Introduction to confidential computing – protecting sensitive workloads by Fabien Petitcolas Published 2024-06-20 Download video MP4 360p Recommendations 53:31 AWS re:Invent 2023 - Protect sensitive data in use with AWS confidential computing (CMP307) 09:22 Tech Talk: What is Public Key Infrastructure (PKI)? 59:58 Trusted Execution Environments (TEEs) for Blockchain Applications with Ari Juels | a16z crypto 53:21 TDD & DDD from the Ground Up Live Coding by Chris Simon 52:15 Java 22 and Beyond: A Roadmap of Innovations by Ana-Maria Mihalceanu 47:24 AI Orchestration with Semantic Kernel by Soham Dasgupta 08:46 What is Confidential Computing? 58:12 MIT Introduction to Deep Learning | 6.S191 17:38 The moment we stopped understanding AI [AlexNet] 1:28:23 Quantum Computing for Computer Scientists 48:13 Three Principles To Bring Your Legacy Code Into the Future by Roland Weisleder 53:03 Java meets AI: Build LLM-Powered Apps with LangChain4j by Lize Raes 43:29 HTTPS, SSL, TLS & Certificate Authority Explained 10:09 Introduction to Confidential Computing 37:58 Durable Execution: The Next Leap for Microservices Architectures by Giselle van Dongen