The Five Big Problems with Confidential Containers
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the five major technical and commercial challenges facing confidential containers in this conference talk. Delve into attestation of workloads, performance issues, image download optimizations, access control considerations, and debuggability concerns. Learn about existing solutions, ongoing developments, and potential strategies to mitigate these challenges. Gain insights into how hypervisors and KVM are involved in addressing these problems, and understand the current state of confidential computing technologies like Intel's TDX and AMD's SEV.
Syllabus
Introduction
What is Confidential Computing
Confidential Containers overview
attestation
image download
Access control
Debugability
Conclusion
Questions
Taught by
Linux Foundation
Tags
Related Courses
Linux High Availability Clustering on RHEL 8 (2023)Udemy CentOS Enterprise Linux 7 Virtualization Management
Pluralsight OpenStack Installation and Deployment
Udemy Linux Foundation Cert Prep: Virtualization (Ubuntu)
LinkedIn Learning Linux System Engineer: Network Bonding, IPv6, Routing, and Virtual Systems
LinkedIn Learning