У нас вы можете посмотреть бесплатно What is Confidential Computing? Explained in 3 minutes. или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Nelly Cornejo, Head of Adoption at iExec, explains Confidential Computing. When protecting data, standard security measures typically protect data in only two states: at rest and in transit. Data at rest is when data is stored, and data in transit is when it moves through the network. The problem is data also needs to be protected while it's being used. Why? Because when a program or an application use data, they need to see it, this means the data is unencrypted in the memory. The problem is that since the data is exposed, malicious actors cant take advantage. Another challenge is that data moves to multiple environments from data centers to the cloud to the edge. This makes data breaches more common and security more challenging than ever. This is where Confidential Computing comes to play. Start building here: https://iex.ec/developers/