This Policy is a legally binding agreement between you ("User", "you" or "your") and this Website operator ("Operator", "we", "us" or "our"). By accessing and using the Website and Services, you acknowledge that you have read, understood, and agree to be bound by the terms of this Agreement. This Policy does not apply to the practices of companies that we do not own or control, or to individuals that we do not employ or manage.
Our top priority is customer data security and, as such, we exercise the no logs policy. We may process only minimal user data, only as much as it is absolutely necessary to maintain the Website and Services.
Information collected automatically is used only to identify potential cases of abuse and establish statistical information regarding the usage and traffic of the Website and Services. This statistical information is not otherwise aggregated in such a way that would identify any particular user of the system.
You can access and use the Website and Services without telling us who you are or revealing any information by which someone could identify you as a specific, identifiable individual. If, however, you wish to use some of the features on the Website, you may be asked to provide certain Personal Information (for example, your name and e-mail address). We receive and store any information you knowingly provide to us when you fill any online forms on the Website. When required, this information may include contact information such as email address, address, etc.
Some of the information we collect is directly from you via the Website and Services. However, we may also collect Personal Information about you from other sources such as public databases and our joint marketing partners. You can choose not to provide us with your Personal Information, but then you may not be able to take advantage of some of the features on the Website. Users who are uncertain about what information is mandatory are welcome to contact us.
In order to make the Website and Services available to you, or to meet a legal obligation, we need to collect and use certain Personal Information. If you do not provide the information that we request, we may not be able to provide you with the requested products or services. Any of the information we collect from you may be used for the following purposes:
Respond to inquiries and offer support
Run and operate the Website and Services
Processing your Personal Information depends on how you interact with the Website and Services, where you are located in the world and if one of the following applies: (i) you have given your consent for one or more specific purposes; this, however, does not apply, whenever the processing of Personal Information is subject to California Consumer Privacy Act or European data protection law; (ii) provision of information is necessary for the performance of an agreement with you and/or for any pre-contractual obligations thereof; (iii) processing is necessary for compliance with a legal obligation to which you are subject; (iv) processing is related to a task that is carried out in the public interest or in the exercise of official authority vested in us; (v) processing is necessary for the purposes of the legitimate interests pursued by us or by a third party.
Note that under some legislations we may be allowed to process information until you object to such processing (by opting out), without having to rely on consent or any other of the following legal bases below. In any case, we will be happy to clarify the specific legal basis that applies to the processing, and in particular whether the provision of Personal Information is a statutory or contractual requirement, or a requirement necessary to enter into a contract.
Depending on the requested Services or as necessary to complete any transaction or provide any service you have requested, we may share your information with your consent with our trusted third parties that work with us, any other affiliates and subsidiaries we rely upon to assist in the operation of the Website and Services available to you. We do not share Personal Information with unaffiliated third parties. These service providers are not authorized to use or disclose your information except as necessary to perform services on our behalf or comply with legal requirements. We may share your Personal Information for these purposes only with third parties whose privacy policies are consistent with ours or who agree to abide by our policies with respect to Personal Information. These third parties are given Personal Information they need only in order to perform their designated functions, and we do not authorize them to use or disclose Personal Information for their own marketing or other purposes.
We will disclose any Personal Information we collect, use or receive if required or permitted by law, such as to comply with a subpoena, or similar legal process, and when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request.
We will retain and use your Personal Information for the period necessary to comply with our legal obligations, resolve disputes, and enforce our agreements unless a longer retention period is required or permitted by law. We may use any aggregated data derived from or incorporating your Personal Information after you update or delete it, but not in a manner that would identify you personally. Once the retention period expires, Personal Information shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after the expiration of the retention period.
Depending on your location, data transfers may involve transferring and storing your information in a country other than your own. You are entitled to learn about the legal basis of information transfers to a country outside the European Union or to any international organization governed by public international law or set up by two or more countries, such as the UN, and about the security measures taken by us to safeguard your information. If any such transfer takes place, you can find out more by checking the relevant sections of this Policy or inquire with us using the information provided in the contact section.
You may exercise certain rights regarding your information processed by us. In particular, you have the right to do the following: (i) you have the right to withdraw consent where you have previously given your consent to the processing of your information; (ii) you have the right to object to the processing of your information if the processing is carried out on a legal basis other than consent; (iii) you have the right to learn if information is being processed by us, obtain disclosure regarding certain aspects of the processing and obtain a copy of the information undergoing processing; (iv) you have the right to verify the accuracy of your information and ask for it to be updated or corrected; (v) you have the right, under certain circumstances, to restrict the processing of your information, in which case, we will not process your information for any purpose other than storing it; (vi) you have the right, under certain circumstances, to obtain the erasure of your Personal Information from us;
(vii) you have the right to receive your information in a structured, commonly used and machine readable format and, if technically feasible, to have it transmitted to another controller without any hindrance. This provision is applicable provided that your information is processed by automated means and that the processing is based on your consent, on a contract which you are part of or on pre-contractual obligations thereof.
Where Personal Information is processed for the public interest, in the exercise of an official authority vested in us or for the purposes of the legitimate interests pursued by us, you may object to such processing by providing a ground related to your particular situation to justify the objection.
If you are a resident of the European Economic Area (EEA), you have certain data protection rights and the Operator aims to take reasonable steps to allow you to correct, amend, delete, or limit the use of your Personal Information. If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us. In certain circumstances, you have the following data protection rights:
You have the right to request access to your Personal Information that we store and have the ability to access your Personal Information.
You have the right to request that we correct any Personal Information you believe is inaccurate. You also have the right to request us to complete the Personal Information you believe is incomplete.
You have the right to request the erase your Personal Information under certain conditions of this Policy. You have the right to object to our processing of your Personal Information.
You have the right to seek restrictions on the processing of your Personal Information. When you restrict the processing of your Personal Information, we may store it but will not process it further.
You have the right to be provided with a copy of the information we have on you in a structured, machine- readable and commonly used format.
You also have the right to withdraw your consent at any time where the Operator relied on your consent to process your Personal Information.
You have the right to complain to a Data Protection Authority about our collection and use of your Personal Information. For more information, please contact your local data protection authority in the European Economic Area (EEA).
In addition to the rights as explained in this Policy, California residents who provide Personal Information (as defined in the statute) to obtain products or services for personal, family, or household use are entitled to request and obtain from us, once a calendar year, information about the Personal Information we shared, if any, with other businesses for marketing uses. If applicable, this information would include the categories of Personal Information and the names and addresses of those businesses with which we shared such personal information for the immediately prior calendar year (e.g., requests made in the current year will receive information about the prior year). To obtain this information please contact us.
Any requests to exercise your rights can be directed to the Operator through the contact details provided in this document. Please note that we may ask you to verify your identity before responding to such requests. Your request must provide sufficient information that allows us to verify that you are the person you are claiming to be or that you are the authorized representative of such person. You must include sufficient details to allow us to properly understand the request and respond to it. We cannot respond to your request or provide you with Personal Information unless we first verify your identity or authority to make such a request and confirm that the Personal Information relates to you.
We do not knowingly collect any Personal Information from children under the age of 18. If you are under the age of 18, please do not submit any Personal Information through the Website and Services. We encourage parents and legal guardians to monitor their children's Internet usage and to help enforce this Policy by instructing their children never to provide Personal Information through the Website and Services without their permission. If you have reason to believe that a child under the age of 18 has provided Personal Information to us through the Website and Services, please contact us. You must also be at least 16 years of age to consent to the processing of your Personal Information in your country (in some countries we may allow your parent or guardian to do so on your behalf).
The Website and Services use "cookies" to help personalize your online experience. A cookie is a text file that is placed on your hard disk by a web page server. Cookies cannot be used to run programs or deliver viruses
to your computer. Cookies are uniquely assigned to you, and can only be read by a web server in the domain that issued the cookie to you.
Some browsers incorporate a Do Not Track feature that signals to websites you visit that you do not want to have your online activity tracked. Tracking is not the same as using or collecting information in connection with a website. For these purposes, tracking refers to collecting personally identifiable information from consumers who use or visit a website or online service as they move across different websites over time. The Website and Services do not track its visitors over time and across third party websites. However, some third party sites may keep track of your browsing activities when they serve you content, which enables them to tailor what they present to you.
We offer electronic newsletters to which you may voluntarily subscribe at any time. We are committed to keeping your e-mail address confidential and will not disclose your email address to any third parties except as allowed in the information use and processing section. We will maintain the information sent via e-mail in accordance with applicable laws and regulations.
In compliance with the CAN-SPAM Act, all e-mails sent from us will clearly state who the e-mail is from and provide clear information on how to contact the sender. You may choose to stop receiving our newsletter or marketing emails by following the unsubscribe instructions included in these emails or by contacting us.
The Website and Services contain links to other resources that are not owned or controlled by us. Please be aware that we are not responsible for the privacy practices of such other resources or third parties. We encourage you to be aware when you leave the Website and Services and to read the privacy statements of each and every resource that may collect Personal Information.
We secure information you provide on computer servers in a controlled, secure environment, protected from unauthorized access, use, or disclosure. We maintain reasonable administrative, technical, and physical safeguards in an effort to protect against unauthorized access, use, modification, and disclosure of Personal Information in its control and custody. However, no data transmission over the Internet or wireless network can be guaranteed. Therefore, while we strive to protect your Personal Information, you acknowledge that (i) there are security and privacy limitations of the Internet which are beyond our control; (ii) the security, integrity, and privacy of any and all information and data exchanged between you and the Website and Services cannot be
guaranteed; and (iii) any such information and data may be viewed or tampered with in transit by a third party, despite best efforts.
In the event we become aware that the security of the Website and Services has been compromised or users Personal Information has been disclosed to unrelated third parties as a result of external activity, including, but not limited to, security attacks or fraud, we reserve the right to take reasonably appropriate measures, including, but not limited to, investigation and reporting, as well as notification to and cooperation with law enforcement authorities. In the event of a data breach, we will make reasonable efforts to notify affected individuals if we believe that there is a reasonable risk of harm to the user as a result of the breach or if notice is otherwise required by law. When we do, we will post a notice on the Website, send you an email.
We reserve the right to modify this Policy or its terms relating to the Website and Services from time to time in our discretion and will notify you of any material changes to the way in which we treat Personal Information.
When we do, we will revise the updated date at the bottom of this page. We may also provide notice to you in other ways in our discretion, such as through contact information you have provided. Any updated version of this Policy will be effective immediately upon the posting of the revised Policy unless otherwise specified. Your continued use of the Website and Services after the effective date of the revised Policy (or such other act specified at that time) will constitute your consent to those changes. However, we will not, without your consent, use your Personal Information in a manner materially different than what was stated at the time your Personal Information was collected. Policy was created with WebsitePolicies.
You acknowledge that you have read this Policy and agree to all its terms and conditions. By accessing and using the Website and Services you agree to be bound by this Policy. If you do not agree to abide by the terms of this Policy, you are not authorized to access or use the Website and Services.
If you would like to contact us to understand more about this Policy or wish to contact us concerning any matter relating to individual rights and your Personal Information, you may send an email to firstname.lastname@example.org
This document was last updated on October 28, 2020
Increased knowledge of condition monitoring and predictive maintenance can help companies and organizations increase their efficiency, reduce costs, improve reliability and sustainability, and increase their competitiveness in the market. It is an important part of modern technical and industrial activities. Target groupThe course is aimed at professionals who work in various ways with condition monitoring and predictive maintenance, such as maintenance engineers, maintenance technicians, maintenance managers and production managers or similar. ContentThe course consists of four parts. In the first part, we focus on the central concepts within maintenance strategies such as condition monitoring and predictive maintenance. How can these strategies contribute to the company's sustainability work and how to establish programs for condition monitoring and predictive maintenance. The second part focuses on building the theoretical base around condition monitoring. Various techniques in condition monitoring will be investigated. It will be practiced theoretically on the identification of problems and deviations in condition monitoring signals. In the third part of the course, practical work takes place. Different techniques will be used to detect and diagnose different problems. We will work on how to choose the appropriate specifications and requirements for sensors and data acquisition systems. The course ends with the fourth part where the project work that involves establishing a condition monitoring system in a maintenance organization is reported and discussed. The course includes the following elements: Maintenance strategies such as condition monitoring, condition-based maintenance and predictive maintenance. Different techniques for condition monitoring. How condition monitoring can affect the company's sustainability work and profitability. How to identify faults and damage by analyzing condition monitoring signals. Specifications of sensors and data acquisition systems. How to establish a condition-based/condition monitoring system. Practical informationThe course consists of lectures, exercises and seminars, these will be offered either online or onsite (see the schedule for more information). Assessment of the students' performance takes place through written assignments and participation in mandatory seminars. All the parts must be approved to be pass the course. The course is given in English. Entry requirementsBasic qualification at advanced level in mechanical engineering or equivalent. Applicants who do not meet this requirement can, by showing corresponding prior knowledge through work experience, be validated as qualified. Two years of relevant work experience then corresponds to one year of college or university studies at basic level.
Applied robotics deals with industrial robots and their use in industry. Different kinds of robots are simulated and presented in the course, namely, mobile robots, logistic robots, collaborative robots and additive manufacturing robots. The course covers the structure and properties of robots, as well as principles for use in industry based on different principles. The course introduces Industry 5.0, which is a human-centered vision of industry that complements the existing Industry 4.0 approach.Based on the requirements placed on a robot system, these can be configured based on different technical starting points, how they should be used and methods to create efficiency. Commonly occurring equipment is taken up as adaptations to different work processes and applications. This is where grippers and sensors come in, as well as process equipment of various kinds. The course covers factors for investment, as well as labs on how programming can be handled. Target group This course is for professionals who work with production systems, automation and robotization at various levels as responsible for individual production lines, departments, or role as production manager or production development. The course will mainly focus on the manufacturing industry in application examples, but the principles covered will be applicable to a number of industries including consulting companies working towards the manufacturing industry. Content The course includes the following: Structure and characteristics of industrial robots in automationGuide and factors when investing in robot systemsLabs in programming with industrial robotsDevelopment trends – a global perspectivePractical information The majority of the parts of the course will take place on Campus (Växjö), and remotely. During the course, participants will be asked to contribute an automation-based study case from the companies where they are active. Study cases are reported during the course. These, together with performed laboratories, constitute the examination of the course. We will as far as possible be flexible with times for the various course elements. Teaching language: Swedish. Literature and certain elements may be in English. The course is free of charge and gives 3 higher education credits, which normally includes approx. 80 hours of work. Course material will be distributed in connection with the course. Entry requirements Basic qualification at advanced level in mechanical engineering or equivalent. Candidates with relevant work experience are also welcome to apply. Two years of relevant work experience is considered equivalent to one year of university studies at bachelor's level. We can validate your competence if necessary. Registration: Registration can be done continuously until the start of the course.
The course covers a comprehensive range of topics aimed at securing operating systems against various threats. It begins with an exploration of different hardening approaches, identification of default configuration weaknesses, and the implementation of the Zero-Trust model for network security. Participants learn to manage trusted sources for Linux installations and third-party software, as well as the significance of drivers and libraries signing. The course addresses OS patching and updating processes for Windows and Linux, cryptography for encrypting storage in both environments, and certificates management for secure communication. Participants also gain knowledge and skills in access and authentication methods, including the Least Privilege Principle, Role-Based Access Control (RBAC), and privilege access management tools.
Secure Software Architecture is a comprehensive course, focusing on practical implementation of security principles like essential principles such as zero trust, separation of duties, defense-in-depth, least privileges, etc. in modern on-premise and cloud infrastructures. Students will gain expertise in designing software systems that are not only functional but also resilient against cyber threats. Learn from industry experts, engage practical assignment, and master the art of adaptive security design. By course end, students will be equipped to create software architectures that stand strong in the face of modern challenges.
Many companies are focusing on the development of products and services with a higher sustainability performance. To include sustainability in the product development process, companies use different tools and approaches to support this implementation. With this course students will learn about how to use some of these tools to perform environmental and social assessments with industry cases and propose some solutions. Additionally, the students will reflect on what is needed, and how companies might implement sustainability in the product development process.
Do you want to become an expert in sustainability and learn how to help organisations become more sustainable? Then this course is a big step towards achieving that. Through the course, you will learn a proven methodology for strategic sustainable development and have the opportunity to apply it to a real organisation. Workshops, seminars, and tutoring will allow you to learn from the experiences of other participants and expand your knowledge further. The methodology is based on scientifically established principles for sustainability that are universal and can be applied by all stakeholders who want to collaborate for a sustainable future. However, what is truly special about the methodology is that it can be adapted to each organisation's unique purpose, goals, and conditions. After completing the course, you will have the knowledge and confidence to guide organisations on a sustainable development path.
There is an increasing concern from users regarding the use and leakage of their personal data. Moreover, compliance with privacy regulations is required by the government and privacy should be incorporated by design and by default when developing software-intensive products and services. Hence, privacy has become a top challenge in software development and good privacy measures can improve data security and promote quality.
This course covers areas of legal and ethical implications of ethical hacking. It also introduces detection and exploitation of vulnerabilities in IT infrastructure, including different reconnaissance techniques. The course provides in-depth understanding of the penetration testing phases, various attack vectors, and preventative countermeasures. The course encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in information systems, perform the attacks, check the strength of existing security controls, etc.
The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Credits and time table: 3 ECTS distributed over 10 weeks Scehduled online seminars: December 4th 2023, January 12th 2024 and February 9th 2024 Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!
Your abilities in development work gain more and more importance in professional life. This course gives you the opportunity to develop knowledge and skills in product, production and business development as well as the relationship between these. You are introduced to systematic working methods for product, production and business development with a focus on innovation and creativity in practical contexts. The overall aim of the course is an in-depth understanding of the application of various processes for development work of various kinds. The goal is that the students increase their ability to understand and apply development processes and increase their insight into how the processes relate to organizations’ innovation and business strategies to obtain circular flows, resilience and sustainability in the manufacturing industry. The teaching consists of self-study of course literature, films and other material via an internet-based course platform, scheduled webinars and written reflections. No physical gatherings. Scehduled online seminars: December 4th 2023, January 8th 2024, January 22nd 2024 and February 5th 2024 The number of participants in the course is limited, so please hurry with your application!
Virtual commissioning (VC) is a technique used in the field of automation and control engineering to simulate and test a system's control software and hardware in a virtual environment before it is physically implemented. The aim is to identify and correct any issues or errors in the system before deployment, reducing the risk of downtime, safety hazards, and costly rework. The virtual commissioning process typically involves creating a digital twin of the system being developed, which is a virtual representation of the system that mirrors its physical behaviour. The digital twin includes all the necessary models of the system's components, such as sensors, actuators, controllers, and interfaces, as well as the control software that will be running on the real system. Once the digital twin is created, it can be tested and optimized in a virtual environment to ensure that it behaves correctly under various conditions. The benefits of using VC include reduced project costs, shortened development time, improved system quality and reliability, and increased safety for both operators and equipment. By detecting and resolving potential issues in the virtual environment, engineers can avoid costly and time-consuming physical testing and debugging, which can significantly reduce project costs and time to market. Following are suggested modules in the virtual commissioning course, each with its own specific role in the process. These modules work together to create a comprehensive virtual commissioning process, allowing engineers to test and validate control systems and production processes in a simulated environment before implementing them in the real world. Modeling and simulation: This module involves creating a virtual model of the system using simulation software. The model includes all the equipment, control systems, and processes involved in the production process. Control system integration: This module involves integrating the digital twin with the control system, allowing engineers to test and validate the system's performance. Virtual sensors and actuators: This module involves creating virtual sensors and actuators that mimic the behavior of the physical equipment. This allows engineers to test the control system's response to different scenarios and optimize its performance. Scenario testing: This module involves simulating different scenarios, such as equipment failures, power outages, or changes in production requirements, to test the system's response. Data analysis and optimization: This module involves analyzing data from the virtual commissioning process to identify any issues or inefficiencies in the system. Engineers can then optimize the system's performance and ensure that it is safe and reliable. Pre-requisite 75 university credits in production technology, mechanical engineering, product and process development, computer technology and/or computer science or equivalent or 40 credits in technology and at least 2 years of full-time professional experience from a relevant area within industry. In addition, English A/English 6 are required. Expected outcomes Describe the use of digital twins for virtual commissioning process. Develop a simulation model of a production system using a systems perspective and make a plan for data collection and analysis. Plan different scenarios for the improvement of a production process. Analyze data from the virtual commissioning process to identify any issues or inefficiencies in the system and then optimize the system's performance. Needs in the industry Example battery production: Battery behaviors are changing over time. To innovate at speed and scale, testing and improving real-world battery phenomena throughout its lifecycle is necessary. Virtual commissioning / modeling-based approaches like digital twin can provide us with accurate real-life battery behaviors and properties, improving energy density, charging speed, lifetime performance and battery safety. Faster innovation (NPI) Lower physical prototypes Shorter manufacturing cycle time Rapid testing of new battery chemistry and materials to reduce physical experiments Thermal performance and safety It’s not just about modelling and simulating the product, but also validating processes from start to finish in a single environment for digital continuity. Suggested target groups Industry personnel Early career engineers involved in commissioning and simulation projects Design engineers (to simulate their designs at an early stage in a virtual environment to reduce errors) New product introduction engineers Data engineers Production engineers Process engineers (mediators between design and commissioning) Simulation engineers Controls engineer System Integration Students Master's/PhD degree students who are involved in energy, digitalization, controls and production fields. Scehduled online seminars: None The number of participants in the course is limited, so please hurry with your application!
Vill du ta din organisation till nästa nivå och skapa mer värde för dina kunder? Vill du fördjupa dina kunskaper om tjänstefiering, tjänsteekosystem och cirkulär omställning? Då är detta en kurs för dig! Denna kurs kan även vara intressant för dig som tidigare läst vår kurs Introduktion till tjänstefiering. FÖR VEM?Detta är en vidareutveckling av kursen "Introduktion till tjänstefiering" och vänder sig till dig som är yrkesverksam, främst inom tillverkande företag men även inom tjänsteföretag eller offentlig sektor, och som är intresserade av tjänstefiering och arbetar med tjänste- och verksamhetsutveckling. INNEHÅLLGenom den här kursen får du fördjupa dig inom tjänstefiering samt diskutera och dela erfarenheter med forskare och kursdeltagare. Du kommer att lära dig om tjänsteekosystem, värdeskapande och hållbarhet med särskilt fokus på företag inom tillverkningsindustrin, men modeller och teorier som presenteras under kursens gång är även är applicerbara för andra organisationer. Du får tillgång till konkreta modeller, teorier och verktyg som kan underlätta företags eller organisations förändringsprocess mot tjänstefiering. Efter genomgången kurs kommer du att ha utvecklat en plan för hur den egna organisationen praktiskt kan genomföra den förändringsprocess som tjänstefiering innebär. DU LÄR DIG ATT:Förklara, analysera och kritiskt reflektera kring hur företag kan skapa värde för sina kunder, sig själva och andra aktörer i tjänsteekosystemet genom ett utökat tjänsteerbjudandeUtifrån teorier kring cirkulär ekonomi och cirkulära strategier visa hur tjänster kan användas som möjliggörare för den cirkulära omställningenDiskutera begrepp, modeller, teorier och metoder inom tjänstefiering med stöd i relevant teoribildning planera, bedöma och kritiskt reflektera kring hur tjänstefiering kan gå till i praktiken. TJÄNSTEFIERING ÄR VIKTIGT INOM OLIKA VERKSAMHETER OCH SKAPAR FÖRUTSÄTTNINGAR FÖR: Ökad konkurrenskraft: Tjänstefiering innebär att ett företag fokuserar på att erbjuda tjänster istället för enbart produkter. Detta kan öka företagets konkurrenskraft genom att det kan differentiera sig från sina konkurrenter och erbjuda en mer komplett lösning till kunderna.Förbättrad kundupplevelse: Genom att fokusera på tjänster kan ett företag skapa en bättre kundupplevelse genom att erbjuda tjänster som stödjer och förbättrar användningen av produkterna. Detta kan leda till mer lojala kunder och ökad kundnöjdhet.Ökad lönsamhet: Genom att erbjuda tjänster kan ett företag öka sina intäkter och lönsamhet. Tjänster kan ofta säljas till högre priser än produkter och kan också bidra till att bygga relationer med kunderna och generera uppsäljning och förlängning av avtal.Anpassning till förändrade marknadstrender: Marknaden förändras ständigt och företag som kan anpassa sig till dessa förändringar har större chanser att överleva och växa. Tjänstefiering kan hjälpa företag att anpassa sig till nya marknadstrender och behov hos kunderna. GENOMFÖRANDE Kursen förutsätter självständigt arbete, kontinuerlig textinläsning samt aktivt och reflekterande deltagande på seminarier. En central del i kursen är att deltagarna reflekterar kring tillämpning av begrepp, teorier, modeller och metoder på sina egna organisationer samt delar erfarenheter med varandra. Diskussionerna utgår från deltagarnas frågor och utmaningar i sitt arbete, och därför skapas kursens innehåll till viss del av deltagarna själva. Undervisningen sker på svenska och engelska och genomförs på distans via Canvas som är Karlstads universitets lärplattform. Kursen är på avancerad nivå och ger 5 högskolepoäng. Kursens mål examineras genom skriftliga och muntliga uppgifter som diskuteras och presenteras på obligatoriska seminarier. ZOOMTRÄFFAR 26 oktober kl. 13-14.7 november, kl. 13-15 - Kursintroduktion14 november kl. 13-15 - Diskussionsseminarium modul 128 november kl. 13-16 - Presentationsseminarium modul 15 december kl. 13-15 - Introduktion modul 212 december kl. 13-15 - Diskussionsseminarium modul 219 december kl. 13-16 - Presentationsseminarium modul 29 januari kl. 13-15 - Introduktion modul 316 januarikl. 13-15 - Diskussionsseminarium modul 323 januari kl. 13-16 - Presentationsseminarium modul 3 FÖRELÄSAREMaria Åkesson, lektor och forskare i företagsekonomi vid Centrum för tjänsteforskning (CTF) och Handelshögskolan vid Karlstads universitet. Nina Löfberg, lektor och forskare i företagsekonomi vid Centrum för tjänsteforskning (CTF) och Handelshögskolan vid Karlstads universitet. Klas Hedvall, forskare vid Centrum för tjänsteforskning (CTF) och projektledare på Chalmers Industriteknik. BEHÖRIGHETSKRAV90 hp varav lägst 30 hp på G2F-nivå eller högre inom samhälls-, beteende- eller naturvetenskap samt minst 2 års arbetslivserfarenhet inom för kursen relevant yrkesverksamhet. Gymnasiets engelska 6. Motsvarandebedömning kan göras.
Do you want to deepen your knowledge in Industrial Internet of Things? In this course, you will gain deeper knowledge and understanding of the Industrial Internet of Things (IIoT), platforms and cloud services used in manufacturing industries. You will learn to understand the use of IoT platforms and how to design and implement simple systems and how to create value by using IoT solutions within industrial systems. The course will provide you with practical and theoretical knowledge in IIoT, platforms and cloud services as well as in-depth knowledge in production, logistics and product development.
In this course, you will learn how data analysis in virtual production can improve your organization's results! Data analytics in virtual production uses advanced techniques to collect, analyze and present data to improve production. This system is designed to help companies optimize their production and increase efficiency. By learning how to model, do scenario analysis and evaluate using industrial software, identify bottlenecks, and use AI methods and applications, s necessary to succeed with a full production analysis.
The use of hydrogen is increasing sharply in the world. If you want to know the basics about hydrogen then this is the course for you. What will you learn?You get answers to questions such as: Why is hydrogen interesting? How is hydrogen produced? How is hydrogen distributed and stored? How can hydrogen be handled safely? How is hydrogen used to change to a sustainable and environmentally friendly society? Who is the course for?The course is for anyone who is curious to know a little more about hydrogen. Advanced knowledge of chemistry and physics is enough to keep up. Who are the teachers?Assistant Professor Erik Elfgren, Professor Rikard Gebart, Dr Fredrik Granberg, Dr Cecilia Wallmark, Professor Andrea Toffolo, Professor Xiaoyan Ji, Professor Kentaro Umeki, Luleå Univerity of Technology and Professor Thomas Wågberg, Umeå University.
I den här kursen har vi valt att fokusera på innovation som process; hur gör man för att ta en idé till verklighet så att den kan skapa nytta? Vi sätter dig själv i centrum, med dina egna idéer. Utifrån det försöker vi använda dina nyvunna kunskaper och erfarenheter för att förstå hur du som rådgivare kan stödja och stimulera innovationsutveckling inom de gröna näringarna. Kursen består av sex webbmoduler samt en workshop där du får möjlighet att diskutera och pröva tillsammans med andra rådgivare. I kursen igår även individuell coachning; vi diskuterar dina nyvunna kunskaper och relaterar dem till de erfarenheter du får när du börjar arbeta praktiskt med att stimulera och stödja verkliga innovationsprocesser i din vardag. Detta är en uppdragsutbildning. Om du är intresserad av att gå kursen eller har andra frågor så är du välkommen att ta en kontakt via kurssidan på webben.
SLU arrangerar en kurs i lean med fokus på lantbruks-, landsbygds- och trädgårdsföretag. Kursen vänder sig till rådgivare och personal vid branschorganisationer som står inför att starta en leanresa i sin verksamhet, men även lantbruks-, landsbygds- eller trädgårdsföretag som är aktiebolag, och dess medarbetare, kan gå kursen.För mer information se kursens webbsida.Detta är en uppdragsutbildning. Om du är intresserad av att gå kursen eller har frågor så kontakta oss via kursens webbsida.
Hur får du med dig en grupp i en förändringsprocess? Hur får du människor att engagera sig, och vad gör du vid intressekonflikter? Hur hanterar du komplexa frågor för att öppna för möjligheter istället för att fastna i svårigheter? Processledning handlar om att skapa lärande och handlingskraft, att ta vara på gruppers potential och ge vidgade perspektiv och nya idéer.Detta är en uppdragsutbildning. Om du vill gå kursen eller har frågor så kontakta oss via kursens webbsida.
Vad är coacning, egentligen? Hur fungerar det? Och – fungerar det? Kursen ger dig de bärande tankarna och människosynen som hör ihop med ett coachande förhållningssätt och vill inspirera dig att utvecklas vidare tillsammans med dina kunder; hjälpa dig att se nya möjligheter och nya sätt att möta och förstå människor.Detta är en uppdragsutbildning. Om du är intresserad av att gå kursern eller har frågor så kontakta oss via kursens webbsida.
Denna kurs i kommunikation handlar om grundläggande principer och modeller för hur vi kommunicerar och agerar i olika situationer. Kursen fokuserar främst på Rådgivning och beteendeförändringar, Socialpsykologi och gruppdynamik, Processledning samt Rådgivningsverktyg och metoder. Fysiska träffar varvas med webbföreläsningar, övningar och reflekterande moment. Detta är en uppdragsutbildning. Om du är intresserad av att gå kursen eller har frågor så kontakta oss via kursens webbsida.