Confidential Containers Explained
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore confidential containers and cloud native confidential computing in this 38-minute panel discussion featuring experts from IBM and Apple. Learn about the Confidential Containers project, its impact on cloud native user experience, and how it leverages various hardware platforms and technologies to standardize confidential computing at the container level. Discover the benefits of this technology, its implications for Kubernetes protection, and deployment strategies for confidential workloads using familiar tools and workflows. Gain insights into new considerations and concepts introduced by confidential containers, and understand the future direction of this complex technology. The panel also addresses questions and discusses recent developments since the project's initial presentation.
Syllabus
Introduction
Project Definition
Confidential Computing
How Does It Protect Kubernetes
Deploy Confidential Containers
Why Do We Care
What Next
Questions
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube