RESEARCH CONTENT:
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
RESEARCH CONTENT:
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
CASE STUDY:
Learn how Continental AG, one of the world's leading suppliers to the automobile industry, migrated its server computer to Microsoft Windows Server 2003 and its 24,000 client computer to Windows XP Professional.
WHITE PAPER:
Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.
CASE STUDY:
Group 1 Software presents a case study in enterprise data quality success featuring the DaimlerChrysler Corporation, a leader in the automotive manufacturing industry.
WHITE PAPER:
Learn from this IBM study how new strategies, transformed processes and next generation technology can minimize the challenges and reduce complexity.