Self-drive Vehicles – A New Reality

 

Tesla recently announced that in a short period of time, vehicles will have full self-driving capability, but, according to a RAND Corp. expert there’s a more powerful force behind the development of autonomous-vehicle technology, armies around the world.

The military has a compelling case for moving convoys of vehicles through dangerous areas without putting soldiers at risk. This exact point motivates the military to perfect the same technologies that will eventually drive passenger vehicles down dangerous highways at greatly reduced risk to passengers.

“My vision is for army vehicles to have scalable autonomous capabilities,” said Matt Donohue, a portfolio director for US Army, speaking to Army Technology Magazine. “For Army tactical vehicles, this means scalable autonomy from leader-follower to fully autonomous capable, including the ability to be loaded and unloaded by autonomous material handling equipment.”

According to inhomelandsecurity.com, mining and farming companies also have compelling economic reasons to switch to driverless vehicles, and will benefit from development of vehicles and equipment that perform parallel tasks for the military.

Civilian cars seem close to follow the industry footsteps, Tesla’s announcement stated that a software upgrade which will occur soon is going to provide “Enhanced Autopilot” to vehicles already on the road.

The company also added that cars will not actually be able to drive themselves until regulators give their approval.  Observers warn that such approval will not come until the technology has been perfected and extensively road tested, which is where the military comes in. In RAND’s report, the authors cite an example in which the GPS system crossed over from the military to the civilian sector.

According to Adam Hecktman, director of technology and innovation for Microsoft in Chicago, such moves are not uncommon. “You frequently see military technology become commercialised. They’re taking some existing technology and accelerating it into the market”.

I-HLS:                     Tanks To Have Remote-Control:

 

« Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS
Company Directors Should Have Personal Liability For Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.