Dedicated accelerator hardware for artificial intelligence and machine learning (AI/ML) algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle valuable data and models, and face a growing threat landscape putting AI/ML assets at risk. Using fundamental cryptographic security techniques performed by a hardware root of trust can safeguard these assets from attack.
Download the white paper to:
Learn about the threats to AI/ML assets
Review features and benefits of a hardware root of trust
Explore use cases for safeguarding AI/ML hardware, software and data
Integrating USB Type-C connectors into designs requires developers pay careful attention to proper connector options and recommended layout guidelines.