Feeds

Bluetooth, iPods, HDDs to define in-car tech in 2009

No longer options, now must-haves

SANS - Survey on application security programs

Bluetooth, iPod connections, embedded hard drives and real-time location-based traffic monitoring will all be increasingly popular features in cars next year, an analyst has predicted.

Market watcher iSuppli has forecast that, in the US, the number of car manufacturers “aggressively adopting” Bluetooth wireless connections will rise from around 55 per cent this year to a massive 82 per cent in 2009.

It said Bluetooth in your car is no longer just a feature only available in the poshest cars, but now a wireless data transfer technology that can be used with a whole host of devices, including stereos and handsets, and in a number of ways from hands-free calling to streaming audio transfer.

The popularity of iPod-branded head-units will also grow too, up from 39 per cent currently to 58 per cent next year. By comparison, only one third of US car manufacturers will offer USB interface options to integrate other players and portable devices on all available car models next year.

“The automotive industry is at the point where in-vehicle technologies – or lack of them – are influencing sales,” said Phil Magney, VP of Automotive Research at iSuppli.

Hard drives are also set to appear as optional extras in around 88 models of car next year, iSuppli said. This is because an increasing number of motorists now opt for in-car infotainment systems and require storage space for music and movies.

Although some of the capacity will undoubtedly be taken up by satnav maps, iSuppli’s also stated that the likes of Ford, Volkswagen and Mercedes have all expanded real-time traffic data into their 2009 models.

3 Big data security analytics techniques

More from The Register

next story
So, just how do you say 'the mutt's nuts' in French?
Vital linguistic question interrupts LOHAN spaceplane mission
95 floors in 43 SECONDS: Hitachi's new ultra-high-speed lift
Guangzhou skyscraper denizens to hold on to hats
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.