Skip to content

Commit

Permalink
Merge pull request #14395 from mtruj013/conf-ai
Browse files Browse the repository at this point in the history
/confidential-computing/ai copy update
  • Loading branch information
mtruj013 authored Oct 8, 2024
2 parents 9917843 + 1b9e70b commit f3fa902
Showing 1 changed file with 22 additions and 29 deletions.
51 changes: 22 additions & 29 deletions templates/confidential-computing/ai.html
Original file line number Diff line number Diff line change
Expand Up @@ -24,19 +24,17 @@ <h1>Ubuntu for confidential&nbsp;AI</h1>
<div class="col p-section--shallow">
<p>Protect the confidentiality and integrity of your AI workloads at run-time across public and private clouds.</p>

<hr class="is-muted"/>
<hr class="is-muted" />
<a class="js-invoke-modal p-button--positive" href="/contact-us">Contact us</a>
</div>
</div>
<div class="u-fixed-width">
{{ image (
url="https://assets.ubuntu.com/v1/3ff12e71-Image.png",
alt="",
width="1232",
height="526",
hi_def=True,
loading="auto"
) | safe
{{ image(url="https://assets.ubuntu.com/v1/3ff12e71-Image.png",
alt="",
width="1232",
height="526",
hi_def=True,
loading="auto") | safe
}}
</div>
</section>
Expand Down Expand Up @@ -71,14 +69,12 @@ <h2>How confidential AI&nbsp;works</h2>
Confidential AI is made possible thanks to confidential computing. Unlike traditional VMs, where you have to trust that the host software is also secure, confidential VMs only require you to trust the software running within it and the platform's hardware root of trust.
</p>
<div class="u-aspect-ratio--16-9 u-background--fade u-align--center u-vertically-center">
{{ image (
url="https://assets.ubuntu.com/v1/[email protected]",
alt="",
width="600",
height="338",
hi_def=True,
loading="lazy"
) | safe
{{ image(url="https://assets.ubuntu.com/v1/[email protected]",
alt="",
width="600",
height="338",
hi_def=True,
loading="lazy") | safe
}}
</div>
</div>
Expand All @@ -100,7 +96,6 @@ <h3 class="p-heading--5">CPU-based confidential computing</h3>

<p>
Ubuntu confidential VMs protect your workload's computation while in the CPU. It makes use of the newer hardware encryption engines to keep your data encrypted in system memory.

</p>

</div>
Expand Down Expand Up @@ -173,14 +168,12 @@ <h2>Confidential AI with Ubuntu and Nvidia&nbsp;H100&nbsp;GPUs</h2>
</p>
<div class="p-section--shallow">
<div class="u-aspect-ratio--16-9 u-background--fade u-vertically-center u-align--center">
{{ image (
url="https://assets.ubuntu.com/v1/[email protected]",
alt="Ubuntu confidential VMs establish a secure encrypted communication channel with Nvidia H100 GPUs",
width="600",
height="338",
hi_def=True,
loading="lazy"
) | safe
{{ image(url="https://assets.ubuntu.com/v1/[email protected]",
alt="Ubuntu confidential VMs establish a secure encrypted communication channel with Nvidia H100 GPUs",
width="600",
height="338",
hi_def=True,
loading="lazy") | safe
}}
</div>
</div>
Expand Down Expand Up @@ -219,11 +212,11 @@ <h2>Deploy confidential computing on your private cloud with Ubuntu and Intel TD
</div>
<div class="col">
<p>
Your on-premises servers are vulnerable to insiders attacks, and they also run the same privileged system software found in the public cloud. Therefore, they are susceptible to the same vulnerabilities and security risks.
Your on-premises servers are vulnerable to insiders' attacks, and they also run the same privileged system software found in the public cloud. Therefore, they are susceptible to the same vulnerabilities and security risks.
</p>

<p>
To help you seamlessly enable confidential computing within your private cloud, Canonical offers a tech preview of Intel TDX on Ubuntu 24.04 which provides base host OS, guest OS, and remote attestation functionalities
To help you seamlessly enable confidential computing within your private cloud, Canonical offers a tech preview of Intel TDX on Ubuntu 24.04 which provides base host OS, guest OS, and remote attestation functionalities.
</p>

<hr class="p-rule--muted" />
Expand All @@ -249,7 +242,7 @@ <h2>Learn&nbsp;more about confidential&nbsp;computing</h2>
<a href="/blog/introducing-confidential-vms-on-ubuntu-pro-for-azure">Introducing Confidential VMs on Ubuntu Pro for Azure</a>
</li>
<li class="p-list__item">
<a href="/blog/confidential-computing-in-public-clouds-isolation-and-remote-attestation-explained">Confidential computing in public clouds: isolation and remote attestation explained</a>
<a href="/engage/confidential-ai-webinar">Secure your AI workloads with confidential computing</a>
</li>
</ul>
</div>
Expand Down

0 comments on commit f3fa902

Please sign in to comment.