The manufacturing sector is facing challenges by increasing measures on traceability and regulation compliances. Manufacturers are demanded for complete visibility of their supply train, including the origins, make, and origins of the goods they receive from the suppliers. On the other hand, today’s consumer-driven market escalades the demands for high precision and efficiencies in the production phases. Therefore, automated logistic systems combined with machine visions and robotic arms are more precise and faster for repetitive routines, such as container-fill level, seals, label check, unit counting and barcodes, than traditional manual packaging and sorting. To accomplish the integration of machine visions and robotic arms, a high-performing embedded computing system is required to drive robotic guidance and vision inspection technology in order to improve traceability, automated sorting and inventory tracking.

Critical infrastructures are constantly encountered with physical security threats due to the increasingly reported incidents. Since these utility providing plants, such as power substation, renewable energy plants, nuclear plants, oil and gas refinery, hydropower dam, water supply facility and other heavy industries, are mostly located in remote areas with vast coverage, real-time monitoring and surveillance for critical infrastructure have become a highly discussed subject to prevent uprising threats such as intruding theft and terrorism.

The demand for higher-level security has been the driving force for the populated installations of surveillance cameras in mission-critical environments, such as airports, banks, public transits, and state-owned institutions, and IP cameras are the preferred choice over conventional CCTV types due to ease of deployments. However, when there are saturated amount of IP cameras, there are perhaps billions of video data captured by these surveillance devices on a daily basis. This will definitely cause latency for video analytics, when IP cameras transfer the captured videos through Internet protocols.

Due to the rapid evolution of cyber attacks, businesses and organizations across the world, no matter large or small scale, are exposed to extremely high risks of data security threats. The recent widespread of ransomware attacks has disrupted operations and profitability to many corporations and institutions. According to statistics, the top three victimized countries are United States, Taiwan and Japan. Recently, even well-known religious organizations and hospitals in Taiwan have been attacked by ransomware. In 2016 alone, experts have determined the most infamous global ransomware attacks: CryptoWall, Locky and Cerber, each accounted for approximately 41%, 34% and 24% respectively.

Maintaining the network availability has been the top priority for enterprises worldwide, as virus attacks have intensified in size, frequency and complexity. In fact, service providers have been unprecedentedly sensitive for their network protection since the first incident of DDoS attacks, which cause Internet outage and severe damage to the serviceability of network infrastructure of the victimized service providers, namely GitHub and Sony.

Data breaches are usually intentional leaks of information without authorization, normally by hacking actions. Data breaches are destructive nightmares to major corporations and organizations because it severely damages not only their profitability, but also trust and reputations. Victims are usually giant corporations or organizations with huge base of users or member, which means gigantic amount of data as the target for hackers. In fact, some user or member data are highly sensitive or confidential and this will severely ruin the serviceability and reliability of the service providers.

The massive DDoS attack on Dynamic Network Service (Dyn) which caused severe network outages and disruptions to Dyn’s major clients including Twitter, Raddit, Spotify, Tumblr, and many other well-known websites. When a DDoS attack penetrates its targeted service website, users of the victimized site may experience disruptions or outages when accessing the services and functions. The crisis was regarded as a loud wake-up call on how vulnerable our cloud services and data centers are in terms of DDoS attack.