How to Easily Deploy Confidential Computing
July 28, 2021
Steve Van Lare, Anjuna; Anand Kashyap, Fortanix; Michael Hoard, Intel
To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today.
This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Learn:
- What would it take to build-your-own Confidential Computing solution?
- Emergence of easily deployable, cost-effective Confidential Computing solutions
- Real world usage examples and key technical, business and investment insights
Extending Storage to the Edge - How It Should Affect Your Storage Strategy
August 25, 2021
Erin Farr, IBM; Vincent Hsu, IBM; Jim Fister, The Decision Place
Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy?
This webcast will focus on the following topics:
- Emerging patterns of data movement and the use cases that drive them
- Cloud Bursting
- Federated Learning across the Edge and Hybrid Cloud
- Considerations for distributed cloud storage architectures to match these emerging patterns
|