BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231119T043222Z
UID:1A823936-AF35-4F5C-B263-D4310AFB5291
DTSTART;TZID=America/New_York:20231117T180000
DTEND;TZID=America/New_York:20231117T200000
DESCRIPTION:Abstract: Confidential Computing (CC) has been getting more and
  more attention in recent years. The IT industry has figured out how to pr
 otect content in transit (TLS\, IPSec) and content at rest (disk encryptio
 n)\, it is developing CC technology to protect content in use\, i.e.\; dat
 a and code in RAM. This talk will first give an overview of the CC technol
 ogy\, its usages in a cloud setting\, and its providers\, then it will use
  Intel TDX as an example to show some technical details\, it ends with a d
 iscussion of CC&#39;s potential weakness and opportunities.\n\nCo-sponsored by
 : IEEE Student Branch at LIU-Brooklyn\, IEEE Student Branch at New York Ci
 ty College of Technology (CityTech)\n\nSpeaker(s): Dr. Pau-chen Cheng\, \n
 \nAgenda: \nEvent Agenda: 6:00 PM\n\nWelcome Remark (Dr. Ping-Tsai Chung)\
 n\n6:10 ~ 7:10 PM (Keynote Presentation - Dr. Pau-chen Cheng\, Confidentia
 l Computing)\, 7:10 ~7:30 PM (Q/A)\, This event is free to attend.\n\nALL 
 ARE WELCOME\n\nVirtual: https://events.vtools.ieee.org/m/379703
LOCATION:Virtual: https://events.vtools.ieee.org/m/379703
ORGANIZER:ptchung@ieee.org
SEQUENCE:24
SUMMARY:Introduction to Confidential Computing
URL;VALUE=URI:https://events.vtools.ieee.org/m/379703
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Confidential Co
 mputing (CC) has been getting more and more attention in recent years. The
  IT industry has figured out how to protect content in transit (TLS\, IPSe
 c) and content at rest (disk encryption)\, it is developing CC technology 
 to protect content in use\, i.e.\; data and code in RAM. This talk will fi
 rst give an overview of the CC technology\, its usages in a cloud setting\
 , and its providers\, then it will use Intel TDX as an example to show som
 e technical details\, it ends with a discussion of CC&#39;s potential weakness
  and opportunities.&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;&lt;stron
 g&gt;&lt;em&gt;Event Agenda: &lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;6:00 PM&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong
 &gt;Welcome Remark&lt;/strong&gt;&amp;nbsp\;(Dr. Ping-Tsai Chung)&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;6:10&amp;
 nbsp\; ~ 7:10 PM (Keynote Presentation - Dr. Pau-chen Cheng\, &lt;/strong&gt;Con
 fidential Computing&lt;strong&gt;)\,&amp;nbsp\; 7:10 ~7:30 PM (Q/A)\,&lt;em&gt; &amp;nbsp\;&lt;/e
 m&gt;&lt;/strong&gt;This event is free to attend.&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;ALL ARE WELCOME&lt;/
 strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&amp;nbsp\;&lt;/strong&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

