Though they can still both be categorized as cars, there is a vast difference between the models of past generations and those which are now starting to emerge. And that gap is destined to get even wider. The elevated degrees of complexity now being seen in automotive design are allowing a wealth of new functionality to be incorporated—thereby improving safety, boosting operational efficiency, and enhancing the overall driver experience.
The incorporation of Wi-Fi into car models is becoming increasingly commonplace.
At this stage design-in activity is predominantly centered around 802.11ac technology–which can comfortably support data rates in the hundreds of Mbps. It provides a way for portable electronic items (like smartphones) to interface with the vehicle’s infotainment and navigation systems, as well as offering the means to share a cellular connection (thereby delivering a Wi-Fi hotspot in and around the car).
There are other dimensions, too. It is recognized that automotive life cycles progress at a much slower pace than is seen within the consumer space. A car’s functionality isn’t permanently fixed, so a vehicle can benefit from new solutions as embedded engineers, for example, and develop them. What’s more, these as these solutions become upgrades for the car, it will be possible to implement them via firmware-over-the-air (FOTA) updates across Wi-Fi, avoiding trips for servicing and saving time and effort.
Source: Innovations in Automotive Wireless | Wireless
NIST developed the Cybersecurity Framework to enhance the security and resilience of the nation’s critical infrastructure.
The voluntary risk-based Framework integrates a set of industry standards and best practices to help organizations manage cybersecurity risks. NIST worked alongside other government agencies and the private sector to establish the resulting Framework, which uses a common language to address and manage cybersecurity risk.
The process of engaging the private and public sectors in developing the Framework went so well that Congress added that responsibility to NIST’s role through the Cybersecurity Enhancement Act of 2014.
Source: A Framework for Protecting Our Critical Infrastructure | NIST
Aerospace, defense, transportation, and security company Thales in La Defense, France, selected and used AdaCore’s GNAT Pro Ada environment to develop and verify a qualified autocode generator for critical airborne software.
Thales staff implemented the autocode generator in Ada; the tool takes an XML file and produces source code for an embedded avionics system that will be assessed against the Level B objectives in the DO-178C / ED-12C Software Considerations in Airborne Systems and Equipment certification standard.
Source: Ada on board: Thales uses AdaCore GNAT Pro for critical avionics software – Intelligent Aerospace
Singapore Airlines executives are upping the ante on inflight entertainment and connectivity or communications (IFEC) as the commercial air carrier completes an extensive four-year development program, which includes an investment of roughly $850 million (U.S.) in the research, design, development, and installation of new cabin electronics products on 19 Singapore Airlines Airbus A380 commercial jets.
The new cabin products will be fitted to Singapore Airlines’ Airbus A380 fleet starting in December 2017, when the first of five new A380 aircraft enter service.
Source: Singapore Airlines invests $850M in development, installation of new aircraft cabin electronics – Intelligent Aerospace
One of the industrial sectors that most aggressively seeks customer behavior is the automotive industry.
“The feedback is invaluable for automotive companies. Automakers get to see how customers are using their vehicles. That feedback is the holy grail for physical product companies,” said Steve Chalgren.
“Before, you had to do surveys from warranty cards. Then they’d go to maintenance records to see if customers are driving the car hard.”
For the design team, data on how customers use the product can go right into the design of the next generation of the product. “It’s amazing how the feedback informs the product development process. It takes the guesswork out. In the past, you talked with customers to get feedback after the fact. But that’s like a crime scene where everything is remembered inaccurately,” said Chalgren.
“Now you can see whether people are actually using a particular feature. It becomes this virtuous cycle of product information.”
Source: Using Customer IoT Data to Improve Products | Design News
While individual robots are wearing more sensors, the number of robots entering the market is also increasing.
“The growth in sensors is reflective of the robotics market expansion,” said Michael Sullivan. “Lower-cost sensors are entering in, and that’s producing a higher density of sensors.”
The sensors used on robots are connected in different ways, both wired and wireless. The growth in IoT systems in industrial settings has increased the ease and decreased cost of deploying sensors in robots.
“The sensors inside the robots are wired, while the exteroceptive sensors require wireless connections,” said Sullivan. “The wireless segment is driven by IoT. That has really taking off compared to the market for wired sensors.”
Source: Global Robot Sensor Market to Expand 50% by 2022 | Design News
With Intel projecting IoT products growing to 2000 billion devices by 2020 – just three years from now – the talk of IoT-everything is running high. We’re hearing about connected watches and a multitude of medical devices.
But recent surveys show that the industrial applications of IoT are now growing faster.
Source: The Varied Power of the Industrial IoT | Design News
Ben Smeets and his team at Ericsson Research have proposed a new way of looking at digital Ids they call “ID Brokering.” “[With ID Brokering] identity is not the credential itself.
It is the description of the link between the identifier and its credential,” Smeets said. If you use Google, Facebook, or any other single sign on service you’ve seen the convenience of having one login to access multiple services. It’s great for humans, but not so much for devices, Smeet said.
What’s more, there’s only one level of security – if someone gains access to one system they have implicit access to every system by virtue of the single login.
A glaring issue like this is what allows cyberattacks like the 2016 Mirai malware attack, which targeted and hijacked IoT devices, to happen.
If devices only need one level of verification to access a network, then who’s to believe they aren’t doing what they’re supposed to if their credentials check out?
Source: How Blockchain is the Key to a Secure IoT | Design News
MUMT-X provides the Apache AH-64E attack helicopter with a transformational warfighting capability that is significantly more robust, lighter, and less expensive than the original unmanned aircraft system (UAS) control system, officials say.
This award follows the completion of a 2015 MUMT-X communications upgrade contract under which L3 delivered systems for the high-speed transmission of wideband video and data.
Source: L-3 brings air-to-air-to-ground data sharing, manned and unmanned aircraft teaming, to Apache helicopters – Military & Aerospace Electronics
According to Beijing’s state media, China‘s first stealth jet fighter has now entered fully operational frontline service. This puts it in second place.
Before now, only the United States has had a fully operational ‘fifth generation’ fighter. And it’s easily the most capable aircraft deployed by any nation in its region — giving it a significant edge over the Japanese, Korean and Indian air forces.
Russia’s stealth fighter — the T-50 PAK-FA — appears to have stalled in its development. And the U.S. ‘export’ stealth fighter, the F-35, continues to suffer protracted delays.
Source: With the J-20 stealth fighter in fully operational military service, China leaps ahead in Asian arms race – Military & Aerospace Electronics