{"id":2764,"date":"2023-08-21T13:49:48","date_gmt":"2023-08-21T11:49:48","guid":{"rendered":"https:\/\/alasca.cloud\/?p=2764"},"modified":"2023-08-21T13:53:15","modified_gmt":"2023-08-21T11:53:15","slug":"alasca-tech-talk-8","status":"publish","type":"post","link":"https:\/\/alasca.cloud\/en\/alasca-tech-talk-8\/","title":{"rendered":"ALASCA Tech Talk #8"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2764\" class=\"elementor elementor-2764\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-efb9cd3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"efb9cd3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63505e43\" data-id=\"63505e43\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e075f07 elementor-widget elementor-widget-text-editor\" data-id=\"5e075f07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die <a href=\"https:\/\/alasca.cloud\/alasca-tech-talks\/\"><span style=\"color: #51e064;\">ALASCA Tech-Talks<\/span><\/a> bieten eine Plattform, um Projekte zu diskutieren, die das Potenzial haben, die digitale Souver\u00e4nit\u00e4t digitaler Infrastrukturen und von Cloud-Diensten zu verbessern, sowie f\u00fcr Anwendungsf\u00e4lle, die auf diese digital-souver\u00e4nen Infrastrukturen und Dienste angewiesen sind.<\/p><p>Tech-Talk verpasst? Kein Problem, du findest alle Aufzeichnungen auf unserem <a href=\"https:\/\/www.youtube.com\/@alasca_e.V.\" target=\"_blank\" rel=\"noopener\">ALASCA-Youtube-Kanal<\/a>.<\/p><h5>Was erwartet dich im kommenden Tech-Talk?<\/h5><p>Freut euch in unserem nunmehr 8. ALASCA Tech-Talk auf den folgenden Speaker: <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44755c3 elementor-widget elementor-widget-image\" data-id=\"44755c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"418\" src=\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-1024x535.jpg\" class=\"attachment-large size-large wp-image-2749\" alt=\"ALASCA Tech-Talk #8 | Christoph Fetzer (Scontain) on &quot;Using Confidential Computing for Protecting Data, Code, and Secrets of Applications&quot;\" srcset=\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-1024x535.jpg 1024w, https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-300x157.jpg 300w, https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-768x401.jpg 768w, https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-1536x803.jpg 1536w, https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-2048x1070.jpg 2048w, https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8-18x9.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-433e19f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"433e19f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bdf4d7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"9bdf4d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><h4>\u201eUsing Confidential Computing for Protecting Data, Code, and Secrets of Applications\u201c<\/h4><p>Christof Fetzer (Co-Founder of Scontain)<\/p><p>Confidential computing protects the data, code, and key materials of applications from access by privileged software and users. This protection enables secure outsourcing, not only of the computing infrastructure needs but also of the operations of services and applications. Managing services and applications by untrusted entities requires a more fine-granular control of software and configuration updates. I show how multi-stakeholder governance helps us to establish trust in services and applications running on remote Kubernetes clusters. Moreover, I demonstrate how governance and confidential computing work in virtually air-gapped environments without direct access.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07406ed elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"07406ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ee92e1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee92e1f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8963fd5\" data-id=\"8963fd5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31968a5 elementor-widget elementor-widget-text-editor\" data-id=\"31968a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Du m\u00f6chtest beim Tech-Talk dabei sein? Dann schreibe uns eine kurze Nachricht \u00fcber unten stehendes Kontaktformular, um die Zugangsdaten zu bekommen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f492518 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"f492518\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;N\\u00e4chster&quot;,&quot;step_previous_label&quot;:&quot;Voriger&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Neues Formular\" aria-label=\"Neues Formular\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"2764\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"f492518\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"ALASCA | ALASCA Tech-Talk #8\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"2764\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tName & Vorname\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name &amp; Vorname\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tE-Mail-Adresse\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-Mail-Adresse\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNachricht\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Nachricht\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Senden<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a526722\" data-id=\"a526722\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab8bdee elementor-widget elementor-widget-text-editor\" data-id=\"ab8bdee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zu kompliziert? Dann lade dir hier den Kalendereintrag als ics-File direkt herunter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52b4ab7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"52b4ab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/alasca-tech-talk-8.ics\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kalendereintrag herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ALASCA Tech-Talk #8 on \"Using Confidential Computing for Protecting Data, Code, and Secrets of Applications\".<\/p>","protected":false},"author":4,"featured_media":2749,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[13],"tags":[17],"class_list":["post-2764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-tech-talk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ALASCA | ALASCA Tech-Talk #8<\/title>\n<meta name=\"description\" content=\"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \u201eUsing Confidential Computing for Protecting Data, Code, and Secrets of Applications\u201c\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alasca.cloud\/en\/alasca-tech-talk-8\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ALASCA | ALASCA Tech-Talk #8\" \/>\n<meta property=\"og:description\" content=\"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \u201eUsing Confidential Computing for Protecting Data, Code, and Secrets of Applications\u201c\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alasca.cloud\/en\/alasca-tech-talk-8\/\" \/>\n<meta property=\"og:site_name\" content=\"ALASCA\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-21T11:49:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-21T11:53:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2292\" \/>\n\t<meta property=\"og:image:height\" content=\"1198\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franziska Feldmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franziska Feldmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/\"},\"author\":{\"name\":\"Franziska Feldmann\",\"@id\":\"https:\/\/alasca.cloud\/#\/schema\/person\/4411e59bdc0639082f6ffbb7084fbde5\"},\"headline\":\"ALASCA Tech-Talk #8\",\"datePublished\":\"2023-08-21T11:49:48+00:00\",\"dateModified\":\"2023-08-21T11:53:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/\"},\"wordCount\":214,\"publisher\":{\"@id\":\"https:\/\/alasca.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg\",\"keywords\":[\"Tech-Talk\"],\"articleSection\":[\"Events\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/\",\"url\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/\",\"name\":\"ALASCA | ALASCA Tech-Talk #8\",\"isPartOf\":{\"@id\":\"https:\/\/alasca.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg\",\"datePublished\":\"2023-08-21T11:49:48+00:00\",\"dateModified\":\"2023-08-21T11:53:15+00:00\",\"description\":\"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \u201eUsing Confidential Computing for Protecting Data, Code, and Secrets of Applications\u201c\",\"breadcrumb\":{\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage\",\"url\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg\",\"contentUrl\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg\",\"width\":2292,\"height\":1198,\"caption\":\"ALASCA Tech-Talk #8 | Christoph Fetzer (Scontain) on \\\"Using Confidential Computing for Protecting Data, Code, and Secrets of Applications\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/alasca.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ALASCA Tech-Talk #8\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alasca.cloud\/#website\",\"url\":\"https:\/\/alasca.cloud\/\",\"name\":\"ALASCA\",\"description\":\"Verband f\u00fcr betriebsf\u00e4hige, offene Cloud-Infrastsrukturen e.V.\",\"publisher\":{\"@id\":\"https:\/\/alasca.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alasca.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alasca.cloud\/#organization\",\"name\":\"ALASCA e.V.\",\"alternateName\":\"Alasca - Verband f\u00fcr betriebsf\u00e4hige, offene Cloud-Infrastrukturen e.V.\",\"url\":\"https:\/\/alasca.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/alasca.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png\",\"contentUrl\":\"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ALASCA e.V.\"},\"image\":{\"@id\":\"https:\/\/alasca.cloud\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/alasca.cloud\/#\/schema\/person\/4411e59bdc0639082f6ffbb7084fbde5\",\"name\":\"Franziska Feldmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/alasca.cloud\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/45b8402609a2f78f4601e1d175ed707a5919c16ec5c2aa611a4b0b9f68a54742?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/45b8402609a2f78f4601e1d175ed707a5919c16ec5c2aa611a4b0b9f68a54742?s=96&d=mm&r=g\",\"caption\":\"Franziska Feldmann\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ALASCA | ALASCA Tech Talk #8","description":"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \"Using Confidential Computing for Protecting Data, Code, and Secrets of Applications\".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alasca.cloud\/en\/alasca-tech-talk-8\/","og_locale":"en_GB","og_type":"article","og_title":"ALASCA | ALASCA Tech-Talk #8","og_description":"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \u201eUsing Confidential Computing for Protecting Data, Code, and Secrets of Applications\u201c","og_url":"https:\/\/alasca.cloud\/en\/alasca-tech-talk-8\/","og_site_name":"ALASCA","article_published_time":"2023-08-21T11:49:48+00:00","article_modified_time":"2023-08-21T11:53:15+00:00","og_image":[{"width":2292,"height":1198,"url":"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg","type":"image\/jpeg"}],"author":"Franziska Feldmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Franziska Feldmann","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#article","isPartOf":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/"},"author":{"name":"Franziska Feldmann","@id":"https:\/\/alasca.cloud\/#\/schema\/person\/4411e59bdc0639082f6ffbb7084fbde5"},"headline":"ALASCA Tech-Talk #8","datePublished":"2023-08-21T11:49:48+00:00","dateModified":"2023-08-21T11:53:15+00:00","mainEntityOfPage":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/"},"wordCount":214,"publisher":{"@id":"https:\/\/alasca.cloud\/#organization"},"image":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage"},"thumbnailUrl":"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg","keywords":["Tech-Talk"],"articleSection":["Events"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/","url":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/","name":"ALASCA | ALASCA Tech Talk #8","isPartOf":{"@id":"https:\/\/alasca.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage"},"image":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage"},"thumbnailUrl":"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg","datePublished":"2023-08-21T11:49:48+00:00","dateModified":"2023-08-21T11:53:15+00:00","description":"ALASCA Tech-Talk #8 | Christof Fetzer (Co-Founder of Scontain) on \"Using Confidential Computing for Protecting Data, Code, and Secrets of Applications\".","breadcrumb":{"@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alasca.cloud\/alasca-tech-talk-8\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#primaryimage","url":"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg","contentUrl":"https:\/\/alasca.cloud\/wp-content\/uploads\/2023\/08\/2023-alasca-tech-talks-Template_8.jpg","width":2292,"height":1198,"caption":"ALASCA Tech-Talk #8 | Christoph Fetzer (Scontain) on \"Using Confidential Computing for Protecting Data, Code, and Secrets of Applications\""},{"@type":"BreadcrumbList","@id":"https:\/\/alasca.cloud\/alasca-tech-talk-8\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/alasca.cloud\/"},{"@type":"ListItem","position":2,"name":"ALASCA Tech-Talk #8"}]},{"@type":"WebSite","@id":"https:\/\/alasca.cloud\/#website","url":"https:\/\/alasca.cloud\/","name":"ALASCA","description":"Association for Operable, Open Cloud Infrastructures e.V.","publisher":{"@id":"https:\/\/alasca.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alasca.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/alasca.cloud\/#organization","name":"ALASCA e.V.","alternateName":"Alasca - Verband f\u00fcr betriebsf\u00e4hige, offene Cloud-Infrastrukturen e.V.","url":"https:\/\/alasca.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/alasca.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png","contentUrl":"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png","width":512,"height":512,"caption":"ALASCA e.V."},"image":{"@id":"https:\/\/alasca.cloud\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/alasca.cloud\/#\/schema\/person\/4411e59bdc0639082f6ffbb7084fbde5","name":"Franziska Feldmann","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/alasca.cloud\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/45b8402609a2f78f4601e1d175ed707a5919c16ec5c2aa611a4b0b9f68a54742?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45b8402609a2f78f4601e1d175ed707a5919c16ec5c2aa611a4b0b9f68a54742?s=96&d=mm&r=g","caption":"Franziska Feldmann"}}]}},"_links":{"self":[{"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/posts\/2764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/comments?post=2764"}],"version-history":[{"count":0,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/posts\/2764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/media\/2749"}],"wp:attachment":[{"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/media?parent=2764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/categories?post=2764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alasca.cloud\/en\/wp-json\/wp\/v2\/tags?post=2764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}