Technology

CES technology you’ve come a long way bandwidth

By | 2017-03-22T07:59:22+00:00 January 22nd, 2017|Categories: Autonomous vehicles, Connectivity, Consumer Electronics Show (CES), Continental AG, Suppliers, Technology|Tags: , , , , , |

What did bandwidth get you back in the 1980s? the 90s? the beginning of the 21st century? Brett Stark, Continental's telematics group goes through the levels of bandwidth. What year/decade did Level 1 bandwidth come on the market? What could one do on Level 1? We go through the levels of bandwidth with Stark and [...]

Harman making music in your car #CES2017

By | 2017-03-22T07:59:23+00:00 January 9th, 2017|Categories: Consumer Electronics Show (CES), Technology|Tags: , , , , , , , |

What do you buy when you can't buy a car with 77-speakers and the windows of your car are a monitor? Buy something called kinetics add some magic called digital signal processing and waala - you've got surround sound without the cost.

Continental brings eHorizon to motorcycles and cars

By | 2017-03-29T18:40:28+00:00 December 8th, 2016|Categories: Automobiles and Energy, Continental AG, Technology|Tags: , , , |

At the Los Angeles Auto Show Hans Heibl talked about e-Horizon. Hiebl is the executive VP Infotainment and Connectivity for Continental AG. Continental has been working on autonomous and connected cars for years. Connecting cars, the ability to speak car-to-car of infrastructure-to-car is an important aspect of autonomous vehicles. Most connected communities are working [...]

NHTSA, Magna cybersecurity hacking solutions

By | 2017-03-22T07:59:24+00:00 November 2nd, 2016|Categories: #Magna, Automobiles and Energy, Autonomous vehicles, Technology|Tags: , , , , , , , , |

One of the biggest concerns about autonomous vehicles should be your car getting hacked. The U.S. Department of Transportation's National Highway Traffic Safety Administration (NHTSA) has proposed a multi-tiered solution to ensure vehicle systems are designed to take actions to prevent hacking, but also to take action if the hacking is successful. In a recent [...]