About This Training
Intellectual property, privacy, and safety require more than just protection of data in flight and at rest. Data—and the code that processes it—must be protected during execution. Developing, deploying, and executing applications while retaining confidentiality is a daunting task.
Join us and our partners at Microsoft Azure, Scalys, and Arm to learn how you can tackle this challenge end-to-end – from application development to deployment at scale, to execution in silicon – with the Enclave Device Blueprint. We will uncover an easy path to enable confidential computing in IoT devices with a modular approach. A demonstration of a production grade implementation with the Scalys TrustBox Edge 201 will show how we package and deliver an ML workload running in the NXP Layerscape TEE.