YoVDO

The Confidential Computing Story: Rivers, Dams and Kernel Development - Part I

Offered By: KVM Forum via YouTube

Tags

Confidential Computing Courses Virtualization Courses QEMU Courses KVM Courses Linux Kernel Development Courses Intel TDX Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the journey of confidential computing implementation in Linux and virtualization stacks through this insightful KVM Forum talk. Gain a deep understanding of the challenges and timelines involved in developing and integrating new hardware features into the kernel and QEMU. Learn how hardware vendors can streamline the development process by collaborating closely with upstream communities during in-house development. Discover the benefits of this approach in reducing conflicts arising from multiple vendors' concurrent efforts. Examine the collaborative work between Red Hat and Intel within the CentOS Stream Virtualization SIG, and understand how a stable base kernel facilitates confidential computing advancements at higher stack levels. Delve into the past, present, and future of confidential computing enablement, guided by the expertise of Paolo Bonzini, a Distinguished Engineer at Red Hat and maintainer of the KVM hypervisor.

Syllabus

The Confidential Computing Story part I: Rivers, dams and kernel development by Paolo Bonzini


Taught by

KVM Forum

Related Courses

Linux High Availability Clustering on RHEL 8 (2023)
Udemy
CentOS Enterprise Linux 7 Virtualization Management
Pluralsight
OpenStack Installation and Deployment
Udemy
Linux Foundation Cert Prep: Virtualization (Ubuntu)
LinkedIn Learning
Linux System Engineer: Network Bonding, IPv6, Routing, and Virtual Systems
LinkedIn Learning