VSI Labs & HERE

Thumb original here vsi case study  1

VSI Labs is a leading technology researcher for companies that develop systems or components used in ADAS and automated driving applications. In June of 2018, HERE Technologies became a sponsor of VSI’s research vehicle. HERE sought to have their high definition (HD) maps integrated into VSI’s Ford Fusion research vehicle to test various driving applications. They were also looking to grow the reach of their brand through vehicle press opportunities.

Most L2 solutions available today perform lanekeeping using cameras to detect roads’ lane lines. This can be problematic considering these systems are totally dependent on the presence and visibility of lane markings. Using a lane model from an HD map can solve these common issues, with the maps acting as “virtual infrastructure” enabling the automated vehicle to know exactly where lane boundaries and centerlines are located even if they are covered in snow.

View Whitepaper
Provider: Here Global BV   |   Size: 644 KB   |   Language: English
Keep Reading:
Thumb original here marketing dive playbook digital

Using Location Data to Understand the Offline Impacts of Online Efforts

Using location-based marketing to drive foot traffic to stores is one of the smartest strategies advertisers can employ today, but it’s coupled with a conundrum: How will they determine if their money was well spent?

Traditional metrics like click-through and conversion rates may be useful for measuring the online effectiveness of digital media campaigns, but they fall short when the goal is understanding offline impacts. Data scientists are beginning to connect the dots between data systems to map out a customer’s movements throughout the d ...

Access this Whitepaper
Thumb original here ebook complete asset traceability

Sustainability in plain sight - How to gain visibility of your supply chain for a more sustainable (and profitable) business

To be more sustainable and stay competitive, businesses need to improve the way they transport products. But they can't hope to do this if they can't see what's happening in the supply chain.

Sustainability in business is no longer only about playing nice: it’s about survival. But this doesn’t just mean using responsibly sourced materials – it means transporting them in better ways. It’s time to transform your supply chain, and it all starts with visibility.

This guide is for any business looking to optimize its distribution network – so ...

Access this Whitepaper
Thumb original securing the database in just four en

Securing the Data Center in Just Four Steps

You will learn:

A straightforward way to get started with an internal firewall.

How protecting east-west traffic via an internal firewall secures critical applications from the lateral movement of attackers.

How deploying an internal firewall delivers unprecedented, data center-wide visibility into traffic flows.

Why an internal firewall eliminates the complexity, expense, and limitations of traditional perimeter firewalls. ...

Access this Whitepaper
Thumb original the business value of vmware nsx advanced

The Business Value of VMware NSX Advanced Load Balancer

With NSX Advanced Load Balancer, teams don’t have to choose between overprovisioning and potentially having insufficient load-balancing capacity. In fact, IDC's analysis shows that study participants are achieving significant value with NSX Advanced Load Balancer worth an annual average of $4.11 million per organization by:

Reducing the cost of providing application delivery and load-balancing resources

Sharply reducing the time needed to deliver new load-balancing capacity

Supporting the business with elastic scalability and improved ...

Access this Whitepaper
Thumb original secure workload access on your journey to zero trust

Forrester A Practical Guide To A Zero Trust Implementation

Since Forrester first introduced the model over a decade ago, Zero Trust has gained popularity and become the preferred security model for many enterprise and government organizations. The Zero Trust model shifts the focus of security from a perimeter-based defense to one that is based on minimizing implicit trust by continuously verifying that access is secure, authenticated, and authorized. Organizations that successfully implement a Zero Trust program increase customer trust and get better protection of employee, customer, and company data. ...

Access this Whitepaper