Feeds

Renault unveils mini-SUV equipped with a QUADCOPTER DRONE

Target: Hip young Asian 'trend setters' – the marketers' target, not the Flying Companion's

High performance access to file storage

Visitors to the Delhi Auto Expo motor show are getting the first look at a new concept car from Renault, the Kwid, which features a controllable quadrocopter drone that flies out of the roof.

"This is the first time we have chosen to reveal a concept car outside Europe and this is an eloquent sign of our commitment to India," said Gilles Normand, chairman of Renault Asia-Pacific in a statement.

"Young customers in India are often trend setters, looking forward to pushing the envelope when it comes to technology and enjoyable drives. Kwid, with its Flying Companion, meets this forward-looking spirit with both its dynamic styling and hyper connectivity."

The "Flying Companion" is a small battery-powered drone that sits in a hatch under the back of the roof. The driver can pull over and use a tablet app to send the drone aloft to check out how serious a traffic jam is, take exterior footage of the vehicle, or (presumably) to scout ahead for speed traps.

Renault Kwid interior

Should leave some interesting skin patterns after a long drive

The rest of the five-seater has been designed to appeal to Indian consumers, Renault says. The Kwid has a bench seat in front, with the driver positioned in the center of the car, allowing a passenger to sit on either side, and the interior is made up of strips of material to allow for easy airflow.

There are none of the traditional dials to be found in a car, instead the Kwid uses a TFT LCD display in front of the driver to provide information. The little fellow is powered by a 1.2 liter diesel engine, although the company says it can also be fitted with batteries as an option.

Not that anyone's going to have the option – the Kwid is merely a concept car and is highly unlikely to see final production. But El Reg suspects custom car builders will look at that drone idea and think, "Why not?" ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.