Intel – Expert Content
As with Block Chain campaigns for HPE and Watson AI for IBM, Transiris successfully tackled the esoteric topic of Confidential Computing for Akamai, Intel, and IBM

Situation
Akamai, one of the most innovative companies in internet technologies, partnered with Intel and IBM to address one of the most vulnerable security areas in computing: data in active memory. While data in storage and data in motion are protected through access control, encryption, firewalls, etc., data in memory remains somewhat unprotected, especially as it typically needs to be decrypted to be processed.
While this issue is of particular importance in financial and health transactions, utilities, voting software, and pretty much everywhere else, the advent of AI brought an additional challenge.
In the past, computer code could be inspected and a malicious insertion or injection could be tracked as programming languages had tens or at the most a couple of hundred reserved words in the programming vocabulary (e.g., IF-THEN-ELSE, TRY-CATCH-THROW, SELECT-FROM-WHERE, etc.).
With the emergence of the Large Language Models (LLMs) used in AI engines, instructions can be given using tens of thousands (or more) words. A malicious AI trainer can insert instructions to take over control or generate damage when a certain sequence of words is presented to the interpreter, Manchurian Candidate style. It is practically impossible to back-engineer AI training and therefore such an intrusion would be extremely difficult to track.
Transiris was tasked to explain in an awareness video this quite esoteric issue of Confidential Computing and the Intel Tiber Trust Services solution developed by Intel, supported by IBM, and managed by Akamai dedicated applications that address the problem.
In addressing these challenges, the campaign also explored advanced cryptographic protocols, secure enclaves, and hardware root of trust mechanisms to reinforce data protection at the processor level.
This approach leveraged virtualization and containerization technologies to illustrate how dynamic security measures can be integrated into modern computing environments.


Solution
The first major task was to understand what the entire topic was about. It’s not every day that creative teams, in this case videographers, copywriters, and graphic artists, are confronted with a topic that only a couple of decades ago was Sci-Fi and, while quite fascinating, is hard to explain even to a specialist. To add to that, whatever we develop needs to be scientifically accurate, hold water, and stand out in the deluge of information and misinformation available on security.
We enlisted our own accomplished computer scientists with knowledge of both Marketing and Technology. Our vast expertise with implementing the complex technological infrastructure of digital marketing used by Fortune 100 companies enabled us to provide the rare skills of effective communication combined with scientific fact.
Once we crafted a meaningful script with the help of client-side subject matter experts, we had the combined creative and technology team create the mood boards, graphical elements, and explanatory aids to be developed in the video.
From there, we progressed the video using conceptual elements to support the narrative and animations of the UX APIs in the Akamai applications dedicated to Confidential Computing. We went through a handful of iterations, and completed the project within budget and in a record time of merely two months.
We also integrated technical concepts such as secure key management and sandboxing techniques into our narrative, ensuring the content resonated with a tech-savvy audience.
Outcome
The result of this project is an informative, engaging, and quite entertaining video, 3 minutes long. As we just finished the project, the video is not yet released, but check back as we will add a link the minute it will be – it’s worth the wait.
This video is a crown jewel in our portfolio, adding to similar work we completed on esoteric topics such as Block Chain for HPE and Watson AI for IBM.
Our capability to combine creative marketing skills with the deep, deep expertise and knack for technology puts us in the unique position to execute effective go-to-market tactics on the most innovative and hermetic topics developed by today’s Hi-Tech companies. Bringing this innovation to the markets is our mission and our contribution to society.
At Transiris, we bridge the gap between innovation and market communication, translating complex technological breakthroughs into clear, impactful narratives.
- Scientific Videos: over 200
- Mind-boggling topics: Communicated
- Experts who no longer think they know it all: Thousands