Confidential Computing - New Capabilities for New Workloads
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the innovative realm of Confidential Computing in this 42-minute sponsored session presented by Mike Bursell from the Confidential Computing Consortium. Discover how hardware-based Trusted Execution Environments and remote attestation enable tracking provenance, combining CPU and GPU security features, and creating multi-party collaborative applications with limited trust requirements. Learn about Confidential Computing's applications in Gen AI, Web3, and multi-party computation. Gain insights into how this technology extends beyond making compute loads confidential, opening doors to new workload possibilities. Participate in this interactive session, where questions are encouraged throughout, to deepen your understanding of Confidential Computing's current capabilities and future potential.
Syllabus
Sponsored Session: Confidential Computing - New Capabilities for New Workloads - Mike Bursell
Taught by
Linux Foundation
Tags
Related Courses
Exploring Modern and Secure Operations of Kubernetes Clusters on the EdgeOpen Data Science via YouTube Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube