The Five Big Problems with Confidential Containers
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the five major technical and commercial challenges facing confidential containers in this conference talk. Delve into attestation of workloads, performance issues, image download optimizations, access control considerations, and debuggability concerns. Learn about existing solutions, ongoing developments, and potential strategies to mitigate these challenges. Gain insights into how hypervisors and KVM are involved in addressing these problems, and understand the current state of confidential computing technologies like Intel's TDX and AMD's SEV.
Syllabus
Introduction
What is Confidential Computing
Confidential Containers overview
attestation
image download
Access control
Debugability
Conclusion
Questions
Taught by
Linux Foundation
Tags
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms Elastic Cloud Infrastructure: Containers and Services
Google Cloud via Coursera Architecting Distributed Cloud Applications
Microsoft via edX DevOps Practices and Principles
Microsoft via edX