The Confidential Computing Story: Rivers, Dams and Kernel Development - Part I
Offered By: KVM Forum via YouTube
Course Description
Overview
Explore the journey of confidential computing implementation in Linux and virtualization stacks through this insightful KVM Forum talk. Gain a deep understanding of the challenges and timelines involved in developing and integrating new hardware features into the kernel and QEMU. Learn how hardware vendors can streamline the development process by collaborating closely with upstream communities during in-house development. Discover the benefits of this approach in reducing conflicts arising from multiple vendors' concurrent efforts. Examine the collaborative work between Red Hat and Intel within the CentOS Stream Virtualization SIG, and understand how a stable base kernel facilitates confidential computing advancements at higher stack levels. Delve into the past, present, and future of confidential computing enablement, guided by the expertise of Paolo Bonzini, a Distinguished Engineer at Red Hat and maintainer of the KVM hypervisor.
Syllabus
The Confidential Computing Story part I: Rivers, dams and kernel development by Paolo Bonzini
Taught by
KVM Forum
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube