Self-drive Vehicles – A New Reality

 

Tesla recently announced that in a short period of time, vehicles will have full self-driving capability, but, according to a RAND Corp. expert there’s a more powerful force behind the development of autonomous-vehicle technology, armies around the world.

The military has a compelling case for moving convoys of vehicles through dangerous areas without putting soldiers at risk. This exact point motivates the military to perfect the same technologies that will eventually drive passenger vehicles down dangerous highways at greatly reduced risk to passengers.

“My vision is for army vehicles to have scalable autonomous capabilities,” said Matt Donohue, a portfolio director for US Army, speaking to Army Technology Magazine. “For Army tactical vehicles, this means scalable autonomy from leader-follower to fully autonomous capable, including the ability to be loaded and unloaded by autonomous material handling equipment.”

According to inhomelandsecurity.com, mining and farming companies also have compelling economic reasons to switch to driverless vehicles, and will benefit from development of vehicles and equipment that perform parallel tasks for the military.

Civilian cars seem close to follow the industry footsteps, Tesla’s announcement stated that a software upgrade which will occur soon is going to provide “Enhanced Autopilot” to vehicles already on the road.

The company also added that cars will not actually be able to drive themselves until regulators give their approval.  Observers warn that such approval will not come until the technology has been perfected and extensively road tested, which is where the military comes in. In RAND’s report, the authors cite an example in which the GPS system crossed over from the military to the civilian sector.

According to Adam Hecktman, director of technology and innovation for Microsoft in Chicago, such moves are not uncommon. “You frequently see military technology become commercialised. They’re taking some existing technology and accelerating it into the market”.

I-HLS:                     Tanks To Have Remote-Control:

 

« Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS
Company Directors Should Have Personal Liability For Data Breaches »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Harmony Intelligence

Harmony Intelligence

Harmony builds cutting-edge defensive AI products that safeguard people and critical infrastructure around the world from AI-powered threats.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.