus-aplicaciones\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/46549be2-11d6-4d35-b7a1-42ba7df4728c-9b814f5f8336.jpg\",\"productType\":\"Course\",\"attributes\":[\"Health \u0026 Safety\",\"Engineering\",\"Computer Science\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1de\",\"shortDescription\":\"\u003cp\u003eEn este curso en línea aprenderás el concepto de Internet de las Cosas, como se realiza la interconexión digital entre dispositivos inteligentes utilizando redes de comunicación como Internet.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eEntender los conceptos basicos del internet de las cosas\u003c/li\u003e\\n\u003cli\u003eManejo de herramientas para el desarrollo de soluciones (IoT)\u003c/li\u003e\\n\u003cli\u003eIdentificar los principales componentes de hardware, tarjetas y sensores utilizados en IoT\u003c/li\u003e\\n\u003cli\u003eUtilizar los principales protocolos de comunicación utilizados en IoT\u003c/li\u003e\\n\u003cli\u003eDesarrollo de casos reales en donde se presentan soluciones (IoT)\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-46549be2-11d6-4d35-b7a1-42ba7df4728c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX11+3T2024a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3322b91b-4e96-4467-aaff-33ff2f012296\",\"productName\":\"Gobernanza de datos personales en la era digital\",\"productSlug\":\"learn/law/pontificia-universidad-javeriana-gobernanza-de-datos-personales-en-la-era-digital\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3322b91b-4e96-4467-aaff-33ff2f012296-ec036e860dbd.png\",\"productType\":\"Course\",\"attributes\":[\"Law\",\"Computer Science\",\"Business \u0026 Management\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1df\",\"shortDescription\":\"\u003cp\u003eAprende qué es la gobernanza de datos personales y desarrolla habilidades para diseñar e implementar leyes y políticas públicas en materia de datos personales en la era digital.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConcepto de gobernanza de protección de datos personales. El curso online explica cómo la protección de datos y la privacidad derivan en la gobernanza organizacional y estudia el impacto de la misma en una sociedad y escomía digital\u003c/li\u003e\\n\u003cli\u003eTemas y cuestiones clave de protección de datos para quienes formulan políticas públicas en el entorno online. La perspectiva de política pública en materia de gobernanza de datos personales en la era digital\u003c/li\u003e\\n\u003cli\u003eDesafíos de quienes aplican las normas de protección de datos al momento de crear y poner en marcha programas de cumplimiento (compliance). Aspectos corporativos y organizacionales de la gobernanza de datos personales para abordar los desafíos que las organizaciones enfrentan al momento de cumplir con leyes y regulaciones locales\u003c/li\u003e\\n\u003cli\u003eTendencias y tenciones de la protección de datos en la era digital: desde computación en la nube e Internet de las Cosas (IoT), a blockchain, aprenziaje automático e Inteligencia Artificial\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-3322b91b-4e96-4467-aaff-33ff2f012296\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+GDD1.2x+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"6a776122-5c04-4af3-80a1-351cc73c1d91\",\"productName\":\"Utopedia: Educación para la sociedad del conocimiento\",\"productSlug\":\"learn/teacher-training/universidad-carlos-iii-de-madrid-utopedia-educacion-para-la-sociedad-del-conocimiento\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6a776122-5c04-4af3-80a1-351cc73c1d91-b5d2aa80bc41.jpg\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\",\"Humanities\",\"Social Sciences\"],\"partnerName\":[\"Universidad Carlos III de Madrid\"],\"partnerKeys\":[\"UC3Mx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ffbbf698-c445-4595-9466-b7cf8564a74f-329c8bde00db.png\",\"fullDescription\":\"$1e0\",\"shortDescription\":\"\u003cp\u003eEmerge una sociedad del conocimiento distinta a la industrial y necesita una educación adaptada a otras exigencias de formación. ¿Cuáles y por qué?\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eDisponer de unos elementos de análisis del momento actual.\u003c/li\u003e\\n\u003cli\u003eApreciar el valor de la educación como palanca y como gozne. Como palanca para remover las resistencias al cambio cultural que se necesita. Y como gozne para que la transformación de la sociedad gire en torno a unos valores que no reproduzcan el modelo actual.\u003c/li\u003e\\n\u003cli\u003eAceptar, para poder actuar en consecuencia, la incertidumbre y el riesgo del cambio y que bajo el nombre de sociedad del conocimiento (ya acuñado y quizá por el excesivo uso, ya desgastado) pueden darse modelos de sociedad muy distintos, y algunos de ellos poco deseables.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-6a776122-5c04-4af3-80a1-351cc73c1d91\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UC3Mx+HGA.1x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"e3debe04-85f2-4612-88c9-eeb9093aefb0\",\"productName\":\"Introducción a la ciberseguridad\",\"productSlug\":\"learn/cybersecurity/universidad-del-rosario-introduccion-a-la-ciberseguridad\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/e3debe04-85f2-4612-88c9-eeb9093aefb0-d11b1aa3fa7d.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Math\",\"Engineering\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"\u003cp\u003eLa ciberseguridad ha tomado una especial relevancia en el mundo moderno por su capacidad de proteger información frente a ataques cibernéticos, convirtiéndose en una de las áreas de mayor empleabilidad hoy en día.\u003c/p\u003e\\n\u003cp\u003eEste curso te brindará una visión completa de la ciberseguridad al permitirte aprender lo esencial de varios de sus principales subdominios: seguridad en el desarrollo de software, la criptografía, el hacking ético y la informática forense.\u003c/p\u003e\\n\u003cp\u003eAprende a través de metodologías de enseñanza dinámicas ofrecidas por la Escuela de ingeniería, Ciencia y Tecnología de la Universidad del Rosario (Colombia).\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAdquiere conocimientos demandados por la industria en varias de las áreas más importantes de la ciberseguridad: seguridad en el desarrollo de software, criptografía, hacking ético e informática forense.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e● Identificar los conceptos básicos de ciberseguridad que te permitirán entender el resto de módulos del curso\u003c/p\u003e\\n\u003cp\u003e● Reconocer y analizar vulnerabilidades en un servicio web como lo haría un hacker ético\u003c/p\u003e\\n\u003cp\u003e● Realizar la inspección forense de un malware utilizando los principios de la informática forense\u003c/p\u003e\\n\u003cp\u003e● Identificar y corregir vulnerabilidades en el código fuente de un software\u003c/p\u003e\\n\u003cp\u003e● Conocer criptosistemas de la antigüedad y de la era moderna.\u003c/p\u003e\\n\u003cp\u003e● Entender criptosistemas modernos y el funcionamiento de algunas primitivas como funciones de hash y blockchain.\u003c/p\u003e\",\"objectId\":\"course-e3debe04-85f2-4612-88c9-eeb9093aefb0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX29+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7c8fe4f6-562f-461c-8dff-8653bbbcdd2e\",\"productName\":\"Mejora tu Negocio con Inteligencia Artificial\",\"productSlug\":\"learn/artificial-intelligence/universidades-anahuac-mejora-tu-negocio-con-inteligencia-artificial\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7c8fe4f6-562f-461c-8dff-8653bbbcdd2e-ced242bc5d9b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\",\"Computer Science\",\"Economics \u0026 Finance\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1e1\",\"shortDescription\":\"\u003cp\u003eOptimiza tu negocio con las nuevas herramientas de inteligencia artificial para brindar una mejor experiencia a tus clientes.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003e\\n\u003cp\u003eReconocerás la influencia de la IA en los negocios de la era digital.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eAprenderás la aplicabilidad de los problemas relacionados al aprendizaje máquina.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003cli\u003e\\n\u003cp\u003eEstudiarás distintos casos de aplicación utilizando la IA en negocios.\u003c/p\u003e\\n\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-7c8fe4f6-562f-461c-8dff-8653bbbcdd2e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UVA.CP8.2x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"03d8e31a-b91c-47f9-a674-06f3e6c9c741\",\"productName\":\"Fundamentos de investigación científica\",\"productSlug\":\"learn/research/universidad-del-rosario-fundamentos-de-investigacion-cientifica\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/03d8e31a-b91c-47f9-a674-06f3e6c9c741-4b22096b3b63.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Medicine\",\"Biology \u0026 Life Sciences\"],\"partnerName\":[\"Universidad del Rosario\"],\"partnerKeys\":[\"URosarioX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/e0bfb887-eabd-4f4a-8583-7e5aa368b274-cb687d8acb0e.png\",\"fullDescription\":\"$1e2\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-ES\\\"\u003eConoce las herramientas básicas para elaborar un proyecto de investigación en el área de ciencias de la salud, en línea con altos estándares metodológicos y bioéticos que involucran rigurosidad y calidad.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$1e3\",\"objectId\":\"course-03d8e31a-b91c-47f9-a674-06f3e6c9c741\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:URosarioX+URX66+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"63932bfc-fac0-4599-9e76-a1b07c55971e\",\"productName\":\"Model-based Systems Engineering: Advanced Approaches with OPM\",\"productSlug\":\"learn/engineering/israelx-model-based-systems-engineering-advanced-approaches-with-opm\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/63932bfc-fac0-4599-9e76-a1b07c55971e-cbbcc81ff81d.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\"],\"partnerName\":[\"IsraelX\",\"Technion\"],\"partnerKeys\":[\"IsraelX\",\"Technion\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8c9a342a-2a11-4845-ba09-14b85645d8ac-9dd7b26745d2.png\",\"fullDescription\":\"$1e4\",\"shortDescription\":\"\u003cp\u003eThe course provides advanced knowledge and tools for Model-Based Systems Engineering with Object-Process Methodology, focusing on conceptual modeling of systems, giving learners a competitive advantage over their peers.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eRefining Object-Process Diagrams through advanced concepts, including: \u003c/p\u003e\\n\u003cp\u003e● Conditions \u0026amp; decisions \u003c/p\u003e\\n\u003cp\u003e● Logical operators \u003c/p\u003e\\n\u003cp\u003e● Path defining and following \u003c/p\u003e\\n\u003cp\u003e● Iterations \u003c/p\u003e\\n\u003cp\u003e● Process duration \u003c/p\u003e\\n\u003cp\u003e● Interruptions \u003c/p\u003e\\n\u003cp\u003e● Probabilities and constraints \u003c/p\u003e\\n\u003cp\u003e● Problem definition and requirements modeling \u003c/p\u003e\\n\u003cp\u003e● Solution and system design through modeling\u003c/p\u003e\",\"objectId\":\"course-63932bfc-fac0-4599-9e76-a1b07c55971e\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IsraelX+MBSE102+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"575abe77-a4a8-4e7f-950f-6fa2125fd876\",\"productName\":\"Introducción a la seguridad de aplicaciones web\",\"productSlug\":\"learn/network-security/pontificia-universidad-javeriana-introduccion-a-la-seguridad-de-aplicaciones-web\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/575abe77-a4a8-4e7f-950f-6fa2125fd876-28df8bacf48f.png\",\"productType\":\"Course\",\"attributes\":[\"Communication\",\"Computer Science\",\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1e5\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-CO\\\"\u003eEn este curso, aprenderás las principales prácticas de seguridad a tener en cuenta en el ciclo de vida de Desarrollo de aplicaciones WEB, identificando los posibles patrones de ataques que pueden ocurrir y así poder crear patrones predictivos que permitan prevenirlos.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$1e6\",\"objectId\":\"course-575abe77-a4a8-4e7f-950f-6fa2125fd876\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+ISAW1.1x+1T2021\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d45f0c98-f259-44f2-afc6-a9c598c9598a\",\"productName\":\"Gestión del Cambio y Transformación Cultural para la 4a Revolución Industrial\",\"productSlug\":\"learn/change-management/pontificia-universidad-javeriana-gestion-del-cambio-y-transformacion-cultural-para-la-4a-revolucion-industrial\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d45f0c98-f259-44f2-afc6-a9c598c9598a-027e4cb9c855.png\",\"productType\":\"Course\",\"attributes\":[\"Humanities\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"$1e7\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"ES-CO\\\"\u003eEste curso permitirá comprender cómo la cultura organizacional enmarca todo el accionar de las empresas y a su vez cómo influye en su desempeño, dándole oportunidad al estudiante de comprender los procesos requeridos para gestionar su cambio y su adecuada transformación.\u003c/span\u003e\u003c/p\u003e\",\"productOverview\":\"$1e8\",\"objectId\":\"course-d45f0c98-f259-44f2-afc6-a9c598c9598a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+GCTCx+2T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"b7e4f7cf-e64b-46c9-ae14-d99deb7b11c0\",\"productName\":\"Inteligencia artificial: Chatbots sin programación\",\"productSlug\":\"learn/artificial-intelligence/ibm-inteligencia-artificial-chatbots-sin-programacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b7e4f7cf-e64b-46c9-ae14-d99deb7b11c0-b8fdd5935456.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Design\"],\"partnerName\":[\"IBM\"],\"partnerKeys\":[\"IBM\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/87b07564-d569-4cfd-bee6-8b0a407acb73-dc33e4b5f353.png\",\"fullDescription\":\"$1e9\",\"shortDescription\":\"\u003cp\u003eLos chatbots tienen cada vez más demanda entre las empresas globales. Este curso te enseñará cómo construir, analizar, implementar y monetizar chatbots, con la ayuda de IBM Watson y el poder de la IA.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eQué son los chatbots y por qué son revolucionarios\u003c/li\u003e\\n\u003cli\u003eQué es Watson Assistant y cómo puedes aprovechar sus capacidades de IA\u003c/li\u003e\\n\u003cli\u003eLos principios clave del buen diseño de chatbot\u003c/li\u003e\\n\u003cli\u003eCómo crear tu propio chatbot sin la necesidad de escribir ningún código\u003c/li\u003e\\n\u003cli\u003eCómo implementar tu chatbot en sitios de WordPress\u003c/li\u003e\\n\u003cli\u003eCómo inscribirse como socio de IBM si tiene la intención de crear chatbots para clientes\u003c/li\u003e\\n\u003cli\u003eCómo ganar dinero con chatbots\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-b7e4f7cf-e64b-46c9-ae14-d99deb7b11c0\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:IBM+CB0103SP+1T2022\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4ab9ccf1-8b6f-4a6e-b9b8-2f14a2d3115b\",\"productName\":\"Diseña, fabrica y programa tu propio robot\",\"productSlug\":\"learn/robotics/universitat-politecnica-de-valencia-disena-fabrica-y-programa-tu-propio-robot\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/4ab9ccf1-8b6f-4a6e-b9b8-2f14a2d3115b-f652bf94b415.jpg\",\"productType\":\"Course\",\"attributes\":[\"Engineering\",\"Physics\",\"Electronics\"],\"partnerName\":[\"Universitat Politècnica de València\"],\"partnerKeys\":[\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/518a47f2-66fb-4529-8902-a4f7ca3002ef-32e55d44aff3.png\",\"fullDescription\":\"$1ea\",\"shortDescription\":\"\u003cp\u003eAprenderás a diseñar, fabricar y programar tu propio robot (DYOR: Do Your Own Robot) con Arduino y te iniciarás en el mundo Maker.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAprenderás a realizar sencillos diseños 3D con TinkerCAD.\u003c/li\u003e\\n\u003cli\u003eConocerás dos tecnologías de fabricación digital: impresión 3D y corte por láser.\u003c/li\u003e\\n\u003cli\u003eAprenderás los fundamentos básicos de la electrónica de Arduino.\u003c/li\u003e\\n\u003cli\u003eSerás capaz de realizar sencillos diseños electrónicos con Fritzing.\u003c/li\u003e\\n\u003cli\u003eAprenderás a programar Arduino por bloques con Facilino.\u003c/li\u003e\\n\u003cli\u003eDiseño de apps en Android con App Inventor 2.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-4ab9ccf1-8b6f-4a6e-b9b8-2f14a2d3115b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UPValenciaX+DYOR101x+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"79b0422f-a617-4b14-bf1c-21e992bb6b4c\",\"productName\":\"Logística 4.0. Articulación alrededor de la Ciencia, Tecnología e Innovación\",\"productSlug\":\"learn/logistics/pontificia-universidad-javeriana-logistica-4-0-articulacion-alrededor-de-la-ciencia-tecnologia-e-innovacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/79b0422f-a617-4b14-bf1c-21e992bb6b4c-c245a6872fc8.png\",\"productType\":\"Course\",\"attributes\":[\"Data Analysis \u0026 Statistics\",\"Business \u0026 Management\"],\"partnerName\":[\"Pontificia Universidad Javeriana\"],\"partnerKeys\":[\"JaverianaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/d44733ac-333f-4b66-8cb0-02930e32a640-60c3c18089aa.png\",\"fullDescription\":\"\u003cp\u003eLa mejor forma de entender exactamente qué es la logística 4.0, es conocer bien qué ocurría en épocas anteriores. Si hoy hablamos de una Industria o Logística de cuarta generación, es porque antes hubo una Logística 1.0, 2.0 y 3.0. Bueno, en realidad, lo primero que debemos saber es que el término se ha modernizado un poco debido a una clara influencia de la “jerga informática” utilizada para designar nuevas versiones de software o sus diferentes actualizaciones, con sucesivas cadenas numéricas: 1.0, 1.1, 2.4, 3.0, etc. Pero en realidad, cuando hablamos de Industria 4.0 hablamos de algo que nos suena mucho más familiar si le otorgamos su nombre original: la cuarta Revolución Industrial. La logística necesaria para el tipo de industria que surge a partir de esta cuarta revolución acoge esta misma terminología y de ahí el término de Logística 4.0.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eEl curso brinda herramientas para comprender mejor los elementos asociados a la transformación digital de la cadena de abastecimiento. Aborda esta temática desde la tecnología, el contexto empresarial y la habilidad de adaptación que cada vez es más relevante para afrontar las revoluciones.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003e- Entender los principales conceptos, tecnologías y aplicaciones asociados a la logística 4.0 y cómo esta ha evolucionado a lo largo de los últimos años impactando a diversas industrias.\u003c/p\u003e\\n\u003cp\u003e- Identificar las tecnologías que integran la logística 4.0 y sus aplicaciones en el contexto empresarial.\u003c/p\u003e\\n\u003cp\u003e- Diseñar un modelo que permita medir la madurez de una organización para implementar tecnologías de la logística 4.0.\u003c/p\u003e\\n\u003cp\u003e- Aprender marcos de referencia asociados a la gestión de cambio que debe ser desarrollada a nivel empresarial para apalancar un programa de transformación digital.\u003c/p\u003e\\n\u003cp\u003e- Construir un plan de gestión de cambio de acuerdo con las necesidades de la empresa.\u003c/p\u003e\",\"objectId\":\"course-79b0422f-a617-4b14-bf1c-21e992bb6b4c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:JaverianaX+B-GLI4.0.2+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0785d834-7f3d-4f56-9fcd-41255e67823c\",\"productName\":\"Introducción a la Ingeniería del Software\",\"productSlug\":\"learn/software-engineering/universidad-autonoma-de-madrid-introduccion-a-la-ingenieria-del-software\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/0785d834-7f3d-4f56-9fcd-41255e67823c-5498ab05443b.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\",\"Business \u0026 Management\"],\"partnerName\":[\"Universidad Autónoma de Madrid\"],\"partnerKeys\":[\"UAMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/daf114d3-0909-4991-8dc0-10c319ee8687-cfb543208a6c.png\",\"fullDescription\":\"$1eb\",\"shortDescription\":\"\u003cp\u003eConoce las distintas fases de desarrollo por las que pasa un proyecto informático, así como las actividades de gestión necesarias para lograr finalizar el proyecto con éxito.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eQué es el software y cuáles son sus diferentes componentes y características.\u003c/li\u003e\\n\u003cli\u003eCuáles son las principales actividades de un ingeniero de software.\u003c/li\u003e\\n\u003cli\u003eCómo adaptar metodologías y modelos de ciclos de vida a nuestro proyecto software.\u003c/li\u003e\\n\u003cli\u003eConocer las actividades principales de gestión de proyectos: estimación y planificación, negociación, coordinación del equipo de trabajo y seguimiento y control.\u003c/li\u003e\\n\u003cli\u003eIdentificar los requisitos de usuario y requisito software.\u003c/li\u003e\\n\u003cli\u003eAsegurar la realización de un buen diseño.\u003c/li\u003e\\n\u003cli\u003eExplorar la importancia de las pruebas exhaustivas utilizando técnicas apropiadas.\u003c/li\u003e\\n\u003cli\u003eFinalizar el proceso de desarrollo de manera completa y satisfactoria.\u003c/li\u003e\\n\u003cli\u003eEstablecer diferentes estrategias de mantenimiento según las necesidades empresariales.\u003c/li\u003e\\n\u003cli\u003eIdentificar las principales medidas utilizadas en el aseguramiento de calidad del software.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-0785d834-7f3d-4f56-9fcd-41255e67823c\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UAMx+IngSoftware+2T2019\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2dcbd011-56c5-4e4a-80eb-aa2a080c1164\",\"productName\":\"Introducción al desarrollo de aplicaciones web\",\"productSlug\":\"learn/web-development/universidad-autonoma-de-madrid-introduccion-al-desarrollo-de-aplicaciones-web\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2dcbd011-56c5-4e4a-80eb-aa2a080c1164-060866c24c0b.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\",\"Engineering\"],\"partnerName\":[\"Universidad Autónoma de Madrid\"],\"partnerKeys\":[\"UAMx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/daf114d3-0909-4991-8dc0-10c319ee8687-cfb543208a6c.png\",\"fullDescription\":\"\u003cp\u003eHoy en día utilizamos la web para todo tipo de tareas: buscar un vuelo, comprar entradas, ver el pronóstico meteorológico, leer noticias, etc. Todo esto es posible gracias a las aplicaciones web creadas para darnos estos servicios. \u003c/p\u003e\\n\u003cp\u003eCon este curso en línea descubrirás cómo se realizan estas apps web, comprenderás su arquitectura cliente-servidor y además aprenderás paso a paso a realizar una aplicación web desde cero. Concretamente, te vamos a guiar a lo largo del curso para que desarrolles tu propia red social. \u003c/p\u003e\\n\u003cp\u003ePara este propósito comprenderás cómo utilizar de forma conjunta diferentes tecnologías web como son HTML, CSS, Python, JSON, JavaScript y Ajax. \u003c/p\u003e\\n\u003cp\u003eEn este curso de informática programaremos en Python para el desarrollo del lado servidor y utilizaremos la biblioteca Flask para crear aplicaciones web de forma eficiente y modular. \u003c/p\u003e\\n\u003cp\u003eFinalmente, para el desarrollo en el lado cliente usaremos JavaScript, que nos permitirá implementar aplicaciones web más interactivas.\u003c/p\u003e\",\"shortDescription\":\"\u003cp\u003eAprende a desarrollar una aplicación web desde cero con diferentes tecnologías como HTML, CSS, Python, JSON, JavaScript y Ajax.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eConocer la tecnología web utilizada para el desarrollo de aplicaciones web.\u003c/li\u003e\\n\u003cli\u003eDominar las características generales de las aplicaciones web y su arquitectura cliente-servidor.\u003c/li\u003e\\n\u003cli\u003eAprender detalles básicos de tecnologías como HTML, CSS, Python, JSON, JavaScript y Ajax para crear una aplicación web.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2dcbd011-56c5-4e4a-80eb-aa2a080c1164\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UAMx+WebApp+1T2019a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2b81fabb-bd34-47d4-b0e2-d6101a38275b\",\"productName\":\"L'essentiel de l'apprentissage profond\",\"productSlug\":\"learn/computer-science/universite-de-montreal-l-essentiel-de-l-apprentissage-profond\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/2b81fabb-bd34-47d4-b0e2-d6101a38275b-16fd7c3730be.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Université de Montréal\"],\"partnerKeys\":[\"UMontrealX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/1181fcba-6687-4114-8c3c-f34815663fd7-a287d6820336.png\",\"fullDescription\":\"$1ec\",\"shortDescription\":\"\u003cp\u003eVoulez-vous savoir comment les machines peuvent apprendre des tâches que nous pensions possibles seulement pour le cerveau humain? Alors suivez ce cours d’apprentissage profond mis au point par IVADO, Mila et l’Université de Montréal qui donne un aperçu détaillé de l’essentiel de l’apprentissage profond, cette technologie innovatrice qui est déjà présente dans nos vies et qui s’étend à tous les secteurs.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eÀ la fin de ce MOOC, les participants devraient s’attendre à :\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eComprendre les fondements et la terminologie liés à l’apprentissage profond;\u003c/li\u003e\\n\u003cli\u003eIdentifier les types de réseau de neurones à utiliser pour résoudre différents types de problèmes;\u003c/li\u003e\\n\u003cli\u003eSe familiariser avec les bibliothèques d’apprentissage profond à l’aide des séances pratiques et des tutoriels.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-2b81fabb-bd34-47d4-b0e2-d6101a38275b\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UMontrealX+IVADO-AP101+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"12b49cfc-de3c-465b-8964-f6ed86e79807\",\"productName\":\"La science des changements climatiques\",\"productSlug\":\"learn/energy-earth-sciences/universite-de-montreal-la-science-des-changements-climatiques\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/12b49cfc-de3c-465b-8964-f6ed86e79807-59429d8ea95c.png\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Social Sciences\"],\"partnerName\":[\"Université de Montréal\"],\"partnerKeys\":[\"UMontrealX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/1181fcba-6687-4114-8c3c-f34815663fd7-a287d6820336.png\",\"fullDescription\":\"$1ed\",\"shortDescription\":\"\u003cp\u003eNotre MOOC offre une exploration approfondie des bases scientifiques du changement climatique. Il examine les processus physiques et biogéochimiques qui influent sur le climat de la Terre, ainsi que l'analyse des données climatiques historiques, des modèles climatiques et de leurs impacts potentiels sur les écosystèmes, les sociétés et l'économie. Adoptant une approche interdisciplinaire, le cours intègre des méthodes, des outils et des techniques en intelligence numérique et en intelligence artificielle, tout en mettant l'accent sur les objectifs d'équité et de justice climatique via les sciences sociales. En proposant des modules de formation modulaires, notre objectif est de rendre la science des changements climatiques accessible à divers publics, tout en soulignant l'importance des outils numériques dans cette étude et leur contribution à l'interdisciplinarité de ce domaine en constante évolution.\u003c/p\u003e\",\"productOverview\":\"$1ee\",\"objectId\":\"course-12b49cfc-de3c-465b-8964-f6ed86e79807\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:UMontrealX+SCC1FR+2T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"ccc0867f-f6f1-4834-9758-9d0d6698b066\",\"productName\":\"HP AI Teacher Academy: l’intelligenza artificiale per insegnanti e educatori\",\"productSlug\":\"learn/education-teacher-training/hp-hp-ai-teacher-academy-lintelligenza-artificiale-per-insegnanti-e-educatori\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/ccc0867f-f6f1-4834-9758-9d0d6698b066-cabf461675ef.png\",\"productType\":\"Course\",\"attributes\":[\"Education \u0026 Teacher Training\"],\"partnerName\":[\"HP\"],\"partnerKeys\":[\"HP\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b6a09a3-61a9-415b-9048-cf90451c6bb2-681cbc2f42ed.png\",\"fullDescription\":\"$1ef\",\"shortDescription\":\"\u003cp\u003e\u003cspan lang=\\\"IT\\\"\u003eLa HP AI Academy offre agli insegnanti le conoscenze e le competenze essenziali per comprendere, utilizzare e valutare i sistemi e gli strumenti di intelligenza artificiale generativa. (Tempo stimato per il completamento: 3 ore.)\u003c/span\u003e\u003cspan lang=\\\"IT\\\"\u003e\u003c/span\u003e\u003c/p\u003e\\n\u003cp\u003eGli insegnanti e gli educatori che completano questo corso saranno in grado di:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003e\u003cspan lang=\\\"IT\\\"\u003eIntegrare l’alfabetizzazione all’intelligenza artificiale nei contenuti didattici;\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"IT\\\"\u003eComprendere le responsabilità etiche e i principi in base ai quali valutare gli strumenti e gli output di intelligenza artificiale a beneficio della classe;\u003c/span\u003e\u003c/li\u003e\\n\u003cli\u003e\u003cspan lang=\\\"IT\\\"\u003eSelezionare e utilizzare gli strumenti di intelligenza artificiale più sicuri e utili per gli studenti\u003c/span\u003e\u003c/li\u003e\\n\u003c/ul\u003e\",\"productOverview\":\"$1f0\",\"objectId\":\"course-ccc0867f-f6f1-4834-9758-9d0d6698b066\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:HP+HPATA01.it+3T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"cd1cff5c-9476-43bd-9014-83c18a503c60\",\"productName\":\"Fundamentos de sistemas embebidos con Arm: Primeros pasos\",\"productSlug\":\"learn/embedded-systems/arm-education-fundamentos-de-sistemas-embebidos-con-arm-primeros-pasos\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/cd1cff5c-9476-43bd-9014-83c18a503c60-b655dbaad5e2.png\",\"productType\":\"Course\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Arm Education\",\"Universitat Politècnica de València\"],\"partnerKeys\":[\"ArmEducationX\",\"UPValenciaX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5f1b3a31-014f-44e0-ade4-829a9d4b8334-00d7ebd79ee5.png\",\"fullDescription\":\"$1f1\",\"shortDescription\":\"\u003cp\u003eTrabaja sin necesidad de hardware. Crea rápidamente prototipos y proyectos de microcontroladores con las API estándar del sector.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eAprende a implementar proyectos de sistemas embebidos del mundo real en un microcontrolador simulado utilizando la API Mbed.\u003c/li\u003e\\n\u003cli\u003eModifica un código base para implementar la funcionalidad de varias aplicaciones: un generador de ondas de audio, un reproductor de audio y el control de periféricos mediante interfaces de E/S analógicas y digitales, interrupciones, temporizadores y modulación por ancho de pulsos.\u003c/li\u003e\\n\u003cli\u003eAprende las características clave de los procesadores y arquitecturas Arm como base de la informática embebida moderna.\u003c/li\u003e\\n\u003cli\u003eComprende las aplicaciones de los sistemas embebidos y cómo una API moderna puede ayudar a acelerar el despliegue de IoT.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-cd1cff5c-9476-43bd-9014-83c18a503c60\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:ArmEducationX_UPValenciaX+EDARMX-UPV-ES1.6x+3T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"94ef943e-a5fe-47a1-ad44-bd59e5cc234a\",\"productName\":\"From Fossil Resources to Biomass: A Chemistry Perspective\",\"productSlug\":\"learn/chemistry/wageningen-university-research-from-fossil-resources-to-biomass-a-chemistry-perspective\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/94ef943e-a5fe-47a1-ad44-bd59e5cc234a-d28a6e692b43.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Energy \u0026 Earth Sciences\",\"Chemistry\",\"Environmental Studies\"],\"partnerName\":[\"Wageningen University \u0026 Research\"],\"partnerKeys\":[\"WageningenX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0c6e5fa2-96e8-40b2-9ebe-c8b0df2a3b22-7022589dbb5d.png\",\"fullDescription\":\"$1f2\",\"shortDescription\":\"\u003cp\u003eExplore how to create a sustainable future by moving away from dependence on fossil resources to biomass resources for the production of food, chemicals and energy-carriers. Discover how to use microorganisms and catalysts to create biobased products.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eUnderstand the basic chemical and technological concepts underlying the biobased value chain\u003c/li\u003e\\n\u003cli\u003eUnderstand the factors and methods that can influence production of biobased crops\u003c/li\u003e\\n\u003cli\u003eUnderstand how the composition and chemical nature of biomass fractions determines the processing steps within a biorefinery\u003c/li\u003e\\n\u003cli\u003eUnderstand the potential of microorganisms for the production of biobased products.\u003c/li\u003e\\n\u003cli\u003eExplain how catalysis can contribute to a biobased economy\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-94ef943e-a5fe-47a1-ad44-bd59e5cc234a\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:WageningenX+CE.CHEMx+1T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9b066ce4-30c7-4889-a60a-dd9b3b11f026\",\"productName\":\"Estrategias de Posicionamiento Digital: Pauta y Monetización\",\"productSlug\":\"learn/communication/universidades-anahuac-estrategias-de-posicionamiento-digital-pauta-y-monetizacion\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9b066ce4-30c7-4889-a60a-dd9b3b11f026-4c49e6c969d9.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Communication\"],\"partnerName\":[\"Universidades Anáhuac\"],\"partnerKeys\":[\"AnahuacX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/eedbb070-b505-4250-a9f9-5104b3029a8f-f33f8ea74659.png\",\"fullDescription\":\"$1f3\",\"shortDescription\":\"\u003cp\u003eDiseño estratégico de mercadeo digital a través del diagnóstico y uso de herramientas de pautado y monetización para el posicionamiento digital\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eIdentificar los rasgos característicos de los perfiles sociales que navegan en los ecosistemas digitales\u003c/li\u003e\\n\u003cli\u003eImplementar metodología de análisis estratégico corporativo para la gestión de la propagación narrativa en el universo temático de las audiencias.\u003c/li\u003e\\n\u003cli\u003eDiseñar estrategias orgánicas y pagadas para la propagabilidad transmediática de las narrativas hipertextuales, multimediales e hipermediáticas\u003c/li\u003e\\n\u003cli\u003eCalendarizar campañas en las redes sociodigitales, así como en ecosistemas de interacción mayor a partir del análisis de datos y de los planes financieros estratégicos de la empresa.\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-9b066ce4-30c7-4889-a60a-dd9b3b11f026\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:AnahuacX+UAP.CP3.1x+1T2023\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"fdb839e0-be23-403a-90a0-02eed09d38da\",\"productName\":\"Leadership in the family business\",\"productSlug\":\"learn/leadership/tecnologico-de-monterrey-leadership-in-the-family-business\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/fdb839e0-be23-403a-90a0-02eed09d38da-58a483ec295a.jpeg\",\"productType\":\"Course\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Tecnológico de Monterrey\"],\"partnerKeys\":[\"TecdeMonterreyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ceb9644c-f8dd-4522-9acd-adb33cbb9b4b-e8152bc6676b.png\",\"fullDescription\":\"$1f4\",\"shortDescription\":\"\u003cp\u003eLearn the dynamics of family businesses, in order to apply the skills, tools and instruments that involve leading and orchestrating a successfully family business.\u003c/p\u003e\",\"productOverview\":\"\u003cul\u003e\\n\u003cli\u003eApply strategies, tools and models to lead and orchestrate the family business\u003c/li\u003e\\n\u003cli\u003eIdentify and apply main characteristics that will allow you to be a good business leader\u003c/li\u003e\\n\u003cli\u003eExplain the importance and challenges of entrepreneurial families\u003c/li\u003e\\n\u003cli\u003eDistinguish the different styles of organizational leadership that you could find in the family business\u003c/li\u003e\\n\u003cli\u003eGenerate entrepreneurial talent within the organization using business leadership\u003c/li\u003e\\n\u003c/ul\u003e\",\"objectId\":\"course-fdb839e0-be23-403a-90a0-02eed09d38da\",\"productSource\":\"edX\",\"productCategory\":\"Course\",\"activeRunKey\":\"course-v1:TecdeMonterreyX+LFB.1x+1T2024\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":null}]},{\"productType\":\"Executive Education\",\"categoryLabel\":\"Executive Education\",\"products\":[{\"productUuid\":\"d7e8d061-37e6-4183-a5c0-fa156cb8a7d8\",\"productName\":\"IT Management\",\"productSlug\":\"executive-education/university-of-cape-town-it-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/d7e8d061-37e6-4183-a5c0-fa156cb8a7d8-593044db10c5.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$1f5\",\"shortDescription\":\"\u003cp\u003eGain the knowledge and confidence to manage all facets of modern IT operations effectively.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:A strategic IT management plan suited to your business context. Knowledge of best practices for modern IT management, and insight into budgeting and resourcing, value chain optimisation, risk control, and change management. An understanding of the latest IT trends in the areas of cybersecurity, DevOps, networks, design thinking, cloud, and IoT. The ability to use information and communications technology (ICT) to solve business problems. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-d7e8d061-37e6-4183-a5c0-fa156cb8a7d8\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+ITM+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/d7e8d061-37e6-4183-a5c0-fa156cb8a7d8-2f311cf7207c.png\"},{\"productUuid\":\"91c4ca9c-7f99-4644-8078-c89f0cb47eb4\",\"productName\":\"Data Monetization Strategy: Creating Value Through Data\",\"productSlug\":\"executive-education/massachusetts-institute-of-technology-data-monetization-strategy-creating-value-through-data\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/91c4ca9c-7f99-4644-8078-c89f0cb47eb4-5f64f7936e8f.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1f6\",\"shortDescription\":\"\u003cp\u003eIncorporate data monetization into your business strategy and compete in a digital economy\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:Holistic knowledge of data monetization strategies, including the I-W-S framework, to facilitate data-based value creation. A comprehensive understanding of how to monetize data and the associated opportunities and challenges of data-based value creation. A chosen data monetization strategy to help your company optimize current and future value creation from its data assets.\u003c/p\u003e\",\"objectId\":\"course-91c4ca9c-7f99-4644-8078-c89f0cb47eb4\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:MITx+DTM+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/91c4ca9c-7f99-4644-8078-c89f0cb47eb4-95c0a222b60a.png\"},{\"productUuid\":\"aed20180-43f9-425f-967c-5d139a4aec49\",\"productName\":\"Product Management\",\"productSlug\":\"executive-education/university-of-cape-town-product-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/aed20180-43f9-425f-967c-5d139a4aec49-0d0a3ec6b36f.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$1f7\",\"shortDescription\":\"\u003cp\u003eDevelop the expertise to oversee all phases of a product life cycle and ensure success in the marketplace.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:The tools to conduct a detailed analysis of the market to inform product strategy. The ability to use strategic planning to manage the development of a product. The skills to create a concise marketing plan for the successful launch of a product. An understanding of how to use metrics to monitor and evaluate the performance of a product. A detailed product roadmap informed by your product vision and strategy.\u003c/p\u003e\",\"objectId\":\"course-aed20180-43f9-425f-967c-5d139a4aec49\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+PDM+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/aed20180-43f9-425f-967c-5d139a4aec49-5080d8e5387a.png\"},{\"productUuid\":\"83d8b90b-40d5-443c-99fd-6ea813c19538\",\"productName\":\"Cybersecurity: Managing Risk in the Information Age\",\"productSlug\":\"executive-education/harvard-university-cybersecurity-managing-risk-in-the-information-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/83d8b90b-40d5-443c-99fd-6ea813c19538-2e0d161dee50.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Harvard University\"],\"partnerKeys\":[\"HarvardX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/44022f13-20df-4666-9111-cede3e5dc5b6-2cc39992c67a.png\",\"fullDescription\":\"$1f8\",\"shortDescription\":\"\u003cp\u003eDevelop an action plan to reduce system vulnerabilities and minimize damage\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll gain:The ability to recommend a cybersecurity leadership plan. The skills needed to develop a cyber risk mitigation strategy. A practical, holistic understanding of cybersecurity and its value. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-83d8b90b-40d5-443c-99fd-6ea813c19538\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:HarvardX+CYB+1T2025c\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/83d8b90b-40d5-443c-99fd-6ea813c19538-c38f03c9d025.png\"},{\"productUuid\":\"67e79d7e-af58-49f3-9dc4-c94b6efdfcf1\",\"productName\":\"Artificial Intelligence in Pharma and Biotech\",\"productSlug\":\"executive-education/massachusetts-institute-of-technology-artificial-intelligence-in-pharma-and-biotech\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/67e79d7e-af58-49f3-9dc4-c94b6efdfcf1-eaeb59f05391.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1f9\",\"shortDescription\":\"\u003cp\u003eDiscover the interconnectedness between the science of drug discovery, machine learning, and business decision making.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:The knowledge and skills to leverage AI within pharmaceutical and biotech organizations. Insight into the impact of ML on generative modeling for small molecule drug discovery and biomarker identification. The ability to apply technology in areas including disease modeling, therapeutic effects, patient response predictions, and patient health monitoring. An understanding of how ML can assist in effectively designing and managing clinical trials.\u003c/p\u003e\",\"objectId\":\"course-67e79d7e-af58-49f3-9dc4-c94b6efdfcf1\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:MITx+APH+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/67e79d7e-af58-49f3-9dc4-c94b6efdfcf1-1e71dbe403e4.png\"},{\"productUuid\":\"8bb41a0a-6a54-4891-b819-386648da7e68\",\"productName\":\"Communicating Data Through Storytelling\",\"productSlug\":\"executive-education/massachusetts-institute-of-technology-communicating-data-through-storytelling\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/8bb41a0a-6a54-4891-b819-386648da7e68-bb4aa8469f5d.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1fa\",\"shortDescription\":\"\u003cp\u003ePersuade, motivate, and inspire audiences and stakeholders using data-driven storytelling and visualization.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:The ability to construct persuasive, logically sound, data-driven presentations tailored to different audiences. Insight into how to design graphs for clearer communication and best practices for presenting data with clarity, rather than complexity. The knowledge to make complex data more understandable using the TOP-T (topic, orientation, point, transition) framework, developed by MIT Sloan faculty.\u003c/p\u003e\",\"objectId\":\"course-8bb41a0a-6a54-4891-b819-386648da7e68\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:MITx+PTD+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/8bb41a0a-6a54-4891-b819-386648da7e68-fef0f8bac806.png\"},{\"productUuid\":\"6b1262ca-c737-4207-bfc0-5b82bc1bbb95\",\"productName\":\"Digital Marketing Analytics\",\"productSlug\":\"executive-education/massachusetts-institute-of-technology-digital-marketing-analytics\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/6b1262ca-c737-4207-bfc0-5b82bc1bbb95-f9a705b5429f.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1fb\",\"shortDescription\":\"\u003cp\u003eDiscover how digital channels can be leveraged to optimize marketing spend.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this marketing analytics online short course, you’ll gain:Hands-on experience in applying marketing analytics tools and techniques to real-world marketing problems An understanding of the potential and current application of machine learning and artificial intelligence for marketing online The ability to recommend ROI-optimization strategies for marketing efforts and to optimize marketing campaigns A digital-focused marketing strategy plan for an efficient campaign optimization that is grounded in consumer data and research\u003c/p\u003e\",\"objectId\":\"course-6b1262ca-c737-4207-bfc0-5b82bc1bbb95\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:MITx+MAS+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/6b1262ca-c737-4207-bfc0-5b82bc1bbb95-ba1658f14c68.png\"},{\"productUuid\":\"5d254d1e-ed6c-47de-a9e7-e0246853f526\",\"productName\":\"Cryptocurrency\",\"productSlug\":\"executive-education/massachusetts-institute-of-technology-cryptocurrency\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/5d254d1e-ed6c-47de-a9e7-e0246853f526-88806f12093b.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Massachusetts Institute of Technology\"],\"partnerKeys\":[\"MITx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2a73d2ce-c34a-4e08-8223-83bca9d2f01d-d4f180052205.png\",\"fullDescription\":\"$1fc\",\"shortDescription\":\"\u003cp\u003eLearn how to critically assess the viability of any cryptocurrency project.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:Knowledge of cryptocurrency, its limitations, capabilities, and the way it functions within the economic environment. The skills to holistically assess a crypto project by understanding cryptocurrency within its broader context, and the ability to evaluate cryptocurrency’s economic implications. An understanding of the evolution of money, and how Bitcoin and blockchain technology operate in moving value via the internet. A comprehensive overview of Bitcoin and other cryptocurrencies, crypto markets and exchanges, smart contracts, decentralized applications (DApps), and initial coin offerings (ICOs). Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-5d254d1e-ed6c-47de-a9e7-e0246853f526\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:MITx+CRP+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":false,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/5d254d1e-ed6c-47de-a9e7-e0246853f526-7a39d16b7cb1.png\"},{\"productUuid\":\"b70b3b9f-706b-4055-a61b-a3b84d939de6\",\"productName\":\"Economist Education Critical Thinking: Problem-Solving and Decision-Making in a Complex World\",\"productSlug\":\"executive-education/the-economist-economist-education-critical-thinking-problem-solving-and-decision-making-in-a-complex-world\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b70b3b9f-706b-4055-a61b-a3b84d939de6-913b68a0a71a.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Environmental Studies\"],\"partnerName\":[\"Economist Education\"],\"partnerKeys\":[\"TheEconomist\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/aafbdee6-9481-4f38-9948-b7676379adeb-216630b5af3f.png\",\"fullDescription\":\"$1fd\",\"shortDescription\":\"\u003cp\u003eLearn to use critical-thinking tools to thrive in an algorithmic age.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you will have gained:An approach to discovering, reflecting on and avoiding the negative effects of uncritical thinking. An understanding of narrative oversimplification, the availability heuristic, confirmation bias and constructive doubt. The knowledge to use critical thinking to analyse information, solve problems and make informed decisions. The ability to model critical thinking by challenging assumptions, asking good questions and reasoning rigorously. Unlimited access to the official Economist Education alumni group on LinkedIn and edX’s Career Engagement Network, offering you exclusive resources and events to support your professional progress.\u003c/p\u003e\",\"objectId\":\"course-b70b3b9f-706b-4055-a61b-a3b84d939de6\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:TheEconomist+CRIT+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/b70b3b9f-706b-4055-a61b-a3b84d939de6-d2c2fc1e9b1a.jpg\"},{\"productUuid\":\"952d4154-1d2f-4e1e-a857-391a98e2bc0f\",\"productName\":\"Marketing Analytics: Strategy and Decision-Making\",\"productSlug\":\"executive-education/university-of-cape-town-marketing-analytics-strategy-and-decision-making\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/952d4154-1d2f-4e1e-a857-391a98e2bc0f-7c456bfd0269.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$1fe\",\"shortDescription\":\"\u003cp\u003eEnhance your digital marketing efforts by learning to harness data analytics and manage long-term, profitable customer relationships.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:The confidence to optimise return on investment for your marketing decisions, backed by data. A customer segmentation plan that personalises the consumer experience and provides insight into their unique personas. A customer lifetime value management framework to ensure long-term, profitable customer relationships and brand retention. The ability to navigate the marketing technology (MarTech) landscape and learn how to choose a MarTech stack that enables holistic management of your marketing efforts. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-952d4154-1d2f-4e1e-a857-391a98e2bc0f\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+MRA+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/952d4154-1d2f-4e1e-a857-391a98e2bc0f-9743f4cae701.png\"},{\"productUuid\":\"3cc6d511-1234-4eb2-972a-f6e524d275de\",\"productName\":\"Data: Law, Policy and Regulation\",\"productSlug\":\"executive-education/the-london-school-of-economics-and-political-science-data-law-policy-and-regulation\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/3cc6d511-1234-4eb2-972a-f6e524d275de-52c20b7292eb.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Law\"],\"partnerName\":[\"The London School of Economics and Political Science\"],\"partnerKeys\":[\"LSE\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/07141c7d-a86e-4f48-bb5b-1eef0958b465-b644124b89ef.png\",\"fullDescription\":\"$1ff\",\"shortDescription\":\"\u003cp\u003eGain the skills to critically analyze and navigate the changing legal environment that’s shaping data law and policy.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll be empowered to:Develop and contextualise your knowledge of foundational legal principles, and improve your understanding of core debates regarding data governance. Examine traditional regulatory models and how they are being replaced or supplemented by the application of algorithmic, data-driven decision-making. Discover the practical applications and regulatory challenges of algorithmic decision-making. Navigate the changing legal environment that is shaping data law and policy.\u003c/p\u003e\",\"objectId\":\"course-3cc6d511-1234-4eb2-972a-f6e524d275de\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:LSE+LGD+1T2025a\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/3cc6d511-1234-4eb2-972a-f6e524d275de-60b72c3e5329.png\"},{\"productUuid\":\"7c7aa9a2-d2bb-4a18-a5ec-43de6df378c9\",\"productName\":\"Communication and Influence in the Digital Age\",\"productSlug\":\"executive-education/university-of-cape-town-communication-and-influence-in-the-digital-age\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/7c7aa9a2-d2bb-4a18-a5ec-43de6df378c9-4716c23d2e7b.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Communication\"],\"partnerName\":[\"University of Cape Town\"],\"partnerKeys\":[\"UCT\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/c5b82171-94d3-40eb-befd-ade27c3d028a-d11f9c19058d.png\",\"fullDescription\":\"$200\",\"shortDescription\":\"\u003cp\u003eLearn to engage attention in a media-dense environment and cultivate interpersonal skills through clear, effective communication.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this course, you’ll walk away with:A personalised communication guidebook to help you communicate clearly and influence at all levels, in person and digitally. Insights into essential aspects of communication, from critical thinking and persuasion to personal branding, cross-cultural communication, ethical leadership, and crisis management. Frameworks to mitigate the various risks that miscommunication can create. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-7c7aa9a2-d2bb-4a18-a5ec-43de6df378c9\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:UCT+CIN+3T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/7c7aa9a2-d2bb-4a18-a5ec-43de6df378c9-6cfbb3f45397.png\"},{\"productUuid\":\"9f150859-a9c6-49b8-9d9c-cca33c9794ee\",\"productName\":\"Strategies for Supply Chain Digitalization\",\"productSlug\":\"executive-education/institute-for-management-development-imd-strategies-for-supply-chain-digitalization\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/9f150859-a9c6-49b8-9d9c-cca33c9794ee-dc4a4ce2619d.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Business \u0026 Management\"],\"partnerName\":[\"International Institute for Management Development\"],\"partnerKeys\":[\"IMD\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed7ebe0c-9979-40e3-a922-b5f075ae3bce-c3fa9dd41ba4.png\",\"fullDescription\":\"$201\",\"shortDescription\":\"\u003cp\u003eIdentify opportunities to transform your supply chain. Learn online with a globally recognized business school.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this program, you’ll walk away with:The ability to design a digital logistics strategy to improve your customer experience. End-to-end supply chain planning and optimization, including in the production process. The expertise to critically select and apply suitable digital initiatives to your unique business context for performance improvement. Insight into the strategic importance of a customer-centric supply chain, with a roadmap for a digitally transformed supply chain. Unlimited access to edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-9f150859-a9c6-49b8-9d9c-cca33c9794ee\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:IMD+DCH+3T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/9f150859-a9c6-49b8-9d9c-cca33c9794ee-4718bccdaf56.jpg\"},{\"productUuid\":\"b7fe453e-c9cb-436a-88fd-313a047c7a36\",\"productName\":\"Executive Finance Programme\",\"productSlug\":\"executive-education/university-of-oxford-executive-finance-programme\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/course/image/b7fe453e-c9cb-436a-88fd-313a047c7a36-4acd07d22409.jpg\",\"productType\":\"Executive Education\",\"attributes\":[\"Economics \u0026 Finance\"],\"partnerName\":[\"University of Oxford\"],\"partnerKeys\":[\"OxfordX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/2b628454-1c1f-4a61-978a-7bec1e588918-f65474eb5fac.png\",\"fullDescription\":\"$202\",\"shortDescription\":\"\u003cp\u003eGain the essential corporate finance knowledge needed for strategic decision-making and delivering value at an executive level.\u003c/p\u003e\",\"productOverview\":\"\u003cp\u003eOn completion of this programme, you’ll walk away with:A contemporary executive finance toolkit, enabling you to make more informed, strategic financial decisions. The ability to confidently engage in financial discussions and communicate your decisions to stakeholders. An overview of the topics that are changing financial practices such as corporate governance, and environmental, social, and governance (ESG) investing. Insights into some of the critical decisions firms make based on research from leading academics, field experts, and business practitioners, as well as a global network of like-minded professionals. Unlimited access to both the official Oxford Executive Education Alumni group on LinkedIn and edX’s Career Engagement Network, offering you exclusive resources and events to support your professional journey and drive your career forward.\u003c/p\u003e\",\"objectId\":\"course-b7fe453e-c9cb-436a-88fd-313a047c7a36\",\"productSource\":\"2u\",\"productCategory\":\"Executive Education\",\"activeRunKey\":\"course-v1:OxfordX+EFP+2T2025\",\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[],\"organizationLogoOverride\":\"https://prod-discovery.edx-cdn.org/organization/logo_override/b7fe453e-c9cb-436a-88fd-313a047c7a36-9a6efa4ebc5d.png\"}]},{\"productType\":\"Masters\",\"categoryLabel\":\"Master's Programs\",\"products\":[{\"productUuid\":\"0ecf2868-e7b5-4ede-8077-334d0bc4ffe8\",\"productName\":\"Master of Arts in Management and Leadership\",\"productSlug\":\"masters/maryville-university-master-of-arts-in-management-and-leadership\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/0ecf2868-e7b5-4ede-8077-334d0bc4ffe8-0e498baeac4e.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$203\",\"objectId\":\"program-0ecf2868-e7b5-4ede-8077-334d0bc4ffe8\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"f584d7b2-8e9e-4118-88a8-42c3c34b4333\",\"productName\":\"Master of Health Administration\",\"productSlug\":\"masters/online-mha/george-washington-master-of-health-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/f584d7b2-8e9e-4118-88a8-42c3c34b4333-f22ffda3057b.png\",\"productType\":\"Masters\",\"attributes\":[\"Health \u0026 Safety\"],\"partnerName\":[\"George Washington University\"],\"partnerKeys\":[\"GW\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5c2ddc82-7948-4008-8b76-3853ac9c0877-0838009e361b.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Bachelor's holders with at least two years of experience in the healthcare sector can earn their Master from GW's CAHME-accredited online Master of Health Administration program. With no GRE scores required to apply, you can become an effective leader in health care systems in as few as 24 months with a degree from Milken Institute School of Public Health.\",\"objectId\":\"program-f584d7b2-8e9e-4118-88a8-42c3c34b4333\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"7e610677-ff84-40c0-8f24-657173f95b48\",\"productName\":\"University of Sydney’s Master of Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/university-of-sydneys-master-of-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/7e610677-ff84-40c0-8f24-657173f95b48-11c3d9a5c1f6.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"The University of Sydney\"],\"partnerKeys\":[\"USYDx\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/0da70b4d-5231-43bf-bb60-e95c0cb8de98-71210b7cf35c.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eThe University of Sydney’s Master of Cybersecurity (Online) is designed for experienced tech or STEM professionals who want to discover emerging technologies in cybersecurity. Students will learn to lead cybersecurity initiatives at the organisational level and stay at the forefront of evolving privacy and security regulations.\u003c/p\u003e\",\"objectId\":\"program-7e610677-ff84-40c0-8f24-657173f95b48\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"AU\",\"NZ\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"46231e86-e3e5-4e23-8095-0c8694de58f2\",\"productName\":\"Master of Public Health\",\"productSlug\":\"masters/masters-in-public-health-online/gwu-master-of-public-health\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/46231e86-e3e5-4e23-8095-0c8694de58f2-be3d8d92a878.png\",\"productType\":\"Masters\",\"attributes\":[\"Health \u0026 Safety\"],\"partnerName\":[\"George Washington University\"],\"partnerKeys\":[\"GW\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/5c2ddc82-7948-4008-8b76-3853ac9c0877-0838009e361b.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Founded in 1997, the Milken Institute School of Public Health at the George Washington University is dedicated to empowering underserved populations and advancing the health of communities around the globe. Our live, online classes feature a 15:1 student-to-faculty ratio, enabling you to form close connections with your peers and GW faculty in an engaging learning environment. Earn your MPH in as few as 12 months and make a meaningful difference in public health — without having to relocate — with MPH@GW. No GRE required.\",\"objectId\":\"program-46231e86-e3e5-4e23-8095-0c8694de58f2\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0a981ea4-4f5e-4a31-aadd-4f1394072279\",\"productName\":\"Master of Science in Library and Information Science\",\"productSlug\":\"masters/online-mlis-programs/syracuse-master-of-science-in-library-and-information-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/0a981ea4-4f5e-4a31-aadd-4f1394072279-ee7ff7c5c071.png\",\"productType\":\"Masters\",\"attributes\":[\"Communication\"],\"partnerName\":[\"Syracuse University\"],\"partnerKeys\":[\"SyracuseUniversity\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"In its tradition of preparing students to shape our world through the power of information, Syracuse University’s School of Information Studies (iSchool) offers a Master of Science in Library and Information Science degree delivered online. The program is accredited by the American Library Association and prepares students to help communities better access and understand information and media resources. Students may also specialize in School Media to prepare for library and information roles in elementary and secondary school settings. The program can be completed in 18 months. No GRE scores are required to apply. \",\"objectId\":\"program-0a981ea4-4f5e-4a31-aadd-4f1394072279\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"5c002189-0866-4b10-807e-bcf093346dc0\",\"productName\":\"Master of Information and Cybersecurity\",\"productSlug\":\"masters/online-masters-in-cybersecurity/ucb-master-of-information-and-cybersecurity\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/5c002189-0866-4b10-807e-bcf093346dc0-f76c1c8d8a9b.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"University of California, Berkeley\"],\"partnerKeys\":[\"BerkeleyX\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/54bc81cb-b736-4505-aa51-dd2b18c61d84-2082c7ba1024.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Through the UC Berkeley School of Information’s online Master of Information and Cybersecurity (MICS) program’s holistic approach, experienced professionals become well-rounded, sought-after cybersecurity leaders. Located in the Bay Area’s renowned technology hub, the MICS program exposes its students to extensive networking opportunities with alumni and cybersecurity professionals. The program includes in-person immersion experiences, and the degree can be completed in 20 months. No GRE/GMAT required to apply.\",\"objectId\":\"program-5c002189-0866-4b10-807e-bcf093346dc0\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[],\"blockedIn\":[\"IN\"],\"organizationLogoOverride\":null},{\"productUuid\":\"ea953e86-de57-4512-8503-a89f00f1b2b1\",\"productName\":\"Master of Science in Computer Science\",\"productSlug\":\"masters/online-masters-in-computer-science/syracuse-master-of-science-in-computer-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ea953e86-de57-4512-8503-a89f00f1b2b1-3e40472c6ec7.png\",\"productType\":\"Masters\",\"attributes\":[\"Computer Science\"],\"partnerName\":[\"Syracuse University\"],\"partnerKeys\":[\"SyracuseUniversity\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/6ec06cd6-4355-44bd-822a-2094d743b7a4-7ed01c537f21.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"In our technology-driven world, skilled computer science professionals are needed to design leading-edge solutions to complex computational challenges. Syracuse University’s online M.S. in Computer Science program prepares students to spearhead groundbreaking innovation across industries. Complete in as few as 15 months with 4 cohort start dates per year. No GRE required to apply\",\"objectId\":\"program-ea953e86-de57-4512-8503-a89f00f1b2b1\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"c6d974eb-34b9-4293-97ac-a16bff173637\",\"productName\":\"Master of Legal Studies\",\"productSlug\":\"masters/online-master-of-legal-studies/american-master-of-legal-studies\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/c6d974eb-34b9-4293-97ac-a16bff173637-98e1f1a9b375.png\",\"productType\":\"Masters\",\"attributes\":[\"Law\"],\"partnerName\":[\"American University\"],\"partnerKeys\":[\"American\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4f9c5559-f219-400d-b186-13f575b33b08-4a28e48d5256.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"A thorough understanding of the law is not limited to practicing attorneys. The online Master of Legal Studies (MLS) from American University Washington College of Law (AUWCL) is designed for professionals who have law-related responsibilities and understand the law’s important influence on both your daily job functions and your community at large.\",\"objectId\":\"program-c6d974eb-34b9-4293-97ac-a16bff173637\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"productName\":\"Master of Science in Accounting\",\"productSlug\":\"masters/maryville-university-master-of-science-in-accounting\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/518b3b7e-f773-4b11-8427-4343b53cd1ae-1e8df2a9d7ed.jpg\",\"productType\":\"Masters\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"\u003cp\u003eAccounting isn’t just about balancing books. Top managers in every organization consult with accountants and rely on their insights and expertise to help make critical financial decisions.\u003c/p\u003e\\r\\n\\r\\n\u003cp\u003eYou can join the next generation of accountants who will help lead the future of business. Whether you have your bachelor’s degree in accounting or you’re looking to start a new career in this exciting field, Maryville University’s online Master of Science in Accounting program can prepare you with advanced accounting skills, business acumen, and financial expertise to maximize your career opportunities and your organization’s success.\u003c/p\u003e\",\"objectId\":\"program-518b3b7e-f773-4b11-8427-4343b53cd1ae\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"9bdd0a1d-fcfb-43b3-a2c1-73a9c966cc01\",\"productName\":\"Master of Library and Information Science\",\"productSlug\":\"masters/online-mlis-programs/denver-master-of-library-and-information-science\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/9bdd0a1d-fcfb-43b3-a2c1-73a9c966cc01-084e716bed49.png\",\"productType\":\"Masters\",\"attributes\":[\"Communication\"],\"partnerName\":[\"University of Denver\"],\"partnerKeys\":[\"UniversityofDenver\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/ed4b14c6-ee2c-4a78-a97b-e73bad0485af-27577f044447.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Serve as a steward of your community's history. Earn a Master of Library and Information Science online from University of Denver's ALA-accredited program in as few as 21 months. With no GRE required, apply now to learn to empower your community by improving information access and promoting intellectual freedom.\",\"objectId\":\"program-9bdd0a1d-fcfb-43b3-a2c1-73a9c966cc01\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"0890de3f-7556-4089-ae2d-7a945f6f6a7d\",\"productName\":\"Master of Science in Nursing - FNP\",\"productSlug\":\"masters/online-msn-programs/online-fnp-programs/simmons-master-of-science-in-nursing-fnp\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/0890de3f-7556-4089-ae2d-7a945f6f6a7d-49998d73fbad.png\",\"productType\":\"Masters\",\"attributes\":[\"Medicine\"],\"partnerName\":[\"Simmons University\"],\"partnerKeys\":[\"Simmons\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/78fe11c7-e0da-4425-afb6-3d74bfb4f606-ad36acd8a318.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Simmons University's online Nursing@Simmons program offers currently licensed RNs an opportunity to earn their Master of Science in Nursing (MSN) to become Family Nurse Practitioners. The online MSN program is designed for RNs who already hold a bachelor's degree, preferably a Bachelor of Science in Nursing (BSN). \",\"objectId\":\"program-0890de3f-7556-4089-ae2d-7a945f6f6a7d\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null}]},{\"productType\":\"Bachelors\",\"categoryLabel\":\"Bachelor's Programs\",\"products\":[{\"productUuid\":\"ed071fea-c81a-41fa-8e87-c4261d6cc594\",\"productName\":\"Information Science\",\"productSlug\":\"bachelors/information-science-usc-sl\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/ed071fea-c81a-41fa-8e87-c4261d6cc594-c355714ce858.jpg\",\"productType\":\"Bachelors\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of South Carolina\"],\"partnerKeys\":[\"USOC\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/4a4c2ff0-8ae0-4854-990d-8e180ca222b0-461dd5acf687.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$204\",\"objectId\":\"program-ed071fea-c81a-41fa-8e87-c4261d6cc594\",\"productSource\":\"shorelight\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"IN\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"fa80cdf3-5420-4734-94b8-ee5ea1bfedb2\",\"productName\":\"Information Systems\",\"productSlug\":\"bachelors/information-systems-csu-sl\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/fa80cdf3-5420-4734-94b8-ee5ea1bfedb2-797d96a4db64.jpg\",\"productType\":\"Bachelors\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Cleveland State University\"],\"partnerKeys\":[\"CSU\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/b15a761c-c7c7-4f52-9000-473ae45ade89-4dc4e1acda3e.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$205\",\"objectId\":\"program-fa80cdf3-5420-4734-94b8-ee5ea1bfedb2\",\"productSource\":\"shorelight\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"IN\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"3ca4bc93-69a5-40d4-9cf2-fdffa3edd89a\",\"productName\":\"Information Systems\",\"productSlug\":\"bachelors/information-systems-uta-sl\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/3ca4bc93-69a5-40d4-9cf2-fdffa3edd89a-406315ebbec2.jpg\",\"productType\":\"Bachelors\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"University of Utah\"],\"partnerKeys\":[\"UTA\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/893259bc-25b5-4160-b70f-02f8ea4de6a8-65baf2092bb3.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$206\",\"objectId\":\"program-3ca4bc93-69a5-40d4-9cf2-fdffa3edd89a\",\"productSource\":\"shorelight\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"IN\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"2770c82f-d3dd-4789-9635-f7e27334e06b\",\"productName\":\"Information Systems\",\"productSlug\":\"bachelors/information-systems-adu-sl\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/2770c82f-d3dd-4789-9635-f7e27334e06b-ed5ea8669ccd.jpg\",\"productType\":\"Bachelors\",\"attributes\":[\"Data Analysis \u0026 Statistics\"],\"partnerName\":[\"Adelphi University\"],\"partnerKeys\":[\"ADU\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8a3a7e33-8c13-4de4-8956-539f4b2e3984-575f6fd58281.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"$207\",\"objectId\":\"program-2770c82f-d3dd-4789-9635-f7e27334e06b\",\"productSource\":\"shorelight\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"IN\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"075eba3a-3c15-4f32-aae0-99623723b15b\",\"productName\":\"Bachelor of Science in Management Information Systems\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-management-information-systems\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/075eba3a-3c15-4f32-aae0-99623723b15b-a1a81f1c699d.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"In today’s digital world, organizations large and small need qualified \\r\\nmanagement information systems (MIS) professionals to design and manage the \\r\\ncomputer and network systems they rely on for organizational success.That’s why Maryville University’s 100% online bachelor’s degree in \\r\\nmanagement information systems combines cutting-edge MIS skills with key \\r\\nbusiness insights to help you become an invaluable asset to upper \\r\\nmanagement. You’ll gain practical experience in programming, \\r\\nproblem-solving, project management, analytics, and network security as you \\r\\ndevelop the cross-functional expertise you need to become a technical and \\r\\nstrategic leader in any organization.\",\"objectId\":\"program-075eba3a-3c15-4f32-aae0-99623723b15b\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"4d1f7feb-cad6-41f2-91b6-5fabe6d93da5\",\"productName\":\"Bachelor of Science in Human Resource Management\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-human-resource-management\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/4d1f7feb-cad6-41f2-91b6-5fabe6d93da5-14bd7dd6e288.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Make a difference in your career — and the careers of othersAsk any leader what the most valuable business asset is, and they’ll tell \\r\\nyou: great employees. They’re the heart and soul of every company — from \\r\\nsmall, local start-ups to massive, global corporations.That’s why Maryville University designed a program that can help prepare \\r\\nyou for positions in this vital field. With our online Bachelor of Science \\r\\nin Human Resource Management degree, you can learn how to apply modern HR \\r\\nprinciples and technology to facilitate talent recruitment and development \\r\\nto meet the strategic goals of your organization. The coursework includes \\r\\ncurrent issues, trends, and technology within the field of human resources, \\r\\nand emphasizes the effective management of an organization’s employees. \\r\\nEmployees make a world of difference to an organization. With one brave \\r\\ndecision, you can earn a degree that allows you to make a world of \\r\\ndifference to employees.Get Curriculum Details\",\"objectId\":\"program-4d1f7feb-cad6-41f2-91b6-5fabe6d93da5\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"008edcc2-6c7d-4f35-a103-1470128712fd\",\"productName\":\"Bachelor of Arts in Communication\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-arts-in-communication\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/008edcc2-6c7d-4f35-a103-1470128712fd-1b08b6247e2e.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"Digital technology is revolutionizing how people interact and share \\r\\ninformation. In today’s high-tech world, employers need strategic and \\r\\ncreative communication professionals who have the skills to make their \\r\\nmessages seen and heard.Maryville University’s 100% online bachelor’s \\r\\ndegree in communication prepares you for a lifelong career in strategic \\r\\nmedia fields. Whether you’re looking to get your start as a content creator \\r\\nor advance your career in business, advertising, education, or publishing, \\r\\nour online communication degree provides the knowledge you need to succeed. \\r\\nChoose from two program concentrations — strategic communication theory \\r\\nwith project-based learning or a hands-on track focused on in-demand \\r\\nskills, such as web design, digital writing, and social media campaign \\r\\nmanagement.Are you ready to start or advance your career in the fast-paced \\r\\nworld of communication? Take the next step and apply today.\",\"objectId\":\"program-008edcc2-6c7d-4f35-a103-1470128712fd\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null},{\"productUuid\":\"d2d8568d-4264-48ce-9b0d-76fd1412604b\",\"productName\":\"Bachelor of Science in Business Administration\",\"productSlug\":\"bachelors/maryville-university-bachelor-of-science-in-business-administration\",\"productImageUrl\":\"https://prod-discovery.edx-cdn.org/media/programs/card_images/d2d8568d-4264-48ce-9b0d-76fd1412604b-aa66a9d317cc.jpg\",\"productType\":\"Bachelors\",\"attributes\":[],\"partnerName\":[\"Maryville University\"],\"partnerKeys\":[\"Maryville\"],\"partnerLogoUrl\":\"https://prod-discovery.edx-cdn.org/organization/logos/8e585adc-f870-4e8f-abe8-e67da192d49c-33b63ce3ca64.png\",\"fullDescription\":\"\",\"shortDescription\":\"\",\"productOverview\":\"To succeed in this rapidly changing world, business leaders must have \\r\\nwide-ranging knowledge of economics, finance, management, marketing, and \\r\\noperations. That’s why Maryville University has developed an online \\r\\nbachelor’s in business administration program with input from top employers \\r\\nto provide you with the latest skills and best practices. As a Maryville \\r\\ngraduate, you’ll emerge ready and able to maximize ROI for any organization \\r\\nas you take your career to new heights.\",\"objectId\":\"program-d2d8568d-4264-48ce-9b0d-76fd1412604b\",\"productSource\":\"2u\",\"productCategory\":\"2U Degree\",\"activeRunKey\":null,\"childCoursesCount\":0,\"displayOnOrgPage\":true,\"allowedIn\":[\"US\"],\"blockedIn\":[],\"organizationLogoOverride\":null}]}],\"location\":\"product-catalog\",\"cardFormatSubtype\":\"$undefined\"}]\n"])</script></body></html>