Skip to content
View bpradipt's full-sized avatar

Organizations

@platform-tracing @confidential-containers

Block or report bpradipt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bpradipt/README.md

Hi! I’m Pradipta Banerjee (he/him), and I currently work with Red Hat in the area of sanboxed containers and confidential containers.

I'm one of the project maintainers and Technical Steering Committee (TSC) members. One of my main responsibilities on the project is making it easier for end-users & developers to get started with confidential containers

My strengths lie in being able to work on projects at scale and create new ways of doing things. I love writing about technology topics[1,2], and mentor early-stage startups and budding open source developers in my free time.

Outside work, I am involved with Sevabrata, an NGO focussing on financially and spiritually helping people with medical needs.

I am blessed to have a caring and supportive spouse and two wonderful kids. My family is my strength.

You can connect with me on slack (user: "bpradipt"), or you can schedule a 30-min slot on my Calendly page.

📈 GitHub Stats

Github stats GitHub Streak

Pinned Loading

  1. awesome-confidential-computing awesome-confidential-computing Public

    Collection of resources on Confidential Computing

    23 4

  2. confidential-containers/operator confidential-containers/operator Public

    Operator to deploy confidential containers runtime

    Go 114 60

  3. openshift/sandboxed-containers-operator openshift/sandboxed-containers-operator Public

    An operator to enhance an Openshift/Kubernetes cluster to support running sandboxed containers

    Go 38 44

  4. confidential-containers/cloud-api-adaptor confidential-containers/cloud-api-adaptor Public

    Ability to create Kata pods using cloud provider APIs aka the peer-pods approach

    Go 48 90

  5. IBM/raksh IBM/raksh Public archive

    Seamlessly use VM based TEEs with Kubernetes for data-in use protection

    Go 36 9

  6. arch-emulator-operator arch-emulator-operator Public

    Sample operator to deploy and manage CPU arch emulator (eg. qemu) lifecycle in a Kubernetes cluster

    Go 1