Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the impact of serverless architecture on operations, redefining roles and responsibilities. Learn to adapt, prove value, and navigate the changing landscape of cloud technology.
Discover Netflix's approach to handling incidents at high velocity, focusing on preparation, expertise, and continuous learning to ensure quick recovery and unique outage scenarios.
Explore Intuit's journey of running Kafka on Kubernetes in AWS, covering evaluation, testing, configuration, and integration with monitoring tools. Learn about challenges faced and solutions implemented.
Scaling Instagram's infrastructure across continents: challenges, solutions, and disaster recovery strategies for deploying stateful services and partitioning Cassandra databases between US and Europe.
Build real-time streaming data pipelines using Apache Kafka and KSQL. Learn architectural benefits, data integration, filtering, enrichment, and anomaly detection through practical demonstrations.
Explore Circonus platform's evolution, including architectural changes and lessons learned from failures in telemetry management and SLO implementation for system reliability.
Shopify's transition to Kubernetes: challenges, solutions, and benefits of moving from traditional infrastructure to cloud-native. Insights on custom tooling and automation for efficient container orchestration.
Explores the practical challenges of cloud agnosticism, discussing financial, technical, and operational complexities of multi-cloud deployments and migrations between providers.
Learn proactive capacity planning techniques to avoid reactive scaling, covering monitoring, future planning, enforcement, re-evaluation, and common pitfall avoidance for SREs and engineers.
Explore Shopify's approach to securing Kubernetes deployments through container signatures and admission controllers, ensuring a robust software supply chain.
Challenges traditional on-call practices in tech, analyzing their impact on workers and proposing alternatives for a future without on-call shifts. Explores industry history and calls for change.
Análisis de vulnerabilidades en la infraestructura de clave pública y demostración de ataques BGP para obtener certificados falsos, con propuestas de contramedidas para mejorar la seguridad.
Unveiling Foreshadow: A microarchitectural attack exploiting speculative execution to extract secrets from Intel SGX enclaves, compromising trusted execution environments and remote attestation.
Explore automatic vulnerability detection and exploit generation for Ethereum smart contracts using teEther, a tool that analyzes binary bytecode to identify and exploit security weaknesses.
Automated framework for analyzing privacy policies using deep learning, enabling scalable queries and applications like privacy icon assignment and question-answering systems.
Get personalized course recommendations, track subjects and courses with reminders, and more.