-
_**iExec Developer Rewards & Grants Program**_
**Project name:**
Chest X-ray Covid Classifier - using Blockchain and iExec Confidential Computing
**Topic:**
Application for analyzing chest X…
-
We want to add an option to the 832 flows code that lets us move data to ALCF and launch reconstructions via Globus Flows. We code that does this in another repo, but want to add this code to the prod…
-
### Use case
Constellation, working as the typical confidential cluster that could run on either cloud environment or local machine across platforms, need to fetch measurements/evidence against diffe…
-
So something I've been noodling on for a while is that we (and I include ASAPI in "we") are subtly coupling behavior and implementation/technology in some places. This is completely understandable giv…
-
https://github.com/mithril-security/Confidential_Computing_Explained/blob/main/docs/docs/build-your-kms/part_3_attested_tls.md
Thank you!
-
As per comment in https://github.com/microsoft/ebpf-for-windows/pull/3357#discussion_r1526150670, the eBPF NuGet repo should be in a Microsoft account, i.e. something like "`www.nuget.org/packages/Mic…
-
_1. Network user requests for confidential computing resource to the
network M/OC.
2. TAM in M/OC orchestrates confidential computing device to
undertake the request.
3. Network user transfers UA …
-
While attempting to clean-up references to `certifier.proto` [ in the wake of fixes for issue #116 ], attempted to run `make` in the named sub-dir. This fails as follows (tried on Nimbus-VM):
```
…
-
It has been suggested that a template for the projects to prepare their annual reviews would be helpful.
Perhaps a slide for each of the (currently) 4 points [in the progression policy](https://githu…
-
Confidential computing is a relatively new technology that allows one to keep workloads encrypted and isolated in memory during processing. If used correctly, confidential computing can shield workloa…