Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Psychology
Data Analysis
Digital Marketing
Introduction to Psychology
Nutrition, Exercise and Sports
Computing in Python I: Fundamentals and Procedural Programming
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore dedicated CPU support for VMs on Kubernetes, delving into resource allocation models, cgroups, and the challenges of implementing true CPU pinning in Kubevirt.
Explore strace basics and advanced techniques for troubleshooting userspace issues, with practical examples from Red Hat's support team.
Explore Podman Desktop's capabilities for seamless container development and Kubernetes migration, simplifying workflows from local environments to scalable deployments.
Explore patterns in Kubernetes/OpenShift alerting data to uncover relationships between software health metrics, applicable to various services and data science tasks.
Explore graph theory techniques to visualize and analyze open source ecosystems, uncovering emerging communities and their relationships to established projects.
Explore Java optimization for EU processors, focusing on Quarkus and TornadoVM in the AERO project for cloud-ready deployments on European Processor Initiative designs.
Explore current research on autonomous cybersecurity systems, including challenges, training environments, and future prospects. Gain insights into AI's role in cybersecurity.
Explore the Advance Recon Crew's innovative approach to project estimation using design sprint techniques. Learn how to accurately scope, staff, and deliver projects on time with improved feedback loops.
Explore PatternFly Elements 2.0, a versatile web component-based design system for consistent app experiences across tech stacks, including a preview of the Red Hat Design System.
Explore FIPS 140-3 impact on identity management, focusing on FreeIPA and Samba AD DC. Uncover hidden issues and challenges for Linux administrators in compliance implementation.
Explore guiding principles for effective Ansible automation, balancing simplicity and power. Learn to apply these concepts to real-world scenarios for reliable and consistent solutions.
Explore homomorphic encryption's role in data privacy, comparing open-source tools and examining its impact on secure data sharing and AI applications.
Explore containerized checkups to verify Kubernetes cluster functionality, focusing on KubeVirt VM connectivity and network latency measurement for advanced use-cases.
Explore secure device provisioning for Edge systems using FIDO Device Onboard and Ignition in Fedora IoT. Learn about latest capabilities, use cases, and upcoming features.
Explore NemoMobile's advancements and potential applications in smartphones and automotive displays.
Get personalized course recommendations, track subjects and courses with reminders, and more.