{"id":9002,"date":"2019-08-22T18:31:49","date_gmt":"2019-08-22T13:01:49","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=9002"},"modified":"2019-08-23T18:21:23","modified_gmt":"2019-08-23T12:51:23","slug":"google-microsoft-intel-data-protection-consortium-formed","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/google-microsoft-intel-data-protection-consortium-formed\/","title":{"rendered":"Google, Microsoft, Intel Data Protection Consortium Formed"},"content":{"rendered":"<p>Tech giants like Google and Microsoft are under scrutiny over information security problems. To operate on these problems, <a href=\"https:\/\/www.the-next-tech.com\/security\/googles-privacy-claims-do-not-effect-many-specialists\/\">Google<\/a>, Microsoft and Intel have come together along with seven additional businesses to work on data security problems.<\/p>\n<p>The consortium, which can be known as the Confidential Computing Consortium (CCC), will focus on developing a balance between defining and accelerating open source technology and protecting customers&#8217; data.<\/p>\n<div class=\"text-center\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/jC8cNqT4vBQ\" width=\"610\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p>&#8220;CCC is a job community in the Linux Foundation committed to discovering and accelerating the adoption of computing. It&#8217;ll embody open government and open cooperation that has helped the achievement of similarly demanding attempts. The campaign includes responsibilities from Alibaba Cloud, Arm, Baidu, <a href=\"https:\/\/www.the-next-tech.com\/business\/cloud-encryption-tips-for-businesses-infographic\/\">Google Cloud<\/a>, <a href=\"https:\/\/www.the-next-tech.com\/development\/ibm-and-hdfc-ergo-united-to-set-up-a-lab-in-india\/\">IBM<\/a>, Intel, Microsoft, Red Hat, Swisscom and Tencent,&#8221; that the consortium countries on its recently established site.<\/p>\n<p>Simply explained this consortium takes information protection to a new paradigm &#8212; open source technology whose purpose would be to additional data safety.<\/p>\n<p><a href=\"https:\/\/www.the-next-tech.com\/security\/microsoft-edge-get-name-in-most-secure-browser\/\">Microsoft<\/a>, <a href=\"https:\/\/www.the-next-tech.com\/development\/apple-negotiated-to-buy-intels-chip-business\/\">Intel<\/a> and Red Hat have announced their software development platforms and kits which are going to be freely accessible to programmers to make data security programs. By way of instance, the consortium provides developers using a Microsoft framework, which can enable developers write code from Reputable Execution Environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech giants like Google and Microsoft are under scrutiny over information security problems. To operate on these problems, Google, Microsoft<\/p>\n","protected":false},"author":144,"featured_media":9012,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/9002"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=9002"}],"version-history":[{"count":9,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/9002\/revisions"}],"predecessor-version":[{"id":9136,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/9002\/revisions\/9136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/9012"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=9002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=9002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=9002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}