<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>myamio Blog</title><description>I write articles about technology and engineering.</description><link>https://myamio.coolis.jp/</link><language>en-us</language><item><title>Autonomous Incident Response: AI-Driven System Operations Automation and Rapid Recovery</title><link>https://myamio.coolis.jp/en/blog/autonomous-incident-response/</link><guid isPermaLink="true">https://myamio.coolis.jp/en/blog/autonomous-incident-response/</guid><description>This article explores &apos;Autonomous Incident Response,&apos; where AI autonomously detects, analyzes, and recovers from system failures and security incidents, and explains the operational transformation it brings.</description><pubDate>Sat, 04 Apr 2026 06:00:00 GMT</pubDate></item><item><title>The Role of &apos;Cryptographically Signed Provenance&apos; in Building a Trustworthy Digital Society</title><link>https://myamio.coolis.jp/en/blog/cryptographically-signed-provenance-information/</link><guid isPermaLink="true">https://myamio.coolis.jp/en/blog/cryptographically-signed-provenance-information/</guid><description>An explanation of how &apos;cryptographically signed provenance&apos; proves the origin and edit history of digital content, and its importance in combating misinformation.</description><pubDate>Sat, 04 Apr 2026 05:30:00 GMT</pubDate></item><item><title>Crypto-Agility: Design Principles for Flexible Adaptation to Next-Generation Cryptographic Standards</title><link>https://myamio.coolis.jp/en/blog/crypto-agility/</link><guid isPermaLink="true">https://myamio.coolis.jp/en/blog/crypto-agility/</guid><description>In preparation for the rise of quantum computing and the discovery of vulnerabilities in cryptographic algorithms, this article explains the concept and importance of &apos;crypto-agility&apos;—the ability to swap out cryptographic functions without rebuilding systems from scratch.</description><pubDate>Sat, 04 Apr 2026 05:00:00 GMT</pubDate></item><item><title>Securing Data in Use: How Confidential Computing Works</title><link>https://myamio.coolis.jp/en/blog/confidential-computing/</link><guid isPermaLink="true">https://myamio.coolis.jp/en/blog/confidential-computing/</guid><description>Explore the inner workings of confidential computing, a technology that keeps data encrypted during processing to prevent memory-level leaks, and the hardware-based trust that powers it.</description><pubDate>Fri, 03 Apr 2026 11:00:00 GMT</pubDate></item><item><title>Hardware-Level Data Protection Technology with TEE (Trusted Execution Environment)</title><link>https://myamio.coolis.jp/en/blog/tee-trusted-execution-environment/</link><guid isPermaLink="true">https://myamio.coolis.jp/en/blog/tee-trusted-execution-environment/</guid><description>This article explains the mechanism of TEE, which protects data in use in cloud environments, and the secure data utilization brought by confidential computing.</description><pubDate>Fri, 03 Apr 2026 10:00:00 GMT</pubDate></item></channel></rss>