YoVDO

The Confidential Computing Story: Early Development Across the Stack - Part II

Offered By: KVM Forum via YouTube

Tags

Confidential Computing Courses Virtualization Courses QEMU Courses KVM Courses Kata Containers Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the second session of the Confidential Computing Story, focusing on early development across the stack and the challenges of building on moving pieces. Dive into the adoption of the Confidential Compute stack, which is not yet fully upstreamed in the Linux Kernel, QEMU, or in the Kata and Confidential Containers projects. Learn how these projects aim to leverage Confidential Computing in the Cloud Native ecosystem and discover the collaborative efforts between Intel teams and distributions to streamline development for both creators and adopters. Gain insights into the process of constructing a viable upper stack for early adopters while working with evolving components. Understand why working with moving parts is a normal part of development and how collaboration ensures timely solutions once the foundation is established. This 31-minute KVM Forum talk, presented by Fabiano FidĂȘncio and Mikko Ylinen, offers valuable perspectives on navigating the complexities of emerging technologies in cloud computing and security.

Syllabus

The Confidential Computing Story part II: Early development across the stack: living in stilt house


Taught by

KVM Forum

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube