Online courses directory (548)

Sort by: Name, Rating, Price
Start time: Any, Upcoming, Recent started, New, Always Open
Price: Any, Free, Paid
5 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Application Computing science Content Digital+Games Lung cancer Mental

This course gives students a background in theory and practice surrounding online interaction environments. For the purpose of this course, a community is defined as a group of people who sustain interaction over time. The group may be held together by a common identity, a collective purpose, or merely by the individual utility gained from the interactions. An online interaction environment is an electronic forum, accessed through computers or other electronic devices, in which community members can conduct some or all of their interactions. The term eCommunity is used as shorthand, both for communities that conduct all of their interactions online and for communities that use online interaction to supplement face-to-face interactions. Two main threads weave through the course, based on the two main texts. One thread is concerned with the practical issues of design and use of online tools to support communities, and how choices that must be made in design can impact the function and style of the resulting community. The second thread focuses on the sociological theory that provides a frame to better understand communities in general. These theoretical pieces provide a lens for better understanding the implications of choices made on the more practical level. Course Level: Graduate This Work, SI 529 - eCommunities: Analysis and Design of Online Interaction Environments, by Paul Resnick is licensed under a Creative Commons Attribution license.

5 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Circulatory system Mathematical thinking Ratios and proportions Speed reading

Records are the corporate and cultural memory that provide proof of actions and decisions, build a knowledge-base for reflection and learning, and form a perspective on today's society that we will pass on to future generations. As organizations create and maintain more of their records electronically, they are struggling to develop effective policies, systems, and practices to capture, maintain, and preserve electronic records. This course examines the ways in which new information technologies challenge organizations' capacities to define, identify, control, manage, and preserve electronic records. Students learn how different organizational, technological, regulatory, and cultural factors affect the strategies, practices, and tools that organizations can employ to manage electronic records. Problems of long-term preservation and continuing access to electronic records are analyzed and addressed. Addresses electronic records management issues in a wide variety of settings, including archives and manuscript repositories. Course Level: Graduate This Work, SI 655 - Management of Electronic Records, by David A. Wallace, Margaret Hedstrom is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.

5 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

The Internet has become one of the most important components of our life. We browse the Web, check e-mails, make VoIP phone calls, and have video conferences via computers. All of these applications are made possible by networking computers together, and this complex network of computers is usually referred to as the Internet. This course is designed to give you a clear understanding of how networks, from in-home local area networks, or LANS, to the massive and global Internet, are built and how they allow us to use computers to share information and communicate with one another. Unit 1 introduces you to an explanation of what computer networks are as well as to some basic terminology fundamental to understanding computer networks. You will also familiarize yourself with the concept of layers, which compose the framework around which networks are built. Next, Unit 2 explains the concept of protocols. A computer communication (or network) protocol defines rules and conventions for communication between netwo…

5 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Christian Leadership Double and triple integrals Health Care System Hybris online training Wars and Social Science

This course introduces students to the ideas and practices surrounding teaching, learning and research at a world class research university like the University of Michigan, and the emerging role in these practices of Open Educational Resources, including open content such as opencourseware, open access initiatives, open publishing of research and learning materials as found in open journals, databases and e-prints, open textbooks, related open software efforts such as open learning systems, and emerging open teaching experiments. The course will ground the students in how teaching, learning and research is done at the university level, and then survey relevant OER efforts, looking at their history, development, potential futures, and the underlying motivations for their progressive adoption by various members of the community of scholars. more... This course uses an open textbook Open Educational Resources at the University of Michigan. The articles in the open textbook (wikibook) were written by the School of Information Graduate students in the class. Course Level: Graduate This Work, SI 521 - Special Topics: Open Educational Resources and the University of Michigan, by Joseph Hardin is licensed under a Creative Commons Attribution license.

5 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

User dependency on the Internet increases every day; nowadays, everyday tasks like paying bills, communicating with others, and applying for jobs are all routinely carried out via the Internet.  While the Internet represents a huge network, it is meaningless without the applications that it supports.  These applications enable user interaction and facilitate everyday activities.  In this course, we will learn about the design and implementation of network-based applications, focusing on Object-Oriented Programming and programming techniques both at the application layer and the transport layer of the TCP/IP protocol stack.  Additional concepts covered include text transport (moving text from one computer to another over the network), data transport, object transport, remote function calls, and, finally, class transport.  You will approach these concepts from an Object-Oriented point of view, learning to implement design patterns in your code in order to ensure software reusability (a highly desirable fea…

5 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

Technology continues to evolve and provide us with increasingly powerful mobile devices.  As a result, applications that can run on a browser must also be written such that they are compatible with mobile devices, the majority of which are now web-enabled.  Meanwhile, there is an increasing demand for native applications that can be downloaded to and run on mobile devices.  This course will address these trends, teaching you to think about the unique design and deployment issues that must be taken into consideration when developing applications for mobile devices. This course will expand upon what has been covered in CS305: Web Development [1].  We will specifically look at the tools used to design mobile applications.  We will learn about mobile platforms, mobile browsers, native applications, and best practices in terms of test usability. [1] http://www.saylor.org/courses/cs305/…

5 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Acupuncture Adobve Muse Biomedical Engineering Ecology and Evolutionary Biology Emphysema Growth

This is a standard course in "game theory," designed with the School of Information MSI students as the primary audience. This course is the pre-requisite for several ICD courses. To be well-prepared for management, policy and analysis in the information professions you need to first have a solid grounding in game theory and its applications to problem solving. Thus, the primary objective is to teach you a set of useful theories and how to apply them to solve problems. The emphasis is on method and application. Course Level: Graduate This Work, SI 563 - Game Theory, by Yan Chen is licensed under a Creative Commons Attribution-NonCommercial license.

5 votes
Saylor.org Free Closed [?] Computer Sciences Biology%252525252B&%252525252BLife%252525252BSciences.htm%252525253Fcategoryid%252525253D7.htm%25252 Evaluation Nutrition Taking derivatives USMx Website Development

Because we have compiler programs, software developers often take the process of compilation for granted.  However, as a software developer, you should cultivate a solid understanding of how compilers work in order to develop the strongest code possible and fully understand its underlying language.  In addition, the compilation process comprises techniques that are applicable to the development of many software applications.  As such, this course will introduce you to the compilation process, present foundational topics on formal languages and outline each of the essential compiler steps: scanning, parsing, translation and semantic analysis, code generation, and optimization.  By the end of the class, you will have a strong understanding of what it means to compile a program, what happens in the process of translating a higher-level language into a lower-level language, and the applicability of the steps of the compilation process to other applications.

Starts : 2005-02-01
5 votes
MIT OpenCourseWare (OCW) Free Computer Sciences Before 1300: Ancient and Medieval History Infor Information environments Information Theory Nutrition

This course is offered to graduates and includes topics such as mathematical models of systems from observations of their behavior; time series, state-space, and input-output models; model structures, parametrization, and identifiability; non-parametric methods; prediction error methods for parameter estimation, convergence, consistency, and asymptotic distribution; relations to maximum likelihood estimation; recursive estimation; relation to Kalman filters; structure determination; order estimation; Akaike criterion; bounded but unknown noise model; and robustness and practical issues.

4 votes
Saylor.org Free Closed [?] Computer Sciences Customer Service Certification Program Evaluation Navigation+SAP Nutrition Taking derivatives

If you invest in financial markets, you may want to predict the price of a stock in six months from now on the basis of company performance measures and other economic factors. As a college student, you may be interested in knowing the dependence of the mean starting salary of a college graduate, based on your GPA. These are just some examples that highlight how statistics are used in our modern society. To figure out the desired information for each example, you need data to analyze. The purpose of this course is to introduce you to the subject of statistics as a science of data. There is data abound in this information age; how to extract useful knowledge and gain a sound understanding in complex data sets has been more of a challenge. In this course, we will focus on the fundamentals of statistics, which may be broadly described as the techniques to collect, clarify, summarize, organize, analyze, and interpret numerical information. This course will begin with a brief overview of the discipline of stat…

4 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course focuses on the fundamentals of computer algorithms, emphasizing methods useful in practice.  We look into the algorithm analysis as a way to understand behavior of computer programs as a function of its input size.  Using the big-O notation, we classify algorithms by their efficiency.  We look into basic algorithm strategies and approaches to problem solving.  Some of these approaches include the divide and conquer method, dynamic programming, and greedy programming paradigms.  Sorting and searching algorithms are discussed in detail as they form part of a solution to a large number of problems solved using computers.  We also provide an introduction to the graph theory and graph algorithms as they are also used in many computer-based applications today.  We conclude the course with a look into a special class of problems called the NP-complete problems.

4 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences human sexuality ImperialX Obesity Polynomial and rational functions Qa testing training in Tecnológico de Monterrey

This seminar provides students an opportunity to do in-depth research into an information policy topic of their interest. Students will gain an understanding of current United States Government Policy in areas involved with information and information technology. Policies are forming and changing daily. In order to keep up with these changes the class includes guest lecturers who are studying or actually creating policies in the information area. The first part of the course consists of the student selecting and defining a topic. The second part of the course involves the presentation and discussion of the topic. As an advanced graduate course there is an expectation that the final paper will be, with suitable editing, publishable in a journal. Course Level: Graduate This Work, SI 550 - Seminar on Information Policy, by Victor Rosenberg is licensed under a Creative Commons Attribution license.

4 votes
OLI. Carnegie Mellon University Free Computer Sciences Glass ionomers Newborn respiratory diseases

An ongoing development effort in collaboration with the Software Engineering Institute’s CERT [1], this course focuses on common security issues in C and C++ development. With security expert Robert Seacord serving as lead content author, the course addresses a key need in professional education for software developers. Topics to be covered include the secure and insecure use of integers, arrays, strings, dynamic memory, formatted input/output functions, and file I/O. Continued development is being funded by partnerships with industry. [1] http://www.cert.org/

4 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course will present advanced topics in Artificial Intelligence (AI).  We will begin by defining the term “software agent” and discussing how software agents differ from programs in general.  We will then take a look at those problems in the field of AI that tend to receive the most attention.  Different researchers approach these problems differently.  In this course, we will focus on how to build and search graph data structures needed to create software agents, an approach that you will find useful for solving many problems in AI.  We will also learn to “break down” larger problems into a number of more specific, manageable sub-problems. In the latter portion of this course, we will review the study of logic and conceptualize the differences between propositional logic, first-order logic, fuzzy logic, and default logic.  After learning about statistical tools commonly used in AI and about the basic symbol system used to represent knowledge, we will focus on artificial neural network and…

4 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences ImperialX Investments Polynomial and rational functions Trauma

As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. Course Level: Graduate This Work, SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, by Don Blumenthal is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.

3 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her dat…

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences 1400-1500 Renaissance in Italy and the North Diplomacy Fetus Newcastle+University Nonprofit organizations Patient communication

This course examines and evaluates the archival field's current preservation standards for storage and duplication. Critical preservation problems

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences Health+&+Safety RWTHx Social+Science Thermo Can University of Bath

To appreciate the opportunities and make wise choices about the use of technology, information professionals need to understand the architectures of modern information systems. In alternative system architectures, storage, communication, and processing substitute for and complement each other in different ways. This course introduces students, at several different levels of abstraction, to sets of functional components and alternative ways of combining those components to form systems. It also introduces a set of desirable system properties and a core set of techniques that are useful in building systems that have those properties. Course Level: Graduate This Work, SI 502 - Networked Computing: Storage, Communication, and Processing, by Charles Severance is licensed under a Creative Commons Attribution license.

3 votes
Open.Michigan Initiative, University of Michigan Free Computer Sciences human sexuality writing instruction Introduction to Programming Literature Open Educational Resource Polynomial and rational functions

This course introduces students to the conceptual, institutional, and practical foundations of information policy analysis and design. The course explores the regulatory histories, paradigms, processes, and actors shaping the ongoing development of the information field. Course topics provide a comprehensive grounding in telecommunications policy; competition and antitrust; concentration, diversity and expression; intellectual property; standards and innovation; peer production and user innovation; information privacy; digital governance; and transnational information policy. The course also emphasizes the development of core information policy skills, introducing students to relevant analytic contributions from the fields of economics, communication, law, and public policy. Course Level: Graduate This Work, SI 507 / 703 - Information Policy Analysis and Design, by Steven J. Jackson is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike license.

3 votes
Saylor.org Free Closed [?] Computer Sciences Evaluation Nutrition Taking derivatives

While CS403: Introduction to Modern Database Systems [1] covered many of the core concepts behind database management systems, there are many other considerations that should be addressed if you intend to pursue a career in this field.  This course will expand upon what you learned about SQL in CS403 and introduce various other advanced topics, including query optimization, concurrency, data warehouses, object-oriented extensions, and XML.  While CS403 introduced the basics of database management systems, the additional topics covered in this course will help you become more proficient in writing queries and will expand your knowledge base so that you have a better understanding of the field.  By the end of this course, you should have a solid grasp on data warehouses and XML, which will prove to be invaluable as you progress further in your Computer Science studies. [1] http://www.saylor.org/courses/cs403/…

Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.