Apple's Driverless Cars

Apple has shed new light on its top-secret driverless car project, as chief executive Tim Cook described the challenge of building autonomous vehicles as “the mother of all” artificial intelligence projects.

Cook said Apple was ploughing resources into developing technology to control driverless vehicles, although he refused to rule out the Silicon Valley firm building its own car at some point.

“We’re focusing on autonomous systems,” said Cook in an interview with Bloomberg TV. “Clearly one purpose of autonomous systems is self-driving cars. There are others. We sort of see it as the mother of all AI projects.” He added: “It’s probably one of the most difficult AI projects actually to work on.”

When reports of Apple’s interest in cars started to emerge in the media, it was initially thought that the company was going to challenge the automotive giants of Detroit, which are racing to build their own self-driving cars.

The ‘problem’ posed by Cyclists to Google cars et al

However, driverless cars navigate and detect other road users using a combination of cameras, detailed maps, radar and, in the case of Google cars, Lidar (light detection and ranging), a laser-sensing system adapted from oceanographic surveying. Google, in a company now spun off as Waymo, has been testing driverless cars (with pilots inside) on public streets in the US since 2009, clocking 2.5 million miles, and honing the technology following interactions with other road users.

A driverless car will, in theory, stop if it detects an object in its path, but cyclists, being small and agile, represent a unique challenge. AVs struggle with changes in speed and the huge variety of cycle shapes and sizes. They even struggle to detect which way a bicycle is pointing.

Deep3DBox, a programme designed to identify 3D objects from 2D images, such as camera footage, is the most successful at doing this; yet it only spots a cyclist in 74% of cases, and correctly predicts the direction they are facing just 59% of the time. Poor weather makes detection even less accurate.

Former Renault-Nissan chief executive Carlos Ghosn described cyclists as “one of the biggest problems for driverless cars” last year. They confuse the vehicles, he said, because at times they behave like pedestrians, at other times like cyclists, and “they don’t respect any rules usually”.

Google has acknowledged that “it’s hard for others to anticipate their movements”. This came after one cyclist bamboozled a self-driving Lexus by performing a prolonged track stand at a junction. Google has since taught its cars to recognise cyclists’ hand signals, different sizes and shapes of bike, and allows them more space on the road.

The issue of detecting and reacting to, unpredictable behaviour, is far from solved.

Guardian:

You Might Also Read:

Guidance For Connected Vehicle Security:

Hackers Stole A £60,000 BMW:

 

 

« AI Meets Music’s Evolution
Trump Handed Russia Classified Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.