Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these assets from attack.
Download the white paper to:
Learn about the threats to AI/ML assets
Review features and benefits of a hardware root of trust
Explore use cases for safeguarding AI/ML hardware, software and data
For electronics manufacturers grappling with formidable challenges, navigating the path to success requires adapting to the dynamic landscape of the industry. How can electronics...
This article examines the motor-monitoring challenge. It then presents a practical example of edge AI performing this function using analog, digital, and mixed-signal ICs from...
Explore Raspberry Pi’s imaging and AI tools in this free webinar with expert insights from Naushir Patuck. Register now to attend live or watch the recording later.
RECOM’s RACPRO1 Series delivers robust, chassis-mountable AC/DC power for demanding industrial and renewable applications—up to 960 W with 3-phase input and extreme durability...