Artwork

Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

NCF-336 Confidential Computing Explained

31:58
 
Share
 

Manage episode 387797690 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.

  continue reading

106 episodes

Artwork
iconShare
 
Manage episode 387797690 series 2362391
Content provided by Logic Central Online. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Logic Central Online or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.

  continue reading

106 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide