Apple's Driverless Cars

Apple has shed new light on its top-secret driverless car project, as chief executive Tim Cook described the challenge of building autonomous vehicles as “the mother of all” artificial intelligence projects.

Cook said Apple was ploughing resources into developing technology to control driverless vehicles, although he refused to rule out the Silicon Valley firm building its own car at some point.

“We’re focusing on autonomous systems,” said Cook in an interview with Bloomberg TV. “Clearly one purpose of autonomous systems is self-driving cars. There are others. We sort of see it as the mother of all AI projects.” He added: “It’s probably one of the most difficult AI projects actually to work on.”

When reports of Apple’s interest in cars started to emerge in the media, it was initially thought that the company was going to challenge the automotive giants of Detroit, which are racing to build their own self-driving cars.

The ‘problem’ posed by Cyclists to Google cars et al

However, driverless cars navigate and detect other road users using a combination of cameras, detailed maps, radar and, in the case of Google cars, Lidar (light detection and ranging), a laser-sensing system adapted from oceanographic surveying. Google, in a company now spun off as Waymo, has been testing driverless cars (with pilots inside) on public streets in the US since 2009, clocking 2.5 million miles, and honing the technology following interactions with other road users.

A driverless car will, in theory, stop if it detects an object in its path, but cyclists, being small and agile, represent a unique challenge. AVs struggle with changes in speed and the huge variety of cycle shapes and sizes. They even struggle to detect which way a bicycle is pointing.

Deep3DBox, a programme designed to identify 3D objects from 2D images, such as camera footage, is the most successful at doing this; yet it only spots a cyclist in 74% of cases, and correctly predicts the direction they are facing just 59% of the time. Poor weather makes detection even less accurate.

Former Renault-Nissan chief executive Carlos Ghosn described cyclists as “one of the biggest problems for driverless cars” last year. They confuse the vehicles, he said, because at times they behave like pedestrians, at other times like cyclists, and “they don’t respect any rules usually”.

Google has acknowledged that “it’s hard for others to anticipate their movements”. This came after one cyclist bamboozled a self-driving Lexus by performing a prolonged track stand at a junction. Google has since taught its cars to recognise cyclists’ hand signals, different sizes and shapes of bike, and allows them more space on the road.

The issue of detecting and reacting to, unpredictable behaviour, is far from solved.

Guardian:

You Might Also Read:

Guidance For Connected Vehicle Security:

Hackers Stole A £60,000 BMW:

 

 

« AI Meets Music’s Evolution
Trump Handed Russia Classified Intelligence »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc