All Tesla’s Cars Will Have Full Self-Drive

Tesla has announced that all US Tesla cars made from now on will have all the hardware they need on board to achieve full self-driving.

And autonomous software will roll-out later, with a US cross-country demo planned for the end of 2017. Tesla’s already doing its own early testing, of course, and the video above shows a vehicle with fully autonomous capabilities navigating city and freeway streets with apparent ease.

The Tesla takes itself out of the garage, leaves the city, takes the highway, exits and arrives at Tesla HQ, after which it parks itself. A safety driver is behind the wheel while the car is on city streets as required by law, but the vehicle is driverless at the very end of the video after it drops off its “driver” and parallel parks itself – stopping for a crossing pedestrian in the process. As noted by Elon Musk (pictured) on Twitter, it even skips a spot designated for vehicles with disabled parking permits, because it recognizes it’s not allowed to park there.

Even this early look is noteworthy because the Tesla system is handling one of the most challenging driving environments; highway driving is relatively easy, since it’s mostly straight and there’s very little in the way of unusual stops, blind corners or pedestrians. A city is basically replete with edge cases, which represent the greatest challenge for any self-driving software.

Musk even said that when this is available to drivers, they’ll be able to hit “Summon” on their phone via the Tesla app to call the car to them once they want to get driving again, even if they happen to be across the country from their vehicle.

TechCrunch

« Media Vulnerable To Election Night Cyber-Attack
Russian Citizen Charged With Hacking LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.