Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Innovative network architecture for disaggregated racks using fast circuit switches, offering high density and performance with lower power consumption. Addresses unique challenges in connecting dense clusters of compute, memory, and storage blades.
Explores lifecycle management complexity of datacenter topologies, comparing Clos and expander graphs. Introduces FatClique, a new topology combining wiring simplicity and expandability, with insights on deployment and expansion costs.
Explores Asynchronous Consensus Zones to scale blockchain systems linearly, introducing eventual atomicity and Chu-ko-nu mining for improved throughput and security without compromising decentralization.
Active probing system for accurate failure localization in data centers. Detects device and link failures, integrates domain knowledge with machine learning for high accuracy and resilience to data inconsistency.
Efficient regular expression matching for network security using graph decomposition and SIMD acceleration, improving performance of applications like Snort by 8.7x on real traffic.
Explore systemd's advanced features for flexible service management, combining traditional and container-like approaches for optimal system control and security.
Exploring SRE and DevOps implementation strategies for startups, comparing centralized and distributed team approaches, and discussing challenges and lessons learned.
Explore best practices for SRE training, including sequential learning, hands-on experiences, and continuous education. Learn from Google's insights on building effective SRE teams and fostering a culture of reliability.
Explore canarying best practices, pitfalls, and strategies for safe production changes. Learn to balance priorities, handle diverse scenarios, and implement effective canary processes in software deployment.
Humorous talk contrasting idealized SRE practices with real-world challenges. Speakers debunk perfect environments, offering practical insights and relatable experiences for SRE professionals.
Explore Netflix's multi-region strategy for improved availability and latency, including algebraic models, incident management, and design considerations for efficient failovers and user steering.
Explores novel exploitation techniques against Intel SGX, demonstrating vulnerabilities in enclave code without requiring kernel privileges or crashes, even with existing randomization approaches.
Unveils Facebook's exploitation of sensitive user data for advertising, quantifying its prevalence and discussing privacy implications under GDPR. Proposes a browser extension for user awareness.
Uncovers vulnerabilities in OpenPGP and S/MIME email encryption standards, demonstrating how malleability gadgets can be exploited to reveal encrypted content through exfiltration channels in various email clients.
Efficient framework for secure neural network inference combining homomorphic encryption and two-party computation, outperforming existing systems in speed while preserving privacy for cloud-based machine learning.
Get personalized course recommendations, track subjects and courses with reminders, and more.