Conclave Cocktails
On November 28th, you are welcomed to R3’s London Office, for an evening of drinks, nibbles, and networking.
Join us for upcoming webinars, meetups, conference talks or explore on-demand replays.
On November 28th, you are welcomed to R3’s London Office, for an evening of drinks, nibbles, and networking.
Join us for our next developer meetup, co-hosted with the London Java Community. We are pleased to welcome Andrey Breslav, Co-founder at Alter.
Join us for our next developer meetup and learn more about Corda and Conclave directly from the R3 team.
The first meetup of the Dissecting PETS series. Roy Hopkins and Ivar Wiersma will present Conclave Cloud.
Join us at Black Hat Europe in London this December. Drop by booth 339 (December 7-8) for a demo and meet the Conclave team.
Join us at R3’s London HQ, for a morning of breakfast, coffees, and confidential computing on the 13th of October.
In this webinar, we'll present how Conclave Cloud is taking advantage of Intel SGX and the Azure confidential computing infrastructure to ensure the integrity and privacy of the user's data as well as providing hardware-backed assurances over the exact code that will be processing the data.
Watch Roy Hopkins, Principal Engineer at R3, presenting "Conclave Functions - Serverless Execution Using Intel SGX". In this talk, he will present how Conclave Cloud is taking advantage of Intel SGX to ensure the integrity and privacy of the user’s data as well as providing hardware-backed assurances over the exact code that will be processing the data.
Join us at Serverless Architecture Conference in Berlin this October 17-19. Drop by our booth for a demo and check out our talk "Serverless Confidential Computing: Ensuring the integrity and privacy of user’s data".
Taking place in London this September 27-28 in London, this year’s event theme is shaping the future of regulated markets and will focus on the latest topics impacting the digital economy–everything from digital currencies to ESG to interoperability and confidential computing.
Start building confidential computing applications to protect your most important asset throughout every state of the data lifecycle — your data.