Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these assets from attack.
Download the white paper to:
Learn about the threats to AI/ML assets
Review features and benefits of a hardware root of trust
Explore use cases for safeguarding AI/ML hardware, software and data
This video explores TE Connectivity’s HIVONEX High-Power Charging Inlets for fast and secure quick charging of up to 500 A at 1,000 VDC. Designed for industrial and commercial...
Discover the benefits of ARM Cortex-M85 based MCUs with Helium and TrustZone features that bring higher performance and robust security to motor control applications.
Learn how to accurately measure cable loss using a vector network analyzer (VNA) in this webinar. Discover the differences between one-port and two-port methods, and how loss ...