Online courses directory (19947)
This is a survey course designed to provide a broad, forward-facing overview of contemporary health informatics, a specialized field of computing that seeks to improve the quality and efficiency of healthcare delivery. To understand health informatics (HIT) you also need to have at least a basic understanding of the complex and highly regulated US healthcare industry. The course is designed for students from diverse backgrounds and who have not been previously exposed to HIT. It is divided into three sections: 1. The US healthcare delivery and the key role of the federal government in promoting HIT adoption 2. The core technologies that drive all contemporary HIT systems and tools 3. The real world applications of HIT from electronic medical and personal health records to exploiting digital data aggregated from them for research and other purposes
Swift is a language created by Apple specifically for iOS and OS X development. It’s fast, concise, and comes with tools which make it easier than ever to visualize one's code. This course focuses on the syntax of the Swift programming language. By the end of the course, students should be able to apply Swift essentials to building iOS apps and employ Swift's more unique elements, like optional types and switch statements, with confidence.
This course covers the essentials of working with remote repositories. You'll be able to connect to a remote repository, get changes from a remote repository, and send changes to a remote repository. You'll also learn how to work collaboratively. You'll fork another developer's repository, make changes to it, and then send them a pull request. You'll also pick up some Git tips and tricks that make working with collaborators a breeze.
The Problem Solving with Analytics course provides students with the foundational knowledge to use data analytics to create business insights. You will learn:
In this course, we will study the concepts and algorithms behind some of the remarkable successes of computer vision - capabilities such as face detection, handwritten digit recognition, reconstructing three-dimensional models of cities and more.
The course covers the basics: representing games and strategies, the extensive form (which computer scientists call game trees), repeated and stochastic games, coalitional games, and Bayesian games (modeling things like auctions).
ModPo is a fast-paced introduction to modern and contemporary U.S. poetry, with an emphasis on experimental verse, from Dickinson and Whitman to the present. Participants (who need no prior experience with poetry) will learn how to read poems that are supposedly "difficult."
In this class we will cover the essentials of sociology, to help you better understand your own life and situations far from your experience.
Extending your app to Android Wear smart watches allows you to reach your users wherever and whenever they'd want or need your app. As you'll learn in this course, you can take your existing Android development experience and apply it to developing for Android Wear. This course will take you through getting started, application structure, and information sharing between the wearable and the companion phone or the cloud. We'll also give you the knowledge necessary for designing great user experiences for wearables including how to take advantage of the always-on display of Android Wear devices. This course is part of the Ubiquitous Computing series. Designed as standalone short courses, you can take any course on its own, or take them all! * **Android Wear Development** [this course] * Android TV and Google Cast Development * Android Auto Development
Without customers, your business does not exist. Marketing helps you understand your potential user and focus your product on their needs. This course will help you organize a strategy of identifying your perfect user, find ways to connect with them and what you’ll say when you find them. This covers research, planning, execution and most importantly how to grow your user base. This course is part of our Tech Entrepreneur Nanodegree Program, click [here to learn more](https://www.udacity.com/course/tech-entrepreneur-nanodegree--nd007).
API (Application Programming Interface) endpoints are the connections between your application and the rest of the developer community. In this course you will learn about writing secure, developer-friendly APIs that will make your back-end application thrive and keep your users happy. At the end of this course you will create the back-end for a social application called "Meet n' Eat" that matches together users based on their location and food interests.
This course is a part of the Android Basics Nanodegree by Google. Android apps are everywhere and learning to build them can be a fantastic career move. Continue on your Android app development education and learn to build multi-screen apps! This course is designed for students who have completed the Android for Beginners course and the Android Basics: Multiscreen Apps course. You don’t need any programming experience besides that course! Learning anything new can be tough. We will walk you through the process of making Android apps, but to get the most out of this course, bring your enthusiasm for learning, and budget time on your calendar to learn with us. It will be an adventure! By the end of the course, you’ll build an app that gets you up to date earthquake information! If you’re curious about the road even farther ahead, these are the free courses that make up the Android Basics Nanodegree, in order: * Android Basics: User Interface * Android Basics: User Input * Android Basics: Multiscreen Apps * Android Basics: Networking (This Course) * Android Basics: Data Storage
In this course, you will learn to design the computer architecture of complex modern microprocessors.
Statistics One is a comprehensive yet friendly introduction to statistics.
This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations. Part I covers basic iterable data types, sorting, and searching algorithms.
This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
This class explores how computation impacts the entire workflow of photography, which is traditionally aimed at capturing light from a 3D scene to form a 2D image. A detailed study of the perceptual, technical and computational aspects of forming pictures, and more precisely the capture and depiction of reality on a (mostly 2D) medium of images is undertaken over the entire term. The scientific, perceptual, and artistic principles behind image-making will be emphasized, especially as impacted and changed by computation. Topics include the relationship between pictorial techniques and the human visual system; intrinsic limitations of 2D representations and their possible compensations; and technical issues involving capturing light to form images. Technical aspects of image capture and rendering, and exploration of how such a medium can be used to its maximum potential, will be examined. New forms of cameras and imaging paradigms will be introduced.
This course provides an introduction to computer vision including fundamentals of image formation, camera imaging geometry, feature detection and matching, multiview geometry including stereo, motion estimation and tracking, and classification. We’ll develop basic methods for applications that include finding known models in images, depth recovery from stereo, camera calibration, image stabilization, automated alignment (e.g. panoramas), tracking, and action recognition. We focus less on the machine learning aspect of CV as that is really classification theory best learned in an ML course. The focus of the course is to develop the intuitions and mathematics of the methods in lecture, and then to learn about the difference between theory and practice in the problem sets. All algorithms work perfectly in the slides. But remember what [Yogi Berra](http://yogiberramuseum.org/just-for-fun/yogisms/) said: In theory there is no difference between theory and practice. In practice there is. (Einstein said something similar but who knows more about real life?) In this course you do not, for the most part, apply high-level library functions but use low to mid level algorithms to analyze images and extract structural information.
This course is designed to teach you about managing application containers, using Kubernetes. We've built this course in partnership with experts such as Kelsey Hightower and Carter Morgan from Google and Netflix’s former Cloud Architect, Adrian Cockcroft (current Technology Fellow at Battery Ventures), who provide critical learning throughout the course. Mastering highly resilient and scalable infrastructure management is very important, because the modern expectation is that your favorite sites will be up 24/7, and that they will roll out new features frequently and without disruption of the service. Achieving this requires tools that allow you to ensure speed of development, infrastructure stability and ability to scale. Students with backgrounds in Operations or Development who are interested in managing container based infrastructure with Kubernetes are recommended to enroll! In this course you will learn to: - Containerize an application by creating Docker config files and build processes to produce all the necessary Docker images - Configure and launch an auto-scaling, self-healing Kubernetes cluster - Use Kubernetes to manage deploying, scaling, and updating your applications - Employ best practices for using containers in general, and specifically Kubernetes, when architecting and developing new microservices
This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.
Trusted paper writing service WriteMyPaper.Today will write the papers of any difficulty.