— Back when they worked at https://www.openshift.com/try?utm_content=inline-mention, https://www.linkedin.com/in/mikebursell and https://www.linkedin.com/in/npmccallum/ grappled with the challenges of confidential computing — isolating an organization’s most sensitive data in a secure enclave while processing it. https://thenewstack.io/confidential-computing-is-transforming-data-encryption-in-healthcare-finance/ is of particular use to organizations that deal in sensitive, high value data — such as financial institutions, but also a wide variety of organizations.

“And rather than having to rewrite all the applications and learn how to use confidential computing, it should be simple.”

If a single workload is deployed to three different architectures, with three different technologies running their confidential computing, McCallum asked, “how do I know that those are all the same?”

The ease of debugging in confidential computing will be showcased as part of the demo, Bursell said.

Related Articles