Skip to main content

TASS International and CETECOM partner on connected driving

A cooperation agreement that combines TASS International’s automotive expertise and CETECOM’s telecommunications know-how will enable the two companies to offer solutions for the connected car market. TASS International offers simulation solutions for virtual development and verification of connected and cooperative technologies on a functional level, as well as worldwide accredited labs and test sites for evaluation, validation and homologation of components, for complete vehicles as well as cooperative
August 29, 2014 Read time: 2 mins

A cooperation agreement that combines TASS International’s automotive expertise and CETECOM’s telecommunications know-how will enable the two companies to offer solutions for the connected car market.

TASS International offers simulation solutions for virtual development and verification of connected and cooperative technologies on a functional level, as well as worldwide accredited labs and test sites for evaluation, validation and homologation of components, for complete vehicles as well as cooperative systems. CETECOM’s focus within the partnership is on certification, conformity assessment and type approval services for communication technologies.

“There is an increasing need to test and validate cooperative and connected systems and services that are close to deployment in Europe, North America and Asia”, says Jan van den Oetelaar, managing director of TASS International. “The combination of TASS International and CETECOM facilities and expertise offers the capabilities, know-how and experience to successfully perform these tests on both functional and communication levels, thus guaranteeing the performance and robustness of these systems”.

“We are really looking forward to align our expertise in this field”, adds Wilfried Klassmann, CEO of CETECOM Group. “The technology and its guaranteed functionality is the main driver for connected driving to change road traffic as we know it today.”

Related Content

  • Ansys acquires Optis to provide simulation for AV testing
    May 8, 2018
    US engineering company Ansys has bought virtual prototyping firm Optis to develop a solution for simulating autonomous vehicles (AVs) to improve safety and accelerate their deployment. Under the agreement, Optis' optical sensor and closed-loop, real-time simulation will be integrated into Ansys' multiphysics portfolio to help remove the miles of road needed for road testing. The combination of these technologies is intended to allow automotive manufacturers to simulate the environments which driverless
  • Mobility pricing offers new tools for managing mobility
    November 23, 2017
    Mobility pricing is the best way of sustaining and enhancing mobility, argues Moving Forward Consulting’s Josef Czako. Mobility pricing (MP) is effectively the culmination of the ‘user pays’ principle and has been referred to in many policy discussions about electronic toll collection, road user charging (RUC), and pricing. MP not only reflects the ‘use more, pay more’ nature of RUC, it also takes account of the external cost of journeys including pollution, noise, the cost of congestion and accidents.
  • Traffic management: risky business
    June 15, 2023
    Adding a real-time accident risk layer to the profile of a road network ticks all the crucial boxes: it saves time, fuel, money and, ultimately, lives. Harriet King of Valerann explains the brain power of Lanternn by Valerann’s Core Fusion Engine...
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take