Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the evolution of Runtime Security Engine (RSE) as a hardware root-of-trust, examining its role in Confidential Computing, Zero Trust architectures, and future directions for secure computing environments.
Discover how the Fujitsu Compiler Test Suite enhances Flang's quality through comprehensive testing, CI integration, and collaborative bug fixing, accelerating development of this Fortran compiler frontend.
Dive into the analysis of benchmark variations on AWS Graviton instances, exploring how shared infrastructure affects SPEC CPU 2017 test reproducibility and performance consistency.
Explore attestation in ARM's reference firmware, including trust establishment methods like TPM, DICE/DPE, and PSA/CCA, current limitations, and future developments.
Discover how UADK framework enables hardware-accelerated cryptographic operations within ARM confidential VMs, enhancing security and efficiency for sensitive workloads like AI training and big data analytics.
Explore the features and benefits of NFSv4.1 and NFSv4.2, understanding their critical role in cloud, HPC, and hybrid storage architectures.
Explore performance analysis in storage systems using Ceph SPDK NVMe-oF Gateway, including Arm support, hybrid deployment, and tuning techniques for modern storage networks.
Explore how GDB's remote target can be extended to support AArch64's SVE and SME variable-length registers, offering a cleaner approach than current local debugging methods.
Explore how FUJITSU MONAKA and Arm CCA enable secure AI processing through trusted execution environments, protecting sensitive data during execution with hardware-backed isolation, memory encryption, and attestation mechanisms.
Discover Arm's next-generation fully open source toolchains, their differences from LLVM, and plans for 2025. Learn about specialized toolchains for Embedded and AArch64 Linux development.
Discover the Linux kernel driver for Arm's new GICv5 architecture, exploring implementation details and functionality.
Explore the evolution of Arm64 Linux Kernel architecture, covering performance, compute, security extensions, CCA highlights, and future development areas in the kernel space.
Explore the current state and future of 32-bit Linux support across various hardware platforms, from servers to embedded systems, including challenges, timelines for phasing out, and the 2038 epochalypse.
Explore how the Apache Teaclave TrustZone SDK enhances Web3 security through secure key management, transaction signing, and device attestation for decentralized privacy-preserving infrastructures.
Discover how to optimize PCIe controller drivers in Linux Kernel for ARM platforms, focusing on eliminating unnecessary drivers or rewriting them efficiently using existing infrastructure like ECAM.
Get personalized course recommendations, track subjects and courses with reminders, and more.