Description This specialization covers the basics of Innovation and Entrepreneurship courses in the EIT Digital Master Program. The program aims to educate students and deliver entrepreneurs with the right business skills and sense. UC Berkeley Haas School of Business and KTH Royal Institute of Technology are the academic partners in this Innovation and Entrepreneurship specialization.…
Description Three people died after the crash landing of an Asiana Airlines aircraft from Seoul, Korea, at San Fransisco International Airport (SFO) on July 6, 2013. The American National Transportation Safety Board (NTSB) established that the crash most probably was caused by the flight crew’s (in)actions. Three teenage girls lost their lives; two in the…
Description What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you’re in the right place! In this course, you’ll learn about the characteristics of…
Description System Validation is the field that studies the fundamentals of system communication and information processing. It allows automated analysis based on behavioural models of a system to see if a system works correctly. We want to guarantee that the systems does exactly what it is supposed to do. The techniques put forward in system…
Description Welcome to this course about privacy in the United States, We are thrilled to see that you are interested in this follow-up course on ‘privacy in the western world’. This course will drill down more in the privacy subject in US context. Through video lectures and quizzes we endeavor to build a solid foundation…
Description This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all privacy and…
Description It’s not you, it’s me! What’s going on? This course empowers students, professionals and wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It is provided a practical overview of challenging issues like identity credentials management…
Description This course will teach you how to design futureproof systems that meet the requirements of IoT systems: systems that are secure, interoperable, modifiable and scalable. Moreover, you’ll learn to apply best-in-class software architecture methods to help you design complex IoT and other applications. Lastly, you’ll come to understand the business impact of the technical…
Description This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You’ll discover all the available hardware and software components, such as processor families, operating systems, boards and networks. You’ll also learn how to actually use…
Description This capstone project course ties together the knowledge from three previous courses in IoT though embedded systems: Development of Real-Time Systems, Web Connectivity & Security and Embedded Hardware and Operating Systems. The students will develop a larger system using the learning outcomes from these courses, and the students will evaluate the developed system in…