Driverless Truck Convouys To Get UK Trials

Driverless lorries and cars will be trialed in the UK, the government has confirmed in its Budget.

Earlier in March, The Times suggested trials would take place on a "quiet stretch" of the M6 motorway in Cumbria in 2016.

The government has now confirmed, "lorry platooning" trials, in which vehicles form a convoy headed by a driver in the leading lorry, will go ahead.

It also announced that, driverless cars would be trialed, on UK roads by 2017. In the Budget, published recently, the government said it wanted the UK to be "a global centre for excellence in connected and autonomous vehicles".

The driverless lorry plan was outlined in the Chancellor's full Budget posted online. So far companies such as Ford and Google have been testing autonomous cars for months, but trials typically take place in California.

Edmund King, president of roadside recovery firm AA, has questioned the feasibility of a lorry-platooning scheme in the UK.

"The problem with the UK motorway network is that we have more entrances and exits of our motorways than any other motorways in Europe or indeed the world," he said earlier in March.

"Therefore it's very difficult to have a 44 ton 10-lorry platoon, because other vehicles need to get past the platoon to enter or exit the road."

Other technology-related points in the Budget included:

Plans for a £15m "connected corridor" between Dover and London with infrastructure that could communicate directly with vehicles trials of comparative fuel signage on the M5 motorway between Bristol and Exeter, letting drivers see the best deals development of a "5G" strategy in 2017, preparing the UK for next-generation wireless communications a £1,000 tax-free allowance for "micro-entrepreneurs" who sell products online, and a second £1,000 allowance for people who rent out their home online.

BBC: http://bbc.in/1RmkoZH

« Anonymous Threaten ISIS After Belgium Attacks
Swedish Police Investigate Media Cyber-Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.