Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore running macOS on ARM using QEMU, delving into Virtualization.Framework, vmapple2, and GPU drivers for unrestricted virtual macOS machines.
Explore challenges and solutions for making QEMU's block layer thread-safe, enabling true parallel processing of multiple I/O queues for improved performance.
Explore Arm Confidential Compute Architecture's KVM support, enabling secure VM execution and preventing privileged software access. Learn implementation status and future plans.
Explore confidential virtual machines, secure VM service modules, and AMD SEV-SNP hardware for enhanced security in virtualization. Learn about COCONUT SVSM and its role in the KVM stack.
Explore virtual CPU hotplug challenges and solutions for architectures lacking physical CPU hotplug support. Gain insights into progress, requirements, and future developments in cloud virtualization.
Explore AMD SEV-TIO technology for enhanced security and improved I/O performance in confidential computing environments, focusing on secure device-guest bindings and lifecycle management.
Explore ARM Confidential Computing Architecture's impact on KVM, focusing on challenges posed by the Real Management Monitor as a firmware blob and potential improvements.
Explore Windows Credential Guard implementation in KVM, covering VSM concepts, security features, and integration challenges. Learn about Virtual Trust Levels and virtualization-based security.
Explore virtio-fs capabilities, configuration options, and future plans. Learn about file handles, caching modes, live migration, and kubevirt integration.
Explore a Zero-Trust vTPM for AMD SEV-SNP Confidential VMs, enabling secure measurements and attestation without relying on cloud service providers. Learn about its implementation and benefits for data protection.
Explore chains of trust in Confidential Computing, including attestation techniques for VMs, containers, and clusters. Learn about roots of trust, verification processes, and key technologies.
Explore automatic translation of C helper functions to optimized Tiny Code Generators for QEMU using LLVM. Learn about performance improvements and see an interactive demo of C to TCG mappings.
Explore Kata Containers' latest developments, including runtime-rs, confidential computing advancements, and upcoming release plans.
Explore vDPA device migration using Shadow Virtqueue. Learn about high-performance data processing offloading, unified interfaces, and simplified workload scaling across different device types.
Explore hybrid vCPU models for live CPU feature control in VMs, enabling seamless migration and feature utilization across diverse host environments without rebooting.
Get personalized course recommendations, track subjects and courses with reminders, and more.