 OK, let's get going, I guess. Hey, everybody. Welcome to the Confidence Computing Mini Summit. I think this is for most of us who missed the one in San Francisco in July. We've got some good talks here today. I'm doing an intro here. In a few minutes, we'll hear from Dr. Trieflinger on pets of the world tonight. I think this will be a very interesting topic. Osama will take us through his subject matter expertise around attestation and teach us about some of the formal specifications. We'll take a quick break then. And then, Jean-Yu, we'll talk about Secure, the open, euler, native Confidence Computing framework. This one is new for me, Jean-Yu. So looking forward to that. Nikolai, with a use case deep dive, secure and privacy-preserving cyber threat intelligence exchanges is a hot topic at the moment and a very interesting area to be working in the exchange of cyber threat intelligence. It's absolutely a necessity for most government entities, I think, around Europe in particular. And Confidence Computing seems to be a really good area for that. And Josh, who's in the Google research team, done some nice work recently on TDX, I think, as well. We'll talk to us about securing the unseen and the research that they're doing inside the Confidence Computing space. And then we'll wrap up with Mike at the end, as well. Okay, a few words from me. First of all, I think some of you may know me I'm around the Confidence Computing space for quite a while now at Intel. And just a couple of things to brush over here. I have to go back to see this now. So where we've been successful so far, security, I think we've done a good job on over the last couple of years since we brought SGX to the market and recently with the SEV, et cetera. Compliance is a big, strong area for us, too, as well. I think a lot of us are working in the compliance space now and seeing compliance as a nice tailwind. And control, as well, we see data sovereignty as a big thing, as well. Governance here in Europe, as well. And we'll see a lot more announcements, I think, coming on data sovereignty in the next couple of weeks or months, even. But we're still in the sort of early adapter stage, I think, and there's still some good use cases coming, but not enough. But we're starting to see a line of sight here to what I call platform services. And these platform services are things that are starting to happen on the hyperscalers, like data bricks, analytics, easy to use type of things on hyperscaler services. And we'll see that with Google, I think, a lot more, as well, talking to Josh earlier on. But we still have a lot to do in the awareness space. We simply don't have the level of awareness that we have with confidence computing at the moment across the market. And I think this is a problem for us. Raising awareness is an individual and collective responsibility for confidence computing at the moment. In surveys that we've done at Intel, we're seeing very, very poor results from CSOS, DevSecOps, on what confidence computing can actually bring from a compliance and security perspective. So this is a collective responsibility that we all have to bring out of infrastructure and into different levels of services across confidence computing. And that really means getting into areas like standards bodies. And this is, I know, from talking to Micros where the CCC will do a lot more work. Policymakers, we're starting to see some good tailwinds come from the likes of Anisa who are talking and recommending confidence computing as a mechanism for securing data in the cloud. And a lot of this is very much cloud focused. We've seen others from ICO in the UK and there's a collection of these now. I know the CCC are in Asia, in November, I think. The Monetary Authority of Singapore is also recommending confidence computing as a sort of go-to protection for the cloud. Customer success stories, we need to keep these coming. We've had some good ones, working with Sven on Bosch, for example, showing how we can bring confidential AI to the cloud using Intel S2X. But we need to start driving these. And again, with the CCC, we're gonna get down and dirty on customer success stories and start to bring those things out, even in the concept of a chessboard showing where different use cases can work across different communities. We continue to work with the analysts as well. I think we see a lot of interesting analysis come out of IDC and Gartner. Sometimes it swings one way or the other. But we're talking a lot to IDC and Gartner at the moment about where we are with confidence computing. It's not two to five years out. It's here now, people are using it. And it's just gonna get bigger over the next couple of months. And vertical industry groups, and another area that we need to work on as well, around that whole evangelism area. But this is a collective responsibility for all of us right now. We're the ones here that have to drive this forward. So as we kinda look at what we need to do and where we need to focus our collective energy, usability for me is the biggest barrier that we currently have with confidence computing. The past adoption, the likes of Databricks, you know, the likes of Datadog, these companies adopting confidence computing is making it easy for enterprises to come along and ultimately get to the point where they can click a box, check a box somewhere, and their workload is deemed confidential. They can get an attestation certificate, and their compliance officers are happy with that. And that means more workloads move to the cloud. So with the cloud native companies like that, that's a real nice thing to do. Talking recently to some big enterprises who are cloud first, you know, they don't know how to spell Kubernetes. They don't do infrastructure anymore. They've no interest in this. They're all in on the hyperscalers. They want confidence computing to be a check box exercise. They'll pay more for it, but they don't want to manage infrastructure at all. So cloud first. And as we see with some of the emerging workloads in the cloud, Microsoft's AI, et cetera, is all going to be confidence computing enabled from day one. So that's a check box exercise and brings confidence computing into its sort of mainstream. Confidence containers remains critical to build this out. You know, ease of portability, potentially even across clouds, et cetera. And as I say here, this past adoption, very, very critical. Usability is a barrier for us at the moment. And everybody working inside of the software elements of confidence computing has to be conscious of this, right? We've got to make this right. EdgeList are doing a nice job with Constellation, for example, to make this easier from a manageability and orchestration perspective. But we've got to work hard on this. From a hardware perspective, standardized feature discovery is something we're heavily invested in, also with AMD and with ARM as well. And the trusted IO roadmap is well on the way you would have heard from our CTO at Intel at OC3 in March or April around our plans to bring out an IO roadmap and accelerators to GPUs. And that's going to be critical as we tackle the confidential AI workloads, which are going to be critical for confidence computing growth over the next couple of years. And workload portability, most of the customers that we all want have multiple cloud contracts, not just one cloud. And they want to choose which cloud for which workload. And it's got to look and feel the same for them to do that. And that's a great opportunity, I think, for some of the startups in this space is how can we make workload portability easy? At the end of the day, your customer is a DevOps person who should be able to choose which cloud, which workloads go to in an automated sense. And then whole community, evangelized to analysts, as I said in the previous slide, this is really important. Wherever you can talk about confidential computing, let's get it out there. Use the CCC as well as a vehicle for that. Seek their advice when you're talking to people, especially with policymakers, et cetera. And global penetration. We've got a lot of success in Europe. Europe is leading in confidential computing. A lot of success coming in the US as well. And US hyperscaler dominance. We're a bit barren in Asia. We need to fix that as well. Mike and the team are committed to go to Asia and try and bring some knowledge across the Asia. It's a big area to play in with many, many different regulations. Europe is not the only one with strict regulations, Singapore, et cetera, just as strict at this place. So we need more penetration in Asia generally. And lastly, confidential computing is a privacy enhancing technology. Whether we like it or not, it is playing in that space right now. It's a strong, strong player in the privacy enhancing technology space. But it's not the only one in that space. And as Sven will talk about in a few minutes, in order to bring the most robust privacy solutions, in some cases, we need to partner with other privacy enhancing technologies, especially MPC. And we're already seeing work with Infra-heavenanced, you know, their adoption of confidential VMs on Azure to strengthen their XO war platform on Azure for their customers and use the concept of attestation, right? So the concept that their cloud or that their customers can get an attestation certificate guaranteeing the veracity of the environment that they're running in. And that's a pretty powerful combination with MPC as well. Let's then cover more on that. And others will come as well. A lot of the key MPC players are now looking at how they can use technologies like TDX or AMD SCV for that extra piece of robust. So this is the work we have to do. This is the area that we have to focus on. We've done an awful lot of work on infrastructure and other areas like that over the years. But we've got to bring it above the infrastructure layer, get usability in there, continue on the hardware roadmap that we all garner together and bring this whole community, including the Confidential Computing Consortium, into a tailwind and use this success to drive it forward as well. As I say, we're not there yet. We're still working to get there. But the future's bright, I think. Okay, that's it from me. Thank you.