Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ready or Not, Self-Driving Cars Will Soon Be On the Roads [VIDEO]

b2ap3_thumbnail_auto_driving_cars_400.jpgArtificial intelligence might be quite a ways off, but despite this, the push continues to make driverless cars a regular occurrence on the roads. Just look at how Google has its driverless cars rolling across testing grounds in Mountain View, California, and if they have their way, we might see a lot more of these vehicles hitting the roads in the near future.

According to the National Highway Traffic Safety Administration, Google’s self-driving vehicles can be considered a driver. According to ZDNet, Google wanted to clarify how their driverless cars could meet the Federal Motor Vehicle Safety Standards. In order for Google’s cars to be seen as compliant with the safety standards, all they had to do was change the position of the brake pedal and sensors, after which the vehicles were declared safe enough.

For examples of how one of these automated cars views its surroundings, watch this video:

This declaration is a huge step forward for the artificial intelligence development endeavor, but it presents an intriguing concept. Who’s to blame for an automobile accident stemming from the incompetence of a self-driving vehicle? You can’t necessarily sue a vehicle for causing an accident, unless you want to blame the manufacturer for creating a faulty product. But, what if the manufacturer simply blames the passenger because they failed to properly “set up” the vehicle? How would something like this work?

As you can probably expect, liability is a major concern for any autonomous process. With autonomous technology, though, this is a blurred grey line at best. As the feds claimed in their letter to Google, “If no human occupant of the vehicle can actually drive the vehicle, it is more reasonable to identify the ‘driver’ as whatever (as opposed to whoever) is doing the driving.” If something goes wrong, people want to find out who (or what) is at fault, and having vehicles capable of driving themselves makes it more difficult to do so.

Another huge issue is just how well Google’s autonomous cars fit into the current Federal Motor Vehicle Safety Standards. In particular, the regulations mention specific actions taken by human anatomy which describe how a motor vehicle should be controlled. As reported by WIRED:

The rule regarding the car’s braking system, for example, says it “shall be activated by means of a foot control.” The rules around headlights and turn signals refer to hands. NHTSA can easily change how it interprets those rules, but there’s no reasonable way to define Google’s software—capable as it is—as having body parts. All of which means, the feds “would need to commence a rulemaking to consider how FMVSS No. 135 [the rule governing braking] might be amended in response to ‘changed circumstances,'” the letter says. Getting an exemption to one of these rules is a long and difficult process, Walker Smith says. But “the regular rulemaking process is even more onerous.”

While liability will remain a major problem for autonomous cars, it’s still a significant step in the right direction. What this approval means is that computers can be considered humans, or at least human-like. This acknowledgement means that developers of artificially intelligent entities will have an easier time with their goals; yet, the process will still likely be filled with all sorts of legal maneuvers and such. Though Google has slated its automated cars to be available to the public by 2020, we might have to wait just a little bit longer, even for the most basic form of AI.

Would you trust an autonomous car to get you from point A to point B safely? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Server Save Money Cloud Computing Office Windows 10 Passwords Social Media Gadgets Chrome Tech Term Virtualization Saving Money Holiday Managed IT Services Automation Microsoft Office Managed Service Facebook Operating System Artificial Intelligence Cybercrime Computers Networking IT Support Internet of Things Hacking Wi-Fi Health BYOD Mobile Device Management Telephone Systems Managed Service Provider Information Technology Information Alert Remote Spam Covid-19 Office 365 Bandwidth Router BDR Social Engineering Mobility Employer-Employee Relationship Recovery App History Law Enforcement Big Data Human Resources Password Money Mobile Computing Remote Monitoring Encryption Data Breach Applications Application Government Office Tips Blockchain Training Paperless Office How To Private Cloud VPN Managed IT Data Storage Patch Management Apps Remote Computing Mobile Office Data Security Avoiding Downtime Wireless Gmail Settings Infrastructure Bring Your Own Device Voice over Internet Protocol Data Management Two-factor Authentication Work/Life Balance Flexibility Vulnerability Marketing WiFi Windows 7 Mouse Word HaaS IT solutions Entertainment Website Budget Servers Google Drive Keyboard RMM Risk Management Hacker Software as a Service Telephone System The Internet of Things Staff Lithium-ion battery Machine Learning Connectivity Remote Work Save Time Firewall Cleaning Virtual Reality Conferencing Apple Scam Vendor Social Managed Services End of Support Data Protection Display Education Physical Security User Error Safety USB Meetings Vendor Management HIPAA Sports Employee/Employer Relationship Redundancy Robot Excel Charger Business Technology Content Management Proactive IT Access Control Compliance Humor Computing Biometrics Virtual Desktop OneNote Computer Care Best Practice Virtual Assistant Current Events YouTube Authentication Black Market Telephony Samsung DDoS Digital Signage SharePoint Document Management Value Update Solid State Drive Wireless Technology How to Spam Blocking Downtime Electronic Medical Records Customer Service Google Docs Procurement Environment Net Neutrality Data storage Hiring/Firing Identity Theft Workplace Strategy Virus Fax Server Automobile Help Desk Unified Threat Management Printing Computer Accessories Computing Infrastructure SaaS Going Green Augmented Reality Fraud Business Intelligence Managed Services Provider Network Congestion Remote Worker Battery Audit Database Worker eWaste Printer IT Management Cryptocurrency Shadow IT Bluetooth Remote Workers Legal Botnet IT Plan Processor Internet Exlporer Comparison Wearable Technology Retail Unsupported Software Hard Drive Hard Drives PDF CES IT Consultant Instant Messaging Copiers Wire 5G Relocation Evernote Running Cable Travel Quick Tip Software Tips Memory Supercomputer Emails Smartwatch Millennials Ergonomics Sync Printers Video Games Development Worker Commute Smart Office OLED Wireless Charging PCI DSS Experience Virtual Machine Netflix Employee Two Factor Authentication Workforce 2FA Virtual Private Network Fiber Optics Scalability Messaging Business Owner Root Cause Analysis Cabling Science Cables Consultant Music Analytics Policy HBO Hypervisor Knowledge NarrowBand Nanotechnology Telecommuting Dark mode Skype Project Management Trend Micro Search SMS Customer Relationship Management Data loss Default App iPhone Cortana Best Available Distributed Denial of Service Troubleshooting Procedure Outlook Saving Time Analyitcs Leadership Digital Signature WIndows 7 Google Search dark theme Start Menu Warranty Shopping Programming AI Screen Mirroring HVAC IT Infrastructure Files Loyalty Google Apps Chromecast Books FinTech Frequently Asked Questions Analysis Bing Windows 10s Devices Antivirus Mobile Administrator Social Network Cast Enterprise Content Management Investment Windows 8 Colocation Uninterrupted Power Supply User Emergency PowerPoint Employees IT service Windows Media Player Tip of the week MSP Employee/Employer Relationships webinar Accountants Public Cloud Thought Leadership ISP Monitor Employer Employee Relationship Credit Cards Windows 365 Professional Services Microchip Video Conferencing Password Management ROI Tablet Assessment Password Manager Managing Stress Multi-Factor Security Sales Domains Windows Server 2008 Bitcoin Shortcuts Twitter Cryptomining Reputation Streaming Media Point of Sale Tools Search Engine Personal IaaS Cameras Supply Chain Management Maintenance Content NIST Television Business Mangement Tech Support Laptop Trending Monitoring Batteries Bloatware Techology Smart Tech Addiction Customers Amazon Windows 8.1 Digitize Audiobook Windows Server 2008 R2 Tablets Public Computer Recycling Touchpad Transportation Customer relationships Regulations Wiring Entrepreneur Practices IT Assessment Computer Fan Cache Manufacturing Rootkit Amazon Web Services Email Best Practices Printer Server Shortcut Politics Safe Mode Advertising Criminal Workers Hosted Computing Security Cameras Benefits Computer Tips GDPR Managed IT Service Cost Management OneDrive Social Networking FENG Wireless Internet Biometric Security Online Shopping Notifications Virtual CIO Peripheral File Sharing IBM Inventory Smart Technology Specifications Digital Security Cameras Flash Camera Using Data

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code