SDV
Join us for an in-depth look at the challenges and opportunities for ADAS in the backend and find out why providing additional information for ADAS functions is so crucial.
SDV, Quantum Computing
Experts assume that information security will be threatened by quantum computers in the future. With the right action plan, companies from the IIoT, automotive and KRITIS sectors can prepare themselves today for the use of new encryption technologies and thus mitigate the risks posed by quantum computers.
SDV
Modern vehicles are equipped with an increasing number of automated driving functions. How can external data increase the safety level without compromising functional safety?
Data-based ecosystems, SDV
The close interaction between hardware, software and data in the vehicle opens up new opportunities for car manufacturers.
Homologation, SDV, Cybersecurity
With the growing proportion of software in automobiles, the risk of a cyber attack is rising in parallel. This adds another dimension to the concept of vehicle quality – that of cybersecurity.
Homologation
The WLTP procedure, which has been in force since 2021, means that detailed data on vehicle variants and their optional equipment must be combined in the areas of aerodynamics and engine type. This means that new calculation algorithms are necessary and internal processes have to be reorganized. Read our article to find out what challenges but also opportunities this entails.
Digital Twin, Homologation
Vehicle customers and authorities expect highly automated driving functions to be thoroughly tested by the automotive manufacturer and to be safe. New test methods and regulations must be developed and established for this purpose. This is not feasible without a digital twin. Why? You can read about this in the following article.
Homologation, SDV, Cybersecurity
The UN regulation for cyber security management systems provides automotive manufacturers with a framework for identifying, assessing and managing cyber security risks in vehicle development. This involves the monitoring of cyber attacks as well as an effective response to and analysis of successful or attempted attacks.