AW Personal Banking Products ExcitingAds :: Exciting Ads

Zenni Women's Rectangle Prescription Glasses Purple Plastic Frame
Zenni Women's Rectangle Prescription Glasses Purple Plastic Frame
$12.95
A plastic full-rim frame. | Zenni Women's Rectangle Prescription Glasses Purple Plastic Frame [Read More]
Buy Now

Sitemap

 
"Sustainable Urban Development"
"Did you know that cities take up less than 3% of the earth’s land surface, but more than 50% of the world’s population live in them? And, cities generate more than 70% of the global emissions? Large cities and their hinterlands (jointly called metropolitan regions ) greatly contribute to global urbanization and sustainability challenges, yet are also key to resolving these same challenges. If you are interested in the challenges of the 21st century metropolitan regions and how these can be solved from within the city and by its inhabitants, then this Sustainable Urban Development course is for you! There are no simple solutions to these grand challenges! Rather the challenges cities face today require a holistic, systemic and transdisciplinary approach that spans different fields of expertise and disciplines such as urban planning, urban design, urban engineering, systems analysis, policy making, social sciences and entrepreneurship. This MOOC is all about this integration of different fields of knowledge within the metropolitan context. The course is set up in a unique matrix format that lets you pursue your line of interest along a specific metropolitan challenge or a specific theme. Because we are all part of the challenges as well as the solutions, we encourage you to participate actively! You will have the opportunity to explore the living conditions in your own city and compare your living environment with that of the global community. You will discover possible solutions for your city’s challenges and what it takes to implement these solutions. Your participation will also contribute to wider research into metropolitan regions as complex systems. We invite you to take the first steps in understanding the principles that will be essential to transform metropolitan regions into just, prosperous and sustainable places to live in! This course forms a part of the educational programme of the Amsterdam Institute for Advanced Metropolitan Solutions and is developed by Wageningen UR and TU Delft, two of the founding universities of AMS Institute."
Price: 50.00

"Principle of Semiconductor Devices Part I: Semiconductors, PN Junctions and Bipolar Junction Transistors"
"As a topic of study, semiconductor devices offer aunique challenge due to the complex mathematics involved. In this course, we takea more intuitive approach to explore the underlying concepts.Eschewing mathematics, we use engaging animations to help you visualize the working principles of many common semiconductor devices. Whether you are completely new to the subject or an experienced engineer, thiscourse will give you a differentperspective and a new way to look at the behaviors of semiconductor devices. Reducing the reliance of equations does not mean the depth of the material is sacrificed. In fact, the course provides evenmore in-depth explanations of key concepts.We shift the focus from quantitatively evaluating the behavior of semiconductor devices to intuitively visualizing the semiconductor device actions. In addition, the courseoffers a widearray of content - from basic PN junctions to modern nano-electronic circuit and systems. Besides covering the existing technologies, the course also explores the development of the industry into the future."
Price: 70.00

"Principle of Semiconductor Devices Part II: Field Effect Transistors and MOSFETs"
"As a topic of study, semiconductor devices offer a unique challenge due to the complex mathematics involved. In this course, we take a more intuitive approach to explore the underlying concepts. Eschewing mathematics, we use engaging animations to help you visualize the working principles of many common semiconductor devices. Whether you are completely new to the subject or an experienced engineer, this course will give you a different perspective and a new way to look at the behaviors of semiconductor devices. Reducing the reliance of equations does not mean the depth of the material is sacrificed. In fact, the course provides even more in-depth explanations of key concepts. We shift the focus from quantitatively evaluating the behavior of semiconductor devices to intuitively visualizing the semiconductor device actions. Follow the approach from Part I, we expand the understanding from PN junction diodes and BJTs to MOS capacitors, charge coupled devices and MOSFETs. In addition to describing the theory of MOSFETs, the course covers some more recent development of non-traditional nano-CMOS transistors. Besides covering the existing technologies, the course will also enable you to project the development of the industry in the near future."
Price: 60.00

"ChinaX Book Club: Five Authors, Five Books, Five Views of China"
"How can literature and literary analysis allow us to understand the dynamics of contemporary China? **** China’s historical and cultural transformations, and its imaginary and actual engagements in everyday life are vividly dramatized by five Chinese authors featured in this course. Taught by Harvard faculty member Professor David Wang, this course will employ the tools of close reading, discussion, and analysis to explore issues that concern the Chinese people, and ponder the power (and limitations) of literature in imagining China anew. Featured Books and Authors **** China in 10 Words by Yu Hua (ISBN: 978-0-307-73979-7) Red Sorghum: A Novel of China by Mo Yan (ISBN: 978-0-14-016854-9) Lenin's Kisses by Yan Lianke (ISBN: 978-0-8021-2177-6) Waiting by Ha Jin (ISBN: 978-0-375-70641-7) The Song of Everlasting Sorrow by Wang Anyi (ISBN: 978-0231143431) This course features interviews and discussions with the authors. More Information about each of these authors is available in the syllabus."
Price: 139.00

"Fundamentos de fotografía documental"
"El curso proporcionará, desde cero, herramientas teóricas y técnicas para emplear la fotografía como documento que forma parte de la investigación en las ciencias sociales, artes y las humanidades. No obstante, el campo es mucho más amplio en cuanto desarrollan capacidades interpretativas y creativas de la fotografía. Es así como se considera que el curso une un desenvolvimiento en torno la semiótica, la técnica, la teoría y el uso de la fotografía con fines documentales. Al terminar el curso, los estudiantes aprenderán el concepto de fotografía documental, conocerán la formar de sacar provecho a la cámara y lograrán dar sentido a la fotografía como documento reflejado en la creación de un proyecto de fotografía documental, a través de actividades prácticas y videos con expertos en el campo, con el propósito de enriquecer su forma de interpretar el mundo a través de la fotografía."
Price: 49.00

"Fundamentals of Current Flow"
"Very different from what is taught in standard courses, ""Fundamentals of Current Flow"" provides a unified conceptual framework for ballistic and diffusive transport of both electrons and phonons - essential information for understanding nanoelectronic devices. The traditional description of electronic motion through a solid is based on diffusive transport, which means that the electron takes a random walk from the source to the drain of a transistor, for example. However, modern nanoelectronic devices often have channel lengths comparable to a mean free path so that electrons travel ballistically, or ""like a bullet."" Verified/Master's students taking this course will be required to complete two (2) proctored exams using the edX online Proctortrack software. To be sure your computer is compatible, see Proctortrack Technical Requirements. Nanoscience and Technology MicroMasters ® Fundamentals of Current Flow is one course in a growing suite of unique, 1-credit-hour short courses developed in an edX/Purdue University collaboration. Students may elect to pursue a verified certificate for this specific course alone or as one of the six courses needed for the edX/Purdue MicroMasters® program in Nanoscience and Technology. For further information and other courses offered, see the Nanoscience and Technology MicroMasters® page. Courses like this can also apply toward a Purdue University MSECE degree for students accepted into the full master’s program."
Price: 750.00

"Computer Forensics"
"Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Network Security"
"In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect. You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks. This course is a part of the RITx Cybersecurity MicroMasters Program."
Price: 150.00

"Cybersecurity Risk Management"
"Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional. The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies. First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis. Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk. Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence. Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Computer Forensics"
"Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Cybersecurity Fundamentals"
"In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain. You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Computer Forensics"
"Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Cybersecurity Risk Management"
"Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional. The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies. First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis. Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk. Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence. Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Network Security"
"In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect. You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks. This course is a part of the RITx Cybersecurity MicroMasters Program."
Price: 150.00

"Cybersecurity Capstone"
"The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success. Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters certificate. During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment: Access to a laptop or desktop computer A modern web browser with Javascript enabled A fast internet connection The areas of hands-on lab activities include, but are not limited to: basic systems and network services such as firewall, DNS, DHCP, Wireshark digital forensics investigation with tools such as Encase, FTK, and Volatility Framework network security related tools such as port scanning, Snort, and Metasploit, etc. You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform."
Price: 600.00

"Cybersecurity Capstone"
"The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success. Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters certificate. During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment: Access to a laptop or desktop computer A modern web browser with Javascript enabled A fast internet connection The areas of hands-on lab activities include, but are not limited to: basic systems and network services such as firewall, DNS, DHCP, Wireshark digital forensics investigation with tools such as Encase, FTK, and Volatility Framework network security related tools such as port scanning, Snort, and Metasploit, etc. You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform."
Price: 600.00

"Cybersecurity Risk Management"
"Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation. In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional. The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies. First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis. Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk. Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence. Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Cybersecurity Fundamentals"
"In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain. You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small. This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security."
Price: 150.00

"Network Security"
"In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect. You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks. This course is a part of the RITx Cybersecurity MicroMasters Program."
Price: 150.00

"Essentials of Genomics and Biomedical Informatics"
"Three innovations are driving the data revolution in medicine. Next Generation Sequencing, and in particular, the ability to sequence individual genomes at diminishing costs. Electronic Medical Records, and our ability to mine, using machine learning techniques, huge datasets of medical records. Wearable devices, the Web, social networks and crowdsourcing - exemplifying the surprising capacity to collect medical data using non-conventional resources. In order to take advantage of these technologies and participate in the revolution, physicians need a new toolbox that is generally lacking in the medical school curriculum. This course is a product of a decade of a collaborative effort between researchers from the computational biology program at Bar-Ilan University, and clinicians from Sheba Medical Center to develop and deliver an extended curriculum in genomics and biomedical informatics. The program has been endorsed by the Israeli Medicine Association and Ministry of Health. Here, we present a condensed online course that includes selected topics chosen from the extended program. This GaBI course on edX presents clinicians and digital health enthusiasts with an overview of the data revolution in medicine, and how to take advantage of it for research and in the clinic. In the scope of this single course, you will not become a bioinformatician, but you will be able to familiarize yourself with the main concepts, tools, algorithms, and databases used in this field, and understand the types of problems that these analysis techniques can help address. The syllabus covers the main topics of this discipline in a logical order: ● Methods used to obtain medical data (genotypic and phenotypic) ● Analysis of biological molecules such as DNA, RNA, and proteins using various computational tools from the field of bioinformatics ● Use of machine learning and artificial intelligence tools to mine the huge databases of medical information accumulating in Electronic Medical Records (EMRs), the Web, and numerous data science projects in medicine ● Analysis of complex interaction networks between DNA, RNA and protein molecules to gain a more holistic and systematic view of biological systems and medical conditions ● Practical applications in the clinic and in personalized medicine research, and the use of cutting edge technology to improve health"
Price: 49.00

"Bienestar para el desarrollo personal y profesional"
"El bienestar se ha convertido en una tendencia global que busca el equilibrio y balance en la vida de cada persona. Sin embargo, hasta ahorita comienza a ser parte de Latino América. Con este curso, podrás ser parte del cambio. “El bienestar es el gran reto de este siglo, y Penguin Random House México apuesta por la propuesta práctica e inteligente de Barriguete en “Los Pilares del Bienestar”. Su contenido esta pensado para todo terreno, todas las audiencias, que encuentren las respuestas en sus páginas, y ahora en especial incluye a los estudiantes en línea del ""MOOC BIENESTAR edX” , enhorabuena"". Andrés Ramírez, Director editorial de Penguin Random House México. La OMS definió la salud en 1946 como: “un estado de completo bienestar físico, mental y social, y no solamente la ausencia de afecciones o enfermedades”. Partiendo de esto, ¿qué es bienestar? En este curso podrás entender lo que es el bienestar y, con esto, tener las herramientas para estar bien en el ámbito físico, mental, emocional y social. El pensar y trabajar en el bienestar parte de un enfoque sobre el equilibrio y la búsqueda de un balance en la vida. Estar bien significa tener salud, disfrutar la vida y saber equilibrarse. Para esto, identificaremos los espacios y conductas de riesgo, así como los momentos críticos de la vida, donde surgen cambios que nos ponen vulnerables y nos sacan del equilibrio. Estudios evidencian que a mayor bienestar mental y satisfacción con la vida, mejor desempeño personal y profesional. Asimismo, el bienestar emocional se asocia con temas como resiliencia, autoestima, motivación, confianza en uno mismo y con el potencial que se tiene para lograr un objetivo o fin. (Clark,C., 2018). Este curso aporta una visión integral a la solución de los principales problemas físicos y emocionales, a partir de “estar bien”. A partir del contenido podrás compartirla con otros, construyendo un camino hacia una red social y guiando hacia un entorno de bienestar. También aprenderás a identificar y desarrollar un estado personal de Bienestar, que podrás compartir con familia, a través de conocer e identificar las conductas o ambientes de riesgo. Para finalmente lograr crear un Centro de Bienestar, en tu centro educativo o laboral."
Price: 29.00

"CSS Basics"
"This course is part of W3C's ""Front-End Web Developer"" Professional Certificate. Have you just begun your journey into Web development? This course will introduce you to the basics of Web design and teach you how to style your Web site for a professional look and feel. The Microsoft team and experts from the World Wide Web Consortium (W3C) will guide you step-by-step in using the latest Web standards to structure your content and presentation like a professional. In this course, you will explore numerous CSS features to help you control the look and feel of your site such as colors, fonts and layout. By the end of the course, you should understand all the fundamental elements of CSS and how to use them effectively. It is recommended that you are at least a little familiar with HTML before taking this course, but we will be providing you with the HTML code when necessary."
Price: 199.00

"A System View of Communications: From Signals to Packets (Part 1)"
"Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009."
Price: 60.00

"A System View of Communications: From Signals to Packets (Part 3)"
"Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? Gain an understanding of the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009."
Price: 50.00

"A System View of Communications: From Signals to Packets (Part 2)"
"Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009."
Price: 50.00

"Co-Creating Sustainable Cities"
"Around the world, major challenges of our time such as population growth and climate change are being addressed in cities. Here, citizens play an important role amidst governments, companies, NGOs and researchers in creating social, technological and political innovations for achieving sustainability. Citizens can be co-creators of sustainable cities when they engage in city politics or in the design of the urban environment and its technologies and infrastructure. In addition, citizens influence and are influenced by the technologies and systems that they use every day. Sustainability is thus a result of the interplay between technology, policy and people’s daily lives. Understanding this interplay is essential for creating sustainable cities. In this MOOC, we zoom in on Amsterdam, Beijing, Ho Chi Minh City, Nairobi, Kampala and Suzhou as living labs for exploring the dynamics of co-creation for sustainable cities worldwide. We will address topics such as participative democracy and legitimacy, ICTs and big data, infrastructure and technology, and SMART technologies in daily life. This global scope will be used to illustrate why specific forms of co-creation are preferred in specific urban contexts. Moreover, we will investigate and compare these cities on three themes that have a vast effect on city life: Water and waste Energy, air, food and mobility Green spaces and food This MOOC will teach you about the dynamics of co-creation and the key principles of citizens interacting with service providing companies, technology and infrastructure developers, policy makers and researchers. You will gain an understanding of major types of co-creation and their interdependency with their socio-technical and political contexts. You will become equipped to indicate how you can use co-creation to develop innovative technologies, policy arrangements or social practices for a sustainable city in your own community. You will demonstrate this by developing an action plan, research proposal or project idea. Basic knowledge of sustainability in urban settings, urban environmental technology and urban management is assumed."
Price: 49.00

"Cómo innovar con escasos recursos: innovación frugal"
"¿Innovar frugal significa disminuir costos de producción y funcionalidades, simplificando y abaratando un producto o servicio? No. Desde una perspectiva holística, la innovación frugal implica desarrollar el proceso para que una solución tenga un carácter sostenible, funcional, digno, incluyente y asequible; es en ese contexto que la innovación frugal puede ser considerada una herramienta para el desarrollo. Este curso es una introducción a las competencias de innovación frugal desarrolladas en el Hub de Innovación Frugal de la Universidad Jesuita de Santa Clara en California, a través del análisis de casos y de los enfoques que se están generando para este concepto a nivel global. La Red Latinoamericana de Innovación Frugal contribuye con el diseño de este curso al desarrollo y consolidación de la perspectiva frugal de la innovación. El curso contempla los siguientes módulos: 1) Conceptualización y contexto de la innovación frugal, y 2) Aplicación de la innovación frugal al diseño de soluciones. Durante ambos módulos se presentan casos para destacar buenas prácticas y relacionar la conceptualización y las herramientas con escenarios reales."
Price: 49.00

"Public Financial Management"
"This IMFx course is designed to strengthen participants' abilities to assess why Public Financial Management (PFM) is important; and how it supports macroeconomic stability, economic growth, and the achievement of the Sustainable Development Goals. Presented by staff of the International Monetary Fund whoprovide advice to countries on their PFM institutions and reform plans, the course provides a practitioner's view to PFM starting with what PFM is, and why it is important. Over five parts, the course modules cover all stages of the budget cycle, and discuss key concepts from budget preparation, to government accountability in budget execution, and reform implementation. You will explore these topics through video lectures, relevant readings, and testimonies from senior policy-makers and civil society. During the lectures, presenters will use examples from countries at different stages of economic development. Throughout the course, you will have the opportunity to engage with fellow participants from around the world, and with course staff through the discussion forum. Assessments in each course module will test your understanding of key concepts, allowing you to track the progress of your understanding. A case study at the end of the course brings together the different aspects of how governments should manage their money, and deliver public services. This course is offered by the IMF, with financial support from the United States Agency for International Development (USAID). The IMF’s online learning program receives financial support from the Government of Japan."
Price: 25.00

"Cómo Aprender Online"
"Diseñado para aquellos que son nuevos en el aprendizaje en línea, este curso te preparará con estrategias para convertirte en un estudiante en línea exitoso. El equipo de diseño de aprendizaje de edX ha seleccionado algunas de las técnicas más eficaces respaldadas por la ciencia que podrás empezar a utilizar de inmediato y en cualquier plataforma en línea. El certificado verificado de este curso es gratuito. Utiliza el siguiente código antes del 1 de septiembre de 2020 para optar por la ruta verificada sin ningún coste: MAXUAPUBJLMBF326 Este curso te ayudará a responder las siguientes preguntas: ¿Cómo puedo tomar notas durante clases en vivo o grabadas? ¿Cuál es la diferencia? ¿Para qué sirven los foros de discusión y cómo debería participar en ellos para obtener el máximo beneficio? ¿Qué puedo hacer si tengo problemas de concentración o no tengo tiempo para completar los ejercicios? ¿Cuál es el entorno de estudio ideal?"
Price: 49.00

"A System View of Communications: From Signals to Packets (Part 1)"
"Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009."
Price: 60.00