Information Technology I helps students understand technical concepts underlying current and future …
Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.
In virtually every industry and every firm, information technology is driving change, …
In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don’t understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on manufacturing. Information Systems topics that will be covered include networks and distributed computing, including the World Wide Web, hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, B2B, the semantic web and electronic commerce. Sloan LFM students with an interest in Information Systems are encouraged to register for this course.
This course examines cyber dynamics and processes in international relations from different …
This course examines cyber dynamics and processes in international relations from different theoretical perspectives. It considers alternative theoretical and empirical frameworks consistent with characteristic features of cyberspace and emergent transformations at all levels of international interaction. Theories examined include realism and neorealism, institutionalism and liberalism, constructivism, and systems theory and lateral pressure. The course also highlights relevant features and proposes customized international relations theory for the cyber age. Students taking the graduate version are expected to pursue the subject in greater depth through reading and individual research.
Welcome to the website for An Introduction to Computer Networks, a free …
Welcome to the website for An Introduction to Computer Networks, a free and open general-purpose computer-networking textbook, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, security and the ns simulator.
The book is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, as a supplemental text for a wide variety of network-related courses, and as a reference work.
An introduction to several fundamental ideas in electrical engineering and computer science, …
An introduction to several fundamental ideas in electrical engineering and computer science, using digital communication systems as the vehicle. The three parts of the course—bits, signals, and packets—cover three corresponding layers of abstraction that form the basis of communication systems like the Internet. The course teaches ideas that are useful in other parts of EECS: abstraction, probabilistic analysis, superposition, time and frequency-domain representations, system design principles and trade-offs, and centralized and distributed algorithms. The course emphasizes connections between theoretical concepts and practice using programming tasks and some experiments with real-world communication channels.
Students in ESD.00 work on projects to address large, complex and seemingly …
Students in ESD.00 work on projects to address large, complex and seemingly intractable real-world problems, such as energy supply, environmental issues, health care delivery, and critical infrastructure (e.g., telecommunications, water supply, and transportation). The course introduces interdisciplinary approaches - rooted in engineering, management, and the social sciences - to considering these critical contemporary issues. Small, faculty-led teams select an engineering systems term project to illustrate one or more of these approaches.
This course provides an introduction to complex networks and their structure and …
This course provides an introduction to complex networks and their structure and function, with examples from engineering, applied mathematics, and social sciences. Topics include spectral graph theory, notions of centrality, random graph models, contagion phenomena, cascades and diffusion, and opinion dynamics.
The development of systems and network concepts for students can begin with …
The development of systems and network concepts for students can begin with this highly interactive inquiry into cell phone networks. Cell phones serve as a handy knowledge base on which to develop understanding. Each cell phone represents a node, and each phone’s address book represents an edge, or the calling relationships between cell phones. Students conceptualize the entire cell phone network by drawing a graphic that depicts each cell phone in the class as a circle (node) connected by directional lines (edges) to their classmate’s cell phones in their address book. Students are queried on the shortest pathway for calling and calling pathways when selected phones are knocked out using school and classroom scenarios.
Students then use a simulation followed by Cytoscape, visually graphing software, to model and interrogate the structure and properties of the class’s cell phone network. They investigate more advanced calling relationships and perturb the network (knock out cell towers) to reexamine the adjusted network’s properties. Advanced questions about roaming, cell towers and email focus on a deeper understanding of network behavior. Both the paper and software network exercises highlight numerous properties of networks and the activities of scientists with biological networks.
Target Audience: This is an introductory module that we recommend teaching before each of our other modules to give students a background in systems. This module can be applied easily to any content area and works best as written for students between 6th and 12th grades but can be adapted for other ages. The lessons work best when in-person with students. If you are looking for an Introduction to Systems for remote learning, please use our Systems are Everywhere module.
The aim of this video lesson is to teach students about the …
The aim of this video lesson is to teach students about the different topologies of computer networks and how they function. The approach that is used is highly correlated with common knowledge about weddings and the local Malay culture associated with weddings. Students should be able to relate the act of delivering food to a large crowd of people to the basic principles of network topologies and the method of data transfer within each type of topology. The lesson will begin in a classroom with students working in small groups, answering assigned questions. Teaching aids such as color cards will be used. One student from each group will be appointed as the wedding event manager, and she/he will have to discuss and act out with group members in order to answer more challenging questions. At the end of the lesson, students will be asked to come up with their own version of a hybrid computer network topology. The lesson concept taught here not only educates students on computer topologies, but also introduces students to an important cultural perspective of Malaysia. Above all, this video is designed to assist students with their study of Computer Literacy in schools. The lesson will take up to 60 minutes to complete. Materials needed include: 10 red cards representing waitresses; 10 green cards representing waiters; 10 blue cards representing tables in the hall; a sketch book; and classroom tables and chairs.
Lecture for the course "CSCI 380 - Mobile Application and Product Development" …
Lecture for the course "CSCI 380 - Mobile Application and Product Development" delivered at John Jay College in Spring 2019 by Bhargava Chinthirla and Eric Spector as part of the Tech-in-Residence Corps program.
This is a basic subject on matrix theory and linear algebra. Emphasis …
This is a basic subject on matrix theory and linear algebra. Emphasis is given to topics that will be useful in other disciplines, including systems of equations, vector spaces, determinants, eigenvalues, similarity, and positive definite matrices.
This course covers matrix theory and linear algebra, emphasizing topics useful in …
This course covers matrix theory and linear algebra, emphasizing topics useful in other disciplines such as physics, economics and social sciences, natural sciences, and engineering. It parallels the combination of theory and applications in Professor Strang’s textbook Introduction to Linear Algebra. Course Format This course has been designed for independent study. It provides everything you will need to understand the concepts covered in the course. The materials include:
A complete set of Lecture Videos by Professor Gilbert Strang. Summary Notes for all videos along with suggested readings in Prof. Strang’s textbook Linear Algebra. Problem Solving Videos on every topic taught by an experienced MIT Recitation Instructor. Problem Sets to do on your own with Solutions to check your answers against when you’re done. A selection of Java® Demonstrations to illustrate key concepts. A full set of Exams with Solutions, including review material to help you prepare.
This record includes training materials associated with 'Network Know-how and Data Handling' …
This record includes training materials associated with 'Network Know-how and Data Handling' workshops offered by Australia's Academic Research Network (AARNet). The workshops are delivered to library and eResearch staff at universities, as well as researcher communities, as train-the-trainer events, part of a broader infrastructure literacy strategy.
This workshop is a ‘train-the-trainer’ session that covers topics such as jargon busting, network literacy and data movement solutions. The workshop will also provide a peek at some collaborative research tools such as Jupyter Notebooks and CloudStor. You will learn about networks, integrated tools, data and storage and where all these things fit in the researcher’s toolkit.
This workshop is targeted at staff who would like to be more confident in giving advice to researchers about the options available to them. It is especially tailored for those with little to no technical knowledge and includes a hands-on component, using basic programming commands, but requires no previous knowledge of programming.
Derek Mueller advocates for a methodology to visualize and understand disciplinarity through …
Derek Mueller advocates for a methodology to visualize and understand disciplinarity through what he calls network sense. Mueller’s methodology combines distant reading with thin description in a way that allows academics to avoid the obsessive depth of thick description. Distant reading and thin description complement networks of association in a way that affords inquiry and discovery for newcomers and seasoned scholars alike. Using word clouds, citation frequency graphs, and maps of scholarly activity as visual models, he presents ways we can visualize the field of rhetoric and composition/writing studies and its so-called turns, or widespread attention events, such as the global turn, visual turn, multimodal turn, and so on. This book is published by the WAC Clearinghouse/Colorado State University Open Press #writing book series and co-presented by the Digital Publishing Institute at WVU Libraries.
This unit covers the history and evolution of computer networks, including the …
This unit covers the history and evolution of computer networks, including the various types of network communications. Various forms of networking addressing are also covered, including network topologies, standards and protocols, logical model concepts, network hardware, and wireless communication.
This course will highlight common principles that permeate the functioning of networks …
This course will highlight common principles that permeate the functioning of networks and how the same issues related to robustness, fragility and interlinkages arise in several different types of networks. It will both introduce conceptual tools from dynamical systems, random graph models, optimization and game theory, and cover a wide variety of applications.
The course focuses on the problem of supervised learning within the framework …
The course focuses on the problem of supervised learning within the framework of Statistical Learning Theory. It starts with a review of classical statistical techniques, including Regularization Theory in RKHS for multivariate function approximation from sparse data. Next, VC theory is discussed in detail and used to justify classification and regression techniques such as Regularization Networks and Support Vector Machines. Selected topics such as boosting, feature selection and multiclass classification will complete the theory part of the course. During the course we will examine applications of several learning techniques in areas such as computer vision, computer graphics, database search and time-series analysis and prediction. We will briefly discuss implications of learning theories for how the brain may learn from experience, focusing on the neurobiology of object recognition. We plan to emphasize hands-on applications and exercises, paralleling the rapidly increasing practical uses of the techniques described in the subject.
This course in organizational economics prepares doctoral students for further study in …
This course in organizational economics prepares doctoral students for further study in the field. The course introduces the classic papers and some recent research. The material is organized into the following modules: boundaries of the firm, employment in organizations, decision-making in organizations, and structures and processes in organizations. Each class session covers a few leading papers. This course was joint-taught between faculty of the Massachusetts Institute of Technology and Harvard University. The Harvard course is Economics 2670 Organizational Economics.
Organizational Processes enhances students’ ability to take effective action in complex organizational …
Organizational Processes enhances students’ ability to take effective action in complex organizational settings by providing the analytic tools needed to analyze, manage, and lead the organizations of the future. Emphasis is placed on the importance of the organizational context in influencing which individual styles and skills are effective. The subject centers on three complementary perspectives, or “lenses”, on an organization: political, cultural, and strategic design. Students enrolled in this class are also jointly enrolled in 15.328, Team Project, in order to complete a field study of an organizational change initiative. Organizational Processes also operates in conjunction with 15.280, Communication for Managers, by sharing certain assignments and holding some joint classes.
The course purpose is to provide the substance and skill necessary to …
The course purpose is to provide the substance and skill necessary to make sound business decisions relating to information systems and to work with senior line managers in the resolution of issues and problems in this area. Categories of issues which will be addressed in the course include:
How do IT and its various manifestations in business, such as the Internet, affect current and future COMPETITIVENESS? How do we align business strategy and plans with IT strategy and IT plans? How can we ENGAGE executives in learning and leading IT-related change? How do we IMPLEMENT new systems, CHANGE work behavior, MANAGE projects? How should we ORGANIZE and GOVERN IT in an organization?
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.