У нас вы можете посмотреть бесплатно Beyond Borders: The future of digital sovereignty for technical teams или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
As data protection, localization, and sovereignty laws continue to expand across the globe, organizations are under increasing pressure to comply with jurisdiction-specific requirements without fragmenting their applications or operating models. With more than 100 countries enforcing data protection regulations—and dozens mandating strict data sovereignty—traditional approaches are creating costly silos and operational complexity. In this session, Andrea Ferraresi (Red Hat) and Sonal Rattan (eXate) present a joint solution designed to address these challenges through a sovereign hybrid architecture. By combining Red Hat’s multi-cloud infrastructure capabilities— including Red Hat OpenShift and Service Interconnect—with eXate’s data privacy and sovereignty platform, the solution enables applications to operate globally while ensuring sensitive data processing is automatically executed within the correct local jurisdiction. The speakers walk through the technical architecture behind the solution, including the use of a virtual application network to connect OpenShift clusters across regions and the concept of making Kubernetes “data-aware.” Rather than moving sensitive data, workloads are intelligently routed to where the data is legally allowed to be processed, enforcing sovereignty policies in real time. The session also highlights the role of confidential computing in protecting sensitive operations even while data is in use. Key topics include: The growing impact of global data sovereignty and localization laws Data residency vs. localization vs. true data sovereignty Operating globally while complying locally across any cloud provider Making Kubernetes data-aware with policy-driven workload routing Securing sensitive data processing with confidential computing Real-world sovereign hybrid architecture in action