RESEARCH CONTENT:
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
RESEARCH CONTENT:
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
EGUIDE:
In this expert-guide, learn how one telematics firm is putting IoT to work using roaming networks to deliver connectivity not only in their native UK, but across Europe. Then, read about how big data gained from IoT devices is helping to paint a more three-dimensional portrait of the transportation industry.
CASE STUDY:
Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.
CASE STUDY:
Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.
WHITE PAPER:
Even with near limitless intermodal options, planners typically fall back on familiar routes and patterns – regardless of whether or not there's a better way to operate. Fortunately, this resource lays out three smart moves that slash intermodal costs while delivering real planning transparency.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
EGUIDE:
We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
EZINE:
In this week's Computer Weekly, we examine the global tech sector response to the invasion of Ukraine, and how hackers are responding to calls for an IT army to target Russia. Our latest buyer's guide looks at cloud-based ERP and other business applications. And IBM's UK chief tells us how Big Blue is reinventing itself. Read the issue now.
EGUIDE:
One huge advantage digital transformation brings with it is the phenomenon of intelligent workload management. In this 17-page buyer's guide, Computer Weekly looks at the various tools available, asset management best practices and the complications to look out for with hybrid and multicloud deployments.