Monetizing Car Data New Service Business Opportunities to Create New Customer Benefits
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Make Use of Data in a Car: Connected Cars, Payment Tech, Analytics, and Other Opportunities
HOW TO MAKE USE OF DATA IN A CAR: CONNECTED CARS, PAYMENT TECH, ANALYTICS, AND OTHER OPPORTUNITIES Andrew Ray David Monteiro May 13, 2020 Tess Blair @MLGlobalTech © 2018 Morgan, Lewis & Bockius LLP Morgan Lewis Automotive Hour Webinar Series Series of automotive industry focused webinars led by members of the Morgan Lewis global automotive team. The 10-part 2020 program is designed to provide a comprehensive overview on a variety of topics related to clients in the automotive industry. Upcoming sessions: JUNE 10 | Employee Benefits in the Automotive and Mobility Context JULY 15 | Working with, or Operating, a Tech Startup in the Automotive and Mobility Sectors AUGUST 5 | Electric Vehicles and Their Energy Impact SEPTEMBER 23 | Autonomous Vehicles Regulation and State Developments NOVEMBER 11 | Environmental Developments and Challenges in the Automotive Space DECEMBER 9 | Capitalizing on Emerging Technology in the Automotive and Mobility Space 2 Table of Contents Section 01 – Introductions Section 02 – Market Overview Section 03 – Data Acquisition and Use Section 04 – Regulatory and Enforcement Risks 3 SECTION 01 INTRODUCTIONS Today’s Presenters Andrew Ray David Monteiro Tess Blair Washington, DC Dallas Philadelphia Tel +1.202.373.6585 Tel +1.214.466.4133 Tel +1.215.963.5161 [email protected] [email protected] [email protected] 5 SECTION 02 MARKET OVERVIEW 7 Market Overview • 135 million Americans spend 51 minutes on average commuting to work five days a week. • Connected commerce experience represents a $230 billion market. • Since 2010, investors have poured $20.8 billion into connectivity and infotainment technologies. Source: “2019 Digital Drive Report,” P97 / PYMNTS.com; “Start me up: Where mobility investments are going,” McKinsey & Company. -
Amazon's Antitrust Paradox
LINA M. KHAN Amazon’s Antitrust Paradox abstract. Amazon is the titan of twenty-first century commerce. In addition to being a re- tailer, it is now a marketing platform, a delivery and logistics network, a payment service, a credit lender, an auction house, a major book publisher, a producer of television and films, a fashion designer, a hardware manufacturer, and a leading host of cloud server space. Although Amazon has clocked staggering growth, it generates meager profits, choosing to price below-cost and ex- pand widely instead. Through this strategy, the company has positioned itself at the center of e- commerce and now serves as essential infrastructure for a host of other businesses that depend upon it. Elements of the firm’s structure and conduct pose anticompetitive concerns—yet it has escaped antitrust scrutiny. This Note argues that the current framework in antitrust—specifically its pegging competi- tion to “consumer welfare,” defined as short-term price effects—is unequipped to capture the ar- chitecture of market power in the modern economy. We cannot cognize the potential harms to competition posed by Amazon’s dominance if we measure competition primarily through price and output. Specifically, current doctrine underappreciates the risk of predatory pricing and how integration across distinct business lines may prove anticompetitive. These concerns are height- ened in the context of online platforms for two reasons. First, the economics of platform markets create incentives for a company to pursue growth over profits, a strategy that investors have re- warded. Under these conditions, predatory pricing becomes highly rational—even as existing doctrine treats it as irrational and therefore implausible. -
Connected Car
Connected Car [email protected] 1 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted I've always been asked, „What is my favorite car?” and I've always said „The next one”. Carroll Shelby Source: Wikipedia 2 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Connected Car or Autonomous Car Connected vehicles can exchange information wirelessly with other vehicles and infrastructure, but also with the vehicle manufacture or third-party service providers. Automated vehicles, on the other hand, are vehicles in which at least some aspects of safety- critical control functions occur without direct driver input. 3 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted The Race is On to Capture In-Vehicle Commerce By 2020, there will be 250 Million connected vehicles on the road globally Gartner & Connected Vehicle Trade Association 82% of new cars will be connected to Internet in 2021 Business Insider Connected car commerce will zoom to $265 billion by 2023 Juniper Research Automakers align with tech firms Voice technology will prevail Source: Business Insider 4 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Car Data Facts • What are the risks of allowing direct access to car data? • How do vehicle makers and third party providers protect my personal data and privacy? • Why share car data? • What is the safest and most secure way to share car data? • Will vehicle data be available to all service providers and under the same conditions? • What kind of data can my car share? 5 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Car Data • Diverse data types • Speed, Engine RPM, Throttle, Load, Pressure, Gear, Braking, Torque, Steer, Wheels rotations and many more (eg. -
Mobile LBS: Status Update & Platform Assessment
Wireless Media Mobile LBS: Status Update & Platform Assessment Wireless Media Strategies (WMS) Report Snapshot This report provides Strategy Analytics’ high-level outlook for handset-based location-based services. Rising GPS penetration, the growing popularity of taxi- sharing, carpooling, and ride-sharing apps, third-party content integration into popular map applications, and the emerging wearables device category provide opportunities for growth and development in mobile LBS. This report also includes an update of our assessment of global location-platform leaders, HERE, Google, TomTom and Apple. November 2016 Nitesh Patel +441908423621 Tel: Email: [email protected] www.strategyanalytics.com Wireless Media Contents 1. Executive Summary 3 2. Key Trends in Mobile LBS 4 2.1 Reported Mobile LBS Use and Adoption 5 2.2 Mobile Maps & Direction Use in Context 6 2.3 Mobile Location Capability to Boost Emerging Market Opportunities 9 2.3.1 GPS handset penetration rises in the entry tier 9 2.4 New Trends in Urban Mobility 10 2.5 From Maps & Navigation to All-in-One Travel Planning Apps 11 2.6 Wearables Remain a Growth Opportunity 13 3. Location Platform Benchmark Update 16 3.1 Overall Assessment 21 Exhibits Exhibit 1: Overall Mobile Map & Directions Use in Context: Asia, Europe, and the US ............................................... 6 Exhibit 2: Regular Mobile Map & Directions Use in Context: Asia, Europe, and the US .............................................. 8 Exhibit 3: Mobile Map & Directions Use across All Countries ...................................................................................... 8 Exhibit 4 Rising Penetration of GPS Handsets by Price Tier ...................................................................................... 10 Exhibit 5 Global Wearable Device Sales by Type ...................................................................................................... 14 Exhibit 6 The Relative Strengths & Weaknesses of Major Location Platforms .......................................................... -
CHAPTER 1 ORGANISATION PROFILE 1.1: History Founders Steve Jobs and Steve Wozniak Created Apple Computer on April 1 1976,And
CHAPTER 1 ORGANISATION PROFILE 1.1: History Founders Steve Jobs and Steve Wozniak created Apple Computer on April 1 1976,and incorporated the company on January 3, 1977, in Cupertino, California.For more than three decades, Apple Computer was predominantly a manufacturer of personal computers, including the Apple II, Macintosh, and Power Mac lines, but it faced rocky sales and low market share during the 1990s. Jobs, who had been ousted from the company in 1985, returned to Apple in 1996 after his company NeXT was bought by Apple. The following year he became the company's interim CEO, which later became permanent Jobs subsequently instilled a new corporate philosophy of recognizable products and simple design, starting with the original iMac in 1998.With the introduction of the successful iPod music player in 2001 and iTunes Music Store in 2003, Apple established itself as a leader in the consumer electronics and media sales industries, leading it to drop "Computer" from the company's name in 2007. The company is now also known for its iOS range of smart phone, media player, and tablet computer products that began with the iPhone, followed by the iPod Touch and then iPad. 1.2: Geographical region and country Apple inc was established in Cupertino, California,United States of America. Apple Inc largest geographic markets are United States of America, Europe, China, Japan, and Asia Pasific(NASDAQ;APPL). Figure 1: The percentage of Apple Inc Total Net Sales by NASDAQ for the year 2014 1.3: Type of organization 1 Apple Inc., formerly Apple Computer, Inc., is a multinational corporation that creates consumer electronics, personal computers, servers, and computer software, and is a digital distributor of media content. -
On Processing Personal Data in the Context of Connected Vehicles and Mobility Related Applications
Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications Version 1.0 Adopted on 28 January 2020 Adopted - version for public consultation 1 Table of contents 1 INTRODUCTION ................................................................................................................................ 3 1.1 Related works ........................................................................................................................... 4 1.2 Applicable law .......................................................................................................................... 5 1.3 Scope ........................................................................................................................................ 6 1.4 Definitions ................................................................................................................................ 9 1.5 Privacy and data protection risks ........................................................................................... 10 2 GENERAL RECOMMENDATIONS..................................................................................................... 12 2.1 Categories of data .................................................................................................................. 12 2.2 Purposes ................................................................................................................................. 14 2.3 Relevance and data minimisation ......................................................................................... -
Connected Car Is Talking
Your connected car is talking. Who’s listening? Moving the data-driven user experience forward with value, security and privacy @YourCar: Feeling extra #chatty today. kpmg.com @YourCar: “Monday. 8:23 a.m. 37 degrees. Pulling out of the driveway with Passenger Alex and heading to the office at 123 Main Street.” © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 604896 Contents About the authors 1 A message from Gary Silberg 3 Securing the high value of data 5 Big data speaks volumes 8 The risky road ahead 14 A closer look under the hood 19 Cybersecurity in a connected car 22 Reaching your data destination 24 About KPMG 28 © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 604896 About the authors Gary Silberg is KPMG LLP’s (KPMG) national sector lead partner for the automotive industry. With more than 25 years of business experience, including more than 15 years in the automotive industry, he is a leading voice in the media on global trends in the automotive industry. He advises numerous domestic and multinational companies in areas of strategy, mergers, acquisitions, divestitures, and joint ventures. -
Driving Security Into Connected Cars: Threat Model and Recommendations
Driving Security Into Connected Cars: Threat Model and Recommendations Numaan Huq, Craig Gibson, Rainer Vosseler TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro The Concept of Connected Cars reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 10 the original language official version of the document. Any discrepancies or differences created in the translation are Research on Remote Vehicle Attacks not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree 20 that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro Threat Model for Connected Cars disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, 26 use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. -
Legal Responses and Countermeasures to National Security Letters
Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D. -
Didi's COVID-19 Relief Efforts
DiDi's COVID-19 Relief Efforts Shuai Ren DiDi Chuxing DiDi’s Relief Efforts During the Outbreak Towards Post-Pandemic Dedicated Fleets for Healthcare Workers Point-to-Point: Commuter Bus and DRT Installing In-Vehicle Plastic Protective Sheets DiDi Hitch – Ride with Coworker Introducing AI to Verify Mask-Wearing DiDi Bike - 12 Days of Free Services “Transit Occupancy Alerting" System Joined City Consumer Voucher Plans Global Efforts to Combat COVID-19 Urban Traffic Activity Index Dedicated Fleets for Healthcare Workers 2020.1.23-24 2020.1.27 2020.2.1 2020.3 DiDi drivers organized to 2000+ healthcare Launched fund for special fleets, Launched sanitation stations operate multiple workers can call protective supplies and financial in close to 200 cities in China. emergency fleets online assistance for DPs. 2020.1.21 2020.1.25 2020.1.28 2020.2.3 COVID-19 task force Launched free services Launched free services Launched free services created for healthcare workers in for healthcare workers in for healthcare workers in Wuhan Shanghai Beijing Installing In-Vehicle Plastic Protective Sheets 2020.2.18, DiDi announced to install in-vehicle plastic protective sheets for DiDi’s car-hailing services all over the country, in order to prevent the spread of droplets as much as possible. Introducing AI to Verify Mask-Wearing AI technology to verify whether drivers are wearing masks. Driver partners who fail to follow safety requirements may not be permitted to provide rides to users through the platform. Technology advantages Accurate Multiple Steady Real-time Verification Adapt to various identification accuracy up to complex scenes and support for 99% in practice high concurrent commitment “Transit Occupancy Alerting" System DiDi's Smart Transportation Brain Team provided Shenzhen Bus Group with basic capabilities such as big data platform construction as well as application modeling and analysis, and helped it quickly build a “Transit Occupancy Alerting" system to ensure enough distance between passengers on buses. -
Uber-Technologies-Inc-2019-Annual-Report.Pdf
2019 Annual Report 69 Countries A global tech platform at 10K+ massive scale Cities Serving multiple multi-trillion dollar markets with products leveraging our core technology $65B and infrastructure Gross Bookings We believe deeply in our bold mission. Every minute of every day, consumers and Drivers on our platform can tap a button and get a ride or tap a button and get work. We revolutionized personal mobility with ridesharing, and we are leveraging our platform to redefine the massive meal delivery and logistics 111M industries. The foundation of our platform is our MAPCs massive network, leading technology, operational excellence, and product expertise. Together, these elements power movement from point A to point B. 7B Trips UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2019 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-38902 UBER TECHNOLOGIES, INC. (Exact name of registrant as specified in its charter) Delaware 45-2647441 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1455 Market Street, 4th Floor San Francisco, California 94103 (Address of principal executive offices, including zip code) (415) 612-8582 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class Trading Symbol(s) on which registered Common Stock, par value $0.00001 per share UBER New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark whether the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. -
Volume 4, 2014, NEIA Connections
Volume 4, 2014 IACP’S ANNUAL CONFERENCE IN THIS ISSUE: OCTOBER 23 – 27 - ORLANDO FLORIDA IACP Conference 1 As is our traditional custom, the Major Cities Chiefs/FBI NEIA Board Meeting Save the Date 2 were held during the IACP conference. A number of the chiefs, graduates Members 3 of the NEI, provided great benefit to their colleagues in attendance. Salt National News 8 Lake City Chief Chris Burbank spoke on “First Net;” Bill Blair, Toronto’s top Chief addressed the serious issue involving police encounters with International News 17 mentally disabled individuals; Baltimore Country’s Chief Johnson on his The Future 21 agency’s Partnership to Prevent Gun Violence; and Chief David Brown Points to Ponder 23 on Dallas’ Ebola Preparations. Typical of such presentations, were the presence of non-law enforcement experts providing added value to the Humor 24 issues under discussion. On the second day, Director Toney Armstrong Contact Information 26 provided information on how his department in Memphis handled what was called the “Memphis Blue Flu.” The issues involving Marijuana Legalization Conference Dates 26 in Colorado and the state of Washington were handled by Chiefs Robert Sponsors 27 White and Kathleen O’Toole. They were followed by an Overall Legislation Committee report provided by Chief Tom Manger, Montgomery County, MD. A little later, a program under consideration with the LAPD called Ceasefire – Cure Violence was presented by Chief Charlie Beck and accompanied by a medical presenter. I would be remiss if I were to ignore the contributions of other law enforcement personnel that represented Philadelphia, Washington DC, Las Vegas, Missouri, Austin TX, and the US Attorney Office.