"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...
All content for EDGE AI POD is the property of EDGE AI FOUNDATION and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...
What happens when trillions of AI agents can discover, communicate, and collaborate across organizational boundaries? Pradyumna Shari from MIT Media Lab unveils NANDA (Networked AI Agents in a Decentralized Architecture), a groundbreaking open protocol that could fundamentally transform how we interact with artificial intelligence. Drawing a fascinating parallel between computing history and our AI trajectory, Pradyumna explains how we've evolved from isolated large language models to action...
EDGE AI POD
"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...