YoVDO

Encrypted Virtual Machine Images for Confidential Computing

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Cloud Computing Courses Virtualization Courses Privacy Courses Data Protection Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of encrypted virtual machine images for confidential computing in this informative conference talk presented by James Bottomley from IBM and Brijesh Singh from AMD. Gain insights into the latest developments in secure virtualization technology and learn how encrypted VM images can enhance data protection and privacy in cloud computing environments. Discover the potential applications and benefits of this approach for sensitive workloads and confidential data processing.

Syllabus

Encrypted Virtual Machine Images for Confidential Computing - James Bottomley, IBM & Brijesh Singh


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube