RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
RESEARCH CONTENT:
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
EGUIDE:
In this expert-guide, learn how one telematics firm is putting IoT to work using roaming networks to deliver connectivity not only in their native UK, but across Europe. Then, read about how big data gained from IoT devices is helping to paint a more three-dimensional portrait of the transportation industry.
CASE STUDY:
Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.
WHITE PAPER:
Even with near limitless intermodal options, planners typically fall back on familiar routes and patterns – regardless of whether or not there's a better way to operate. Fortunately, this resource lays out three smart moves that slash intermodal costs while delivering real planning transparency.
CASE STUDY:
Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.
EGUIDE:
In this e-guide: Software for marketing, from content marketing through customer experience management to marketing automation, and the rest, has not been as central to the vision of CIOs as ERP and the full panoply of IT infrastructure: storage, security, networking, data centres, and all of the above delivered by way of the cloud.
EZINE:
In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.