Continuum AI is now public. Try out the most secure GenAI service!

black background with green lines

Edgeless Systems blog


Welcome to our blog. In the Edgeless Systems blog, you can read about our products' latest features, use cases, insights into the confidential computing industry, experts' opinions, and much more.

Use cases confidential AI
|

Confidential AI use cases: leveraging AI securely in regulated industries

Lara Montoya Laske

Latest blog posts

Use cases confidential AI

Confidential AI use cases: leveraging AI securely in regulated industries

Insights

sovereign cloud

Souveräne Cloud vs. Confidential Cloud

Insights

block chain icon on a grey background

Next-level security for digital assets

Insights

Security

Benchmarks blog post

“Sprichst du Deutsch?" – German proficiency LLM benchmarking

Insights

AI icon on back background, green dots

Apple Private Cloud Compute: core concepts and an open alternative

Security

Insights

Ai prompts icon

AI security: Here's why you should keep your prompts and responses encrypted and how to go about it

Security

Insights

Continuum blog post image

Continuum: The first confidential LLM platform to revolutionize secure, privacy-preserving AI with NVIDIA H100 GPUs

Product

Collaboration icon on purple gradient background

Confidential computing and multi-party computation (MPC)

Insights

Security

Ransomware attack icon

How does confidential computing help against ransomware attacks?

Security

Insights

Contrast blog post

Introducing Contrast: Manage and scale Confidential Containers

Product

Blog OC3

OC3 2024 and the growth of confidential computing

Company

Insights

Secure 5G networks with confidential computing

Insights

Security

Terraform logo repeated multiple times

The always-encrypted Kubernetes now comes with a Terraform provider

Product

Confidential s3proxy

Product

How confidential computing and AI fit together

Insights

Reproducible builds for confidential computing

Product

Tutorial

The relationship between zero trust and confidential computing

Insights

Fundamentals

Security

The three levels of confidential computing

Insights

Fundamentals

Security

open source blog

Why and how companies do open source

Insights

How to setup Mattermost on the Kubernetes engine Constellation

Tutorial

mkosi

Constellation 💖 mkosi — Minimal TCB, tailor-made for measured boot

Product

What’s new in Constellation v2.2.0? AWS support, minimal OS images & Terraform integration!

Product

confidential computing & blockchain

Confidential computing will take blockchain to the next level of security

Insights

Bringing first-class support to SBOMs and attestations for Constellation containers

Security

Product

How is the performance of Constellation

How is the performance of Constellation, the always-encrypted Kubernetes, compared to AKS and GKE?

Product

Bring your own key (BYOK) was a lie!

Bring your own key (BYOK) was a lie!

Security

Insights

What’s new in Constellation v2.1.0? Mini Constellation, Terraform integration & Kubernetes v1.25 support!

Security

Product

My favorite tools to keep a zero vulnerabilities posture for Constellation

My favorite tools to keep a zero vulnerabilities posture for Constellation

Security

Product

Generating SBOMs for confidential Kubernetes is easier than you think!

Generating SBOMs for confidential Kubernetes is easier than you think!

Security

Product

Constellation has landed open source on GitHub and you can now have your own confidential Kubernetes. Finally, the public cloud becomes the safest place for your sensitive data.

Hi, open-source community, confidential Kubernetes is now on GitHub!

Product

Product

Confidential SaaS: A new security paradigm for software-as-a-service

Confidential SaaS: A new security paradigm for software-as-a-service

Insights

homomorphic encryption vs confidential computing blog.webp

The differences between Homomorphic Encryption (HE) and Confidential Computing (CC)

Insights

GDPR compliance in the public cloud with confidential computing

GDPR compliance in the public cloud with confidential computing

Insights

How to make your microservice architecture end-to-end confidential

How to make your microservice architecture end-to-end confidential

Product

Tutorial

Spotlight: Occlum

Spotlight: Occlum

Insights

Arm Veracruz

Spotlight: Arm Veracruz

Insights

EdgelessDB

Announcing EdgelessDB: The First Confidential Database

Product

We’re hosting the Open Confidential Computing Conference 2021!

Company

TensorFlow / MarbleRun

Confidential multi-stakeholder AI

Insights

How we built EGo

How we built EGo

Product

We raised €1.45m to build the open-source stack for confidential computing!

We raised €1.45m to build the open-source stack for confidential computing!

Company

MarbleRun now supports Occlum — even more confidential computing at scale

Company

Insights

EGo and MarbleRun

How to build and deploy confidential computing microservice applications with EGo & MarbleRun

Tutorial

Product

How we are losing control of our data… and how we will get it back!

Insights

Confidential computing — basics, benefits and use cases

Confidential computing — basics, benefits and use cases

Security

MarbleRun architecture

MarbleRun — The service mesh for Confidential Computing

Product

Why do we need confidential computing?

Fundamentals

Insights

How do service meshes work?

Fundamentals