Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Algorithms and Data Structures
Information Technology
Computer Networking
Improving Communication Skills
Teaching Young Learners Online
Probability - The Science of Uncertainty and Data
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores Control-Flow Bending attacks on Control-Flow Integrity defenses, revealing vulnerabilities in fine-grained CFI implementations and demonstrating the necessity of shadow stacks for enhanced security against memory corruption.
Explore Named Data Networking's potential to replace TCP, its architectural advantages, and data-centric security approach in this insightful presentation by networking experts.
Explore Google's release engineering practices, including bazel usage, branching strategies, and automated systems. Learn about disciplines, philosophies, and techniques for improving release processes.
Explore efficient PostgreSQL backup solutions with PgBackRest, featuring checksums, compression, parallel transfer, and more. Learn about its design, features, and practical applications for large-scale databases.
RF-based indoor localization system that tracks multiple users' positions and gestures through walls, using wireless signal reflections off bodies. Can even locate static users by detecting breathing movements.
Explores BLE device privacy vulnerabilities and introduces BLE-Guardian, a system protecting user privacy by controlling device discovery and access without modifying existing devices or protocols.
Explores k-fingerprinting, a robust website fingerprinting technique using random decision forests, demonstrating high accuracy in identifying visited web pages through encrypted connections.
Explores model extraction attacks on machine learning systems, demonstrating vulnerabilities in publicly accessible ML interfaces and proposing potential countermeasures to protect confidential models.
Innovative approach to bypass face authentication using 3D models created from social media photos, exploiting virtual reality to simulate liveness and fool security systems.
Discover Facebook's innovative load balancing techniques for handling billions of users, improving performance, managing capacity, and enhancing reliability at a global scale.
Explore Facebook's MySQL automation systems for managing thousands of servers across data centers, including design, architecture, and real-world challenges faced at massive scale.
Explores BetrFS, an innovative file system using write-optimized indexes, showcasing improved performance for microdata operations and large sequential I/O compared to traditional file systems.
Explore SRE principles applicable to organizations of all sizes, from startups to tech giants. Learn key practices for system reliability, scalability, and efficient operations.
Network-based LUKS volume decryption using Tang: a solution for secure, automated server disk encryption at scale. Enables unattended boot in secure environments while protecting data at rest from unauthorized access.
Explore Windows Server 2016's DevOps-centric features, including NanoServer, DSC, OneGet, and containers. Learn how these innovations enable cloud-paced workflows and enhance security, deployment, and management.
Get personalized course recommendations, track subjects and courses with reminders, and more.