Abstract
Efficiently hosting multiple workloads is one of the top reasons to run Linux on IBM Z and LinuxONE. The hosting infrastructure may be a hypervisor (z/VM or KVM) or a host running containers (Docker). This presentation describes how to use IBM Z hardware crypto in virtual servers and containers and how crypto operations can be isolated if different workloads are run by different tenants.
Speaker
Dr. Reinhard Buendgen, Product Owner Security Linux on IBM Z.
Registration
Register here. You can check the system requirements here.
After registering, you will receive a confirmation email containing information about joining the webinar.
Replay & Archive
All sessions are recorded. For the archive as well as a replay and handout of this session and all previous webcasts see here.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Thanks to a joined effort of IBM, RedHat, Microsoft, and Sine Nomine Associates, as well as the .NET and Mono open source communities, .NET ...
-
This blog posting details how to take advantage of the hardware compression feature in z15 with zlib in Linux distributions. The following...
-
Secure Boot is a feature of a system bootloader that is intended to restrict a system to only boot trustworthy operating systems. In the cas...
No comments:
Post a Comment