2017- Deadline for F1 drivers call for closed cockpits

2017- Deadline for F1 drivers call for closed cockpits

Uncategorized

Jan 26, 2016
F1 cockpitF1 drivers have now given a deadline,2017 , for their closed cockpit call. The concept of closed cockpits that appears to have found favor is one initially suggested by Mercedes of a halo-style bar that wraps around the head but does not limit visibility too much. In the wake of the deaths of Jules Bianchi and Justin Wilson, there has been an increased effort to evaluate better solutions for improved head protection to stop drivers being so exposed and the closed cockpits is one such measure. GPDA chairman Alex Wurz says that with tests of the halo concept having been encouraging, there is no reason for its implementation to be held back. Wurz also added in his chat with the BBC officials that the research by FIA experts is very through and clear. Wurz is also hoping that approval for the design to come for 2017 can come as early as this week, with Formula One technical director due to get together for their regular meeting with the FIA on Friday.

Frequently Asked Questions?

Blockchain is a decentralized, distributed ledger that records transactions across multiple computers. It ensures transparency, security, and immutability in data storage.
AR overlays digital information onto the real world through devices like smartphones or AR glasses, enhancing the user's perception of the environment.
IoT refers to the network of interconnected devices that communicate and share data. It enables smart homes, wearable tech, and efficient industrial processes.
AI involves creating computer systems capable of performing tasks that typically require human intelligence. It includes machine learning, natural language processing, and computer vision.
VR creates a simulated environment that users can interact with. It typically involves the use of VR headsets to provide an immersive experience.
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks. It includes measures like firewalls, antivirus software, and encryption.
Search
Subscribe

Join our subscribers list to get the latest news and special offers.