How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this informative conference talk. Delve into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its implementation of a trusted tunnel for secure data transmission. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. This presentation, delivered in both English and Chinese, provides valuable knowledge for professionals interested in edge computing security and performance optimization.
Syllabus
How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adaptab... Wei Hu & Clement Richard
Taught by
Linux Foundation
Tags
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera