Apple Self-Driving Car Testing Plan Gives Clues to Tech Programme

April 22, 2017

Apr 22: Apple Inc outlined a plan to train operators of self-driving cars in documents submitted to California regulators earlier this month, the latest clues to the company's autonomous vehicle technology aspirations.

appleselfApple was granted a permit to test self-driving cars on April 14 by the California Department of Motor Vehicles but the company has never said anything about its plan.

The state released 41 pages of Apple application documents to Reuters that give some clues about the company's highly secret self-driving effort, which it has never openly acknowledged.

The iPhone maker joins a long list of carmakers, start-ups and technology rivals, including Alphabet's Waymo, that are testing cars on state roads. Apple is looking for new hit products and autonomous car technology is expected to revolutionize the traditional auto industry.

As part of the application, Apple included a 10-page training plan that appeared to be related to operators taking back manual control of the car during automated driving exercises of the system, which it calls a development platform.

Apple declined comment beyond the filing.

The plan includes a document called “Automated System: Development Platform Specific Training Overview” whose objective is “to train safety drivers in various automated driving conditions.”

“Development platform will be controlled electronically (e.g. joystick) and safety drivers must be ready to intervene and take control,” the document reads.

The document highlights different scenarios to be tested, from high speed driving and tight U-turns to lane changes.

One letter sent from Apple to the state Department of Motor Vehicles noted that Apple's development platform “will have the ability to capture and store relevant data before a collision occurs.”

The document does not include detail on how Apple's self-driving platform actually works or othertechnical details. It also does not say what kind of sensors are found on Apple's three permitted vehicles, all 2015 Lexus model RX450h.

The permit does not necessarily mean that Apple itself is building a full car. Apple could instead be designing a self-driving platform that can be integrated into other manufacturer's cars.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 28,2020

Bengaluru, Jul 28: Congress leader Siddaramaiah on Monday alleged that BJP is trying to destabilise the Congress government in Rajasthan.

"It is the duty of the Governor to act according to the decision of the state cabinet. But he is acting like a central government puppet," he said at a protest organised here by Karnataka Pradesh Congress Committee (KPCC).

He said the Congress is protesting across the country to save democracy and save the constitution.

"We are not fighting through violence. We are protesting peacefully. The Constitution has given the right to protest in a democratic system," he said.

He accused the BJP of "being disrespectful" to the Constitution.

"Governments must walk within the framework of the Constitution. The Constitution gives everyone rights and duties. BJP destabilises elected governments and buys our legislators by horse-trading by spending crores of money. The same thing happened in Karnataka as well," he alleged.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.