I've given a few runs of my presentation on Driverless Cars in Australia, Malaysia and New Zealand. One thing I've noticed is how engaged and excited the audience become when they see a Tesla Model S, driving itself for the first time. So, what I wanted to achieve in this blog, is to share with you some of this magic and to show you some of the graphics and features I present to the audience.
The reason I've picked the Tesla Model S is because: 1 - it's a cool car, 2 - it's Tesla and who doesn't love Elon Musk and 3 - They make the most advanced and lowest price driverless cars in the world…oh…and did I tell you they have the best range of any electric car, maxxing out at around 667km for the lower-end model at 70 kph (see diagram 1 below) and decreasing to 452km at 120 kph. (see diagram 2 below).
Pretty impressive huh.
The key to the driverless car is the Tesla Enhanced Autopilot system which provides a number of different automatic features. Basically, new features are added as software upgrades, with the Autopilot hardware already set to support years of automation ahead. And for those worried about hackers, the software upgrades only happen whilst the car is parked safely at home. The car is completely independent when on the road, so essentially all update traffic is blocked.
There are 3 driver assist features I want to demonstrate via a series of compelling videos.
These features do not make the car driverless or fully autonomous, but provide a pathway to automated driving in the future. See Video.
The final feature to demonstrate is the full Driverless or Fully Autonomous mode. The best video I've found is the one shown by Tesla. Bear in mind, this video is now over 1 year old. The video is speeded up to make it shorter.
The 3 screens on the right, show 3 of the 8 cameras that the Autopilot system is using. The green boxes show seeing threats to the car, such as other cars and pedestrians, the blue boxes show out-of-path objects which it does not deem as threats to the car. It even picks up the traffic signals, see the orange colours, against the bright cloud background. All this is controlled by Artificial Intelligence which is delivered through a variety of technologies and techniques. The key technique at play here is Deep Learning, otherwise known as Neural Network modelling.
To find out more around how to use Deep Learning, you can visit Tesla’s partner, Nvidia.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.