Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ready or Not, Self-Driving Cars Will Soon Be On the Roads [VIDEO]

b2ap3_thumbnail_auto_driving_cars_400.jpgArtificial intelligence might be quite a ways off, but despite this, the push continues to make driverless cars a regular occurrence on the roads. Just look at how Google has its driverless cars rolling across testing grounds in Mountain View, California, and if they have their way, we might see a lot more of these vehicles hitting the roads in the near future.

According to the National Highway Traffic Safety Administration, Google’s self-driving vehicles can be considered a driver. According to ZDNet, Google wanted to clarify how their driverless cars could meet the Federal Motor Vehicle Safety Standards. In order for Google’s cars to be seen as compliant with the safety standards, all they had to do was change the position of the brake pedal and sensors, after which the vehicles were declared safe enough.

For examples of how one of these automated cars views its surroundings, watch this video:

This declaration is a huge step forward for the artificial intelligence development endeavor, but it presents an intriguing concept. Who’s to blame for an automobile accident stemming from the incompetence of a self-driving vehicle? You can’t necessarily sue a vehicle for causing an accident, unless you want to blame the manufacturer for creating a faulty product. But, what if the manufacturer simply blames the passenger because they failed to properly “set up” the vehicle? How would something like this work?

As you can probably expect, liability is a major concern for any autonomous process. With autonomous technology, though, this is a blurred grey line at best. As the feds claimed in their letter to Google, “If no human occupant of the vehicle can actually drive the vehicle, it is more reasonable to identify the ‘driver’ as whatever (as opposed to whoever) is doing the driving.” If something goes wrong, people want to find out who (or what) is at fault, and having vehicles capable of driving themselves makes it more difficult to do so.

Another huge issue is just how well Google’s autonomous cars fit into the current Federal Motor Vehicle Safety Standards. In particular, the regulations mention specific actions taken by human anatomy which describe how a motor vehicle should be controlled. As reported by WIRED:

The rule regarding the car’s braking system, for example, says it “shall be activated by means of a foot control.” The rules around headlights and turn signals refer to hands. NHTSA can easily change how it interprets those rules, but there’s no reasonable way to define Google’s software—capable as it is—as having body parts. All of which means, the feds “would need to commence a rulemaking to consider how FMVSS No. 135 [the rule governing braking] might be amended in response to ‘changed circumstances,'” the letter says. Getting an exemption to one of these rules is a long and difficult process, Walker Smith says. But “the regular rulemaking process is even more onerous.”

While liability will remain a major problem for autonomous cars, it’s still a significant step in the right direction. What this approval means is that computers can be considered humans, or at least human-like. This acknowledgement means that developers of artificially intelligent entities will have an easier time with their goals; yet, the process will still likely be filled with all sorts of legal maneuvers and such. Though Google has slated its automated cars to be available to the public by 2020, we might have to wait just a little bit longer, even for the most basic form of AI.

Would you trust an autonomous car to get you from point A to point B safely? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Gadgets Social Media Saving Money Holiday Chrome Tech Term Virtualization Automation Managed Service Microsoft Office Managed IT Services Facebook Artificial Intelligence Cybercrime Operating System Computers BYOD Wi-Fi Mobile Device Management Networking Health IT Support Hacking Internet of Things Covid-19 Alert Information Technology Information Managed Service Provider Spam Remote Office 365 Telephone Systems Employer-Employee Relationship Bandwidth Recovery Social Engineering Mobility Router BDR Data Breach Application Password Money Human Resources Encryption Applications Big Data Remote Monitoring Law Enforcement App History Mobile Computing Training Managed IT VPN Apps Blockchain Paperless Office Remote Computing How To Mobile Office Government Data Storage Patch Management Private Cloud Office Tips IT solutions Entertainment Website Budget Bring Your Own Device Gmail Servers Data Management Work/Life Balance Settings Two-factor Authentication Data Security Mouse Google Drive HaaS Infrastructure Voice over Internet Protocol Avoiding Downtime Flexibility Vulnerability Marketing WiFi Windows 7 Wireless Word Save Time The Internet of Things Lithium-ion battery USB Employee/Employer Relationship Vendor Management Cleaning RMM Firewall End of Support Telephone System Staff Virtual Reality Software as a Service Education Physical Security Apple Machine Learning Safety Connectivity Social Remote Work HIPAA Sports Redundancy User Error Keyboard Meetings Conferencing Vendor Risk Management Hacker Scam Managed Services Display Data Protection Printer IT Management DDoS Bluetooth Processor Data storage SharePoint Comparison Botnet Automobile IT Plan CES Hard Drive Customer Service Unsupported Software Computing Infrastructure Business Technology IT Consultant Going Green Content Management Environment Charger Access Control Computing Fax Server Virtual Assistant Compliance Humor Battery OneNote Computer Care Authentication Current Events SaaS Shadow IT Telephony Legal Digital Signage Samsung Internet Exlporer Network Congestion Update Value eWaste PDF Spam Blocking Electronic Medical Records Google Docs Procurement Net Neutrality Workplace Strategy Identity Theft Proactive IT Hiring/Firing Help Desk Wearable Technology Best Practice Virus Printing YouTube Retail Hard Drives Augmented Reality Black Market Instant Messaging Unified Threat Management Computer Accessories Excel Robot Fraud Managed Services Provider Remote Worker Biometrics Database Document Management Business Intelligence Virtual Desktop Cryptocurrency Wireless Technology Solid State Drive How to Audit Downtime Worker Remote Workers Amazon Web Services IT Assessment Science Manufacturing Files Public Computer Cache Email Best Practices Safe Mode Chromecast Transportation Criminal Regulations Security Cameras Computer Fan GDPR Rootkit Hosted Computing Computer Tips Managed IT Service Online Shopping Printer Server OneDrive Biometric Security Colocation Distributed Denial of Service Wireless Internet Virtual CIO Uninterrupted Power Supply Customer Relationship Management File Sharing Benefits Peripheral Analyitcs Workers FENG Camera Monitor Inventory Digital Security Cameras Programming Specifications Using Data Evernote Copiers 5G IBM Wire Smart Technology Quick Tip Travel Flash Smartwatch Printers Reputation Antivirus Ergonomics Streaming Media Millennials Wireless Charging Development Windows 8 OLED Content Software Tips Supercomputer Smart Office Tech Support Emails Laptop IT service PCI DSS Virtual Machine Sync Techology Employee Virtual Private Network Customers 2FA Workforce Fiber Optics Cables Messaging Tablet Cabling Audiobook Netflix Touchpad Two Factor Authentication Domains Policy Hypervisor Root Cause Analysis Project Management Nanotechnology Consultant Dark mode Telecommuting Trend Micro Music Maintenance Cortana Analytics SMS Default App Politics HBO Advertising Knowledge IaaS Digital Signature Procedure Bloatware Saving Time Skype Google Search Data loss Warranty Best Available dark theme Notifications Shopping Troubleshooting Google Apps AI Tablets IT Infrastructure Outlook Leadership HVAC WIndows 7 Analysis FinTech Entrepreneur Start Menu Bing Screen Mirroring Administrator Relocation Loyalty Devices Social Network Books Shortcut Investment Frequently Asked Questions Enterprise Content Management Video Games Windows 10s MSP Accountants Employees Cost Management Employee/Employer Relationships Mobile ISP Worker Commute Cast Microchip Thought Leadership Windows 365 Social Networking Credit Cards User Emergency Password Manager PowerPoint Video Conferencing Windows Media Player ROI Experience Tip of the week webinar Password Management Scalability Public Cloud Employer Employee Relationship Sales Multi-Factor Security Bitcoin Professional Services Shortcuts Personal Cryptomining Business Owner Search Engine Assessment Running Cable Twitter Point of Sale NIST Managing Stress NarrowBand Business Mangement Supply Chain Management Memory Windows Server 2008 Search Smart Tech Monitoring Trending Batteries Tools Amazon Cameras Digitize iPhone Television Addiction Windows 8.1 Recycling Windows Server 2008 R2 Wiring Practices Customer relationships

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code