Avalue Technology News Center

04

DEC.

2024

Avalue Announces AI Edge Platform for Automotive, Industrial, Medical Applications, Powered by NVIDIA Jetson Family

New AI Edge Platform Series AIB-NINX-S, AIB-NINX-SC, AIB-NIAO-S offers integrated AI SDK, HW, and I/O to drive integrated solutions development, and speed time to market

(Press Release – December 4th, 2024 ) – Avalue Technology Inc. (TAIEX: 3479-TW), the global leader in industrial computing solutions, is announcing its new AI Edge processing platform, powered by NVIDIA Jetson family. The new devices, the AIB-NINX-S, AIB-NINX-SC, AIB-NIAO-S, are designed for high-integrity use cases where machine vision is a key component, including AI edge computing, AGV/AMR, defect inspection, traffic monitoring, and medical imaging.

   This family of new products is particularly designed for machine vision applications which require Object or Face Detection, like physical inspections or security cameras. This powerful machine vision capability includes object detection, facial recognition, image interpretation, and everything segmentation. The family also includes a free of charge enhanced AI SDK, which allows customers to leverage the power of AI to accelerate proof of concept development and speed time to market in Retail, Manufacturing, Transportation and Medical. To further ease customers’ challenges, this line is compatible with many different I/O and camera modules, capture cards, Wi-Fi modules, and 5G/4G modules.
 
    Avalue is very familiar with NVIDIA’s computing power platform and has launched several products that use NVIDIA Jetson Orin NX, Jetson Orin Nano, and Jetson AGX Orin. The AIB-NW01 is suitable for light AI at 20/40 TOPS and uses Orin NX and Orin NANO, the AIB-NINX-S, AIB-NINX-SC, and AIB-NW01are all available with Orin NX chips and can handle medium AI loads at 70/100 TOPS, and AIB-NVAO, AIB-NIAO, AIB-NIAO-S are all capable of the highest AI workloads at 200/275 TOPS. This range of products and the new family of Edge AI processors place Avalue in the unique position to help customers of all kinds and sizes achieve their goals.

    In particular: companies that are looking for Collaborative Customization System design, Linux/BSP customization, or EMC/safety certification will be able to tap into Avalue’s deep expertise and product base. The company also offers distribution of its full portfolio of Jetson systems, its promotion program, and Jetson BSP. Avalue can also provide POC validation and quick testing required by end-user AI applications, and the company’s S-series products offer an AI SDK for quick integration. Avalue is developing a reference design and code samples for customers to download and use on their machines for extended development or POC.

   Avalue is accelerating its customers’ product development stage to speed time to market and ease new product deployment. Click here to learn more about the AIB-NINX-S, AIB-NINX-SC, AIB-NIAO-S, or contact us via our online contact form.


About Avalue Technology
Avalue Technology (TWSE:3479) is a global leader in industrial computing solutions. We provide reliable and customized products and services based on our strong background in the industrial control industry and successful market entry experience. Avalue Technology specializes in embedded and industrial computing solutions for smart healthcare, smart manufacturing, smart transportation, smart retail and IoT applications. The company has integrated the Sustainable Development Goals (SDGs) into its mission, vision, and values, transferring them into the essence of its business strategy. The company leverages intelligence and sustainability to create a blueprint for the future of digital innovation, driving long-term change in the smart industry ecosystem.

Privacy & Security Policy
  • Purpose of This Policy

    Thank you for visiting "Avalue Healthcare Inc." (hereinafter referred to as "this website"). To help you understand how this website collects, uses, and protects the personal information you provide, please read the following information carefully.

  • Privacy Policy

    The following privacy policy applies to the collection, use, and protection of personal data during your activities on this website. It does not apply to linked websites outside of this site, nor does it apply to personnel not authorized or commissioned by this website.

  • Collection, Processing, and Use of Personal Data

    • When browsing this website or downloading files, this website does not collect any personal identification information.
    • For online application services provided by this website, applicants must provide personal information such as name, ID number, contact phone number, email address, mailing address, and registered address as required by the relevant handling agencies.
    • This website records users' IP addresses, access times, and pages viewed within the site. This data is used for internal analysis of website traffic and online behavior to improve service quality. The analysis is performed only on aggregate user behavior and does not involve individual user analysis.
    • This website is obligated to protect the privacy of all applicants. Without your consent (or in the following situations), we will not modify or delete any personal data and files: 1. Through lawful means. 2. To protect or defend the rights or property of relevant individuals. 3. To protect the interests of related units of this website.
    • This website will not sell, exchange, or rent any of your personal data to other groups, individuals, or private enterprises without your consent, except in the following cases: 1. To cooperate with legitimate investigations by judicial authorities. 2. To assist relevant authorities in their official investigations or uses. 3. Based on good faith, to disclose information as required by law or for the purpose of maintaining and improving website services.
  • Obligations of Individuals

    If you provide any incorrect or false information, the relevant units of this website have the right to refuse you all or part of the services of this website.

  • Data Protection

    This website’s servers are equipped with firewalls, antivirus systems, and other information security measures to strictly protect your personal data. Only authorized personnel have access to your personal data, and those handling the data are bound by confidentiality agreements. Violations of these confidentiality obligations will be subject to legal action. If it is necessary to commission relevant units to provide services due to business needs, this website will also strictly require compliance with confidentiality obligations and will take necessary inspection procedures to ensure compliance.

  • Links to External Websites

    This website provides links to other websites. You may access other websites through the links provided. However, the linked websites are not subject to this website's privacy policy, and you must refer to the privacy policies of those linked websites.

  • Use of Cookies

    This website will write and read cookies in your computer's browser. If you do not wish to accept cookies, you can set your browser's privacy level to high to refuse cookie writing, but this may result in some features of this website not functioning properly.

  • Website Security Policy

    Any unauthorized attempts to upload or alter services and related information provided by this website are strictly prohibited and may violate the law.

    For the purpose of website security and to ensure that this service can continue to serve all internet users, this website provides the following security measures

    • Installation of firewall devices to restrict connections on specific communication ports to prevent illegal intrusion, thus protecting users' rights.
    • Use of network intrusion detection systems to monitor network traffic and block malicious behavior.
    • Installation of antivirus software to provide users with a safe browsing environment.
    • Use of vulnerability detection software for periodic scans of system vulnerabilities and remediation.
    • Regular simulation of hacker attacks to practice system recovery procedures in case of information security incidents, ensuring the continuity of website operations.
    • Regular backup operations.
    • Timely updates of appropriate patches based on security maintenance notices from relevant operating system or application vendors.
  • Feedback and Updates

    If you have any comments regarding this website's privacy and security policies, please feel free to contact us.

    This website's privacy and security policies will be revised as needed, and updated terms will be published on this website.

Search

Enter product information or keywords to find related content.

Subscribe Newsletter

Stay updated with the latest information, exclusive offers, and exciting content.

Verification Code

Don't want to subscribe to the latest news?

Click here to unsubscribe.

Thank You for Subscribing!

SUCCESSFULLY

We will regularly send you information related to your interests. Please keep an eye on your inbox, and if you have any questions, feel free to reach out to us!

Unsubscribe Newsletter

You will no longer receive our emails. We value your choice and always welcome you to resubscribe at any time.

Verification Code

UNSUBSCRIBED

You have successfully unsubscribed from our emails. We always welcome you to resubscribe at any time.

No Items Added Yet

Oh, You haven’t selected any products yet. Please visit our product section to make a selection.