Site icon Gradient Flow

Confidential Computing; DataOps and MLOps

Subscribe • Previous Issues

Get Ready For Confidential Computing

A comprehensive data privacy and security policy involves protecting the confidentiality and integrity of data in any of these three states: at rest, in use, and in transit. In a new post with Intel Capital’s Assaf Araki, we describe the ecosystem of tools focused on protecting data while in use. Our primary focus is on Confidential Computing tools for the development of data, analytic, and AI applications. We believe that companies that are able to use data securely will be well-positioned to build data and AI applications in the future.

Safeguarding data while it’s being used is particularly challenging because most applications need to have data in the clear – unencrypted or otherwise protected – in order to compute. The field of Confidential Computing encompasses tools and techniques such as hardware, cryptography, algorithms, and machine learning:

Read The Full Post
 

Data Exchange podcast


[Key Phrases found in Job Postings that contain “data engineer”.  Click HERE for fill size version.]

Free Recent Reports


If you enjoyed this newsletter please support our work by encouraging your friends and colleagues to subscribe:

Exit mobile version