Please note: This schedule is automatically displayed in China Standard Time (UTC +8). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.
In order to facilitate networking and business relationships at the event, you may choose to visit a third party’s virtual booth or to access sponsored content. You are never required to visit these third party booths or to access sponsored content. When visiting a booth (e.g. by clicking on a third party’s logo in the exhibit hall or exhibitor directory, and any actions within the booth thereafter including viewing resources), accessing sponsored sessions in the Sponsor Theater, accessing giveaways provided by sponsors, or by participating in sponsored activities, the third party will receive some of your registration data. This data includes your First Name, Last Name, Title, Company, Address, Email, WeChat ID, Job Function, Industry, and details about the sponsored content or resources you interacted with. If you choose to interact with a virtual booth or sponsored content you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.
This is an on-demand session and will be available for the duration of the event.
As an infrastructure layer for cloud-native application communication, service mesh has become the preferred general architecture pattern for transparent communication within application services. The Sidecar proxy can control traffic management, communication, security and monitoring between services. Microservices and zero-trust security can make your system more secure than when using monolithic applications. To implement zero-trust, you can use a mTLS to provide the encryption for each request. But the encrypted tunnel implemented with mTLS increases the latency time. In this topic, we will discuss how to use Alibaba Cloud Service Mesh (ASM) and Intel Multi-Buffer technology to achieve the best of both worlds, that is, an encrypted tunnel with faster service communication response time, and ensuring that application services are connected with faster, reliable and secure communication.