RESEARCH CONTENT:
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
EGUIDE:
In this expert-guide, learn how one telematics firm is putting IoT to work using roaming networks to deliver connectivity not only in their native UK, but across Europe. Then, read about how big data gained from IoT devices is helping to paint a more three-dimensional portrait of the transportation industry.
CASE STUDY:
Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.
CASE STUDY:
Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.
WHITE PAPER:
Even with near limitless intermodal options, planners typically fall back on familiar routes and patterns – regardless of whether or not there's a better way to operate. Fortunately, this resource lays out three smart moves that slash intermodal costs while delivering real planning transparency.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EZINE:
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
ANALYST REPORT:
According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.