Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these assets from attack.
Download the white paper to:
Learn about the threats to AI/ML assets
Review features and benefits of a hardware root of trust
Explore use cases for safeguarding AI/ML hardware, software and data
This presentation will provide an overview on proper fan selection, including system profiling, determining a system’s cooling requirements, and an outline of fan types and features...
This video delves into the basics of ultrasonic sensors, including how they work, understanding beam angles, a comparison of strengths and limitations, and more.
In this podcast episode, we interview Joe Pawelczyk, VP of operations at DPI UAV Systems (USA), a leading provider of small rotary wing unmanned aerial vehicles (UAV).