Skip to content

Commit cc1f6d3

Browse files
authored
Merge pull request #125967 from vinfnet/patch-1
Update use-cases-scenarios.md
2 parents ba4571d + 89478fc commit cc1f6d3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: overview
99
ms.date: 11/04/2021
1010
ms.author: jushiman
1111
---
12-
# Usecases
12+
# Use Cases
1313

1414
Using confidential computing technologies, you can harden your virtualized environment from the host, the hypervisor, the host admin, and even your own VM admin. Depending on your threat model, we offer various technologies that enable you to:
1515

0 commit comments

Comments
 (0)