Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ready or Not, Self-Driving Cars Will Soon Be On the Roads [VIDEO]

b2ap3_thumbnail_auto_driving_cars_400.jpgArtificial intelligence might be quite a ways off, but despite this, the push continues to make driverless cars a regular occurrence on the roads. Just look at how Google has its driverless cars rolling across testing grounds in Mountain View, California, and if they have their way, we might see a lot more of these vehicles hitting the roads in the near future.

According to the National Highway Traffic Safety Administration, Google’s self-driving vehicles can be considered a driver. According to ZDNet, Google wanted to clarify how their driverless cars could meet the Federal Motor Vehicle Safety Standards. In order for Google’s cars to be seen as compliant with the safety standards, all they had to do was change the position of the brake pedal and sensors, after which the vehicles were declared safe enough.

For examples of how one of these automated cars views its surroundings, watch this video:

This declaration is a huge step forward for the artificial intelligence development endeavor, but it presents an intriguing concept. Who’s to blame for an automobile accident stemming from the incompetence of a self-driving vehicle? You can’t necessarily sue a vehicle for causing an accident, unless you want to blame the manufacturer for creating a faulty product. But, what if the manufacturer simply blames the passenger because they failed to properly “set up” the vehicle? How would something like this work?

As you can probably expect, liability is a major concern for any autonomous process. With autonomous technology, though, this is a blurred grey line at best. As the feds claimed in their letter to Google, “If no human occupant of the vehicle can actually drive the vehicle, it is more reasonable to identify the ‘driver’ as whatever (as opposed to whoever) is doing the driving.” If something goes wrong, people want to find out who (or what) is at fault, and having vehicles capable of driving themselves makes it more difficult to do so.

Another huge issue is just how well Google’s autonomous cars fit into the current Federal Motor Vehicle Safety Standards. In particular, the regulations mention specific actions taken by human anatomy which describe how a motor vehicle should be controlled. As reported by WIRED:

The rule regarding the car’s braking system, for example, says it “shall be activated by means of a foot control.” The rules around headlights and turn signals refer to hands. NHTSA can easily change how it interprets those rules, but there’s no reasonable way to define Google’s software—capable as it is—as having body parts. All of which means, the feds “would need to commence a rulemaking to consider how FMVSS No. 135 [the rule governing braking] might be amended in response to ‘changed circumstances,'” the letter says. Getting an exemption to one of these rules is a long and difficult process, Walker Smith says. But “the regular rulemaking process is even more onerous.”

While liability will remain a major problem for autonomous cars, it’s still a significant step in the right direction. What this approval means is that computers can be considered humans, or at least human-like. This acknowledgement means that developers of artificially intelligent entities will have an easier time with their goals; yet, the process will still likely be filled with all sorts of legal maneuvers and such. Though Google has slated its automated cars to be available to the public by 2020, we might have to wait just a little bit longer, even for the most basic form of AI.

Would you trust an autonomous car to get you from point A to point B safely? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 28 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Phishing Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Passwords Windows 10 Tech Term Social Media Chrome Virtualization Gadgets Saving Money Holiday Automation Microsoft Office Managed IT Services Managed Service Facebook Operating System Cybercrime Computers Artificial Intelligence Networking IT Support Hacking Internet of Things Health Wi-Fi BYOD Mobile Device Management Office 365 Telephone Systems Managed Service Provider Information Technology Remote Alert Covid-19 Information Spam Bandwidth Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Data Breach Encryption App Applications History Big Data Law Enforcement Human Resources Mobile Computing Remote Monitoring Password Application Money Office Tips Training VPN Government How To Private Cloud Blockchain Paperless Office Remote Computing Data Storage Managed IT Patch Management Mobile Office Apps Voice over Internet Protocol Servers Wireless Google Drive Data Security Gmail Avoiding Downtime Settings Flexibility Two-factor Authentication Marketing WiFi IT solutions Mouse Entertainment HaaS Bring Your Own Device Website Vulnerability Budget Data Management Windows 7 Work/Life Balance Word Infrastructure End of Support Vendor Management Education Risk Management Physical Security Hacker Safety Sports HIPAA Data Protection Redundancy The Internet of Things Lithium-ion battery Keyboard Firewall Vendor Virtual Reality Managed Services Save Time Apple Staff Software as a Service Telephone System Display Conferencing Machine Learning Social Connectivity Remote Work USB Cleaning User Error Scam Employee/Employer Relationship Meetings RMM Retail Hard Drives Botnet Computing IT Plan Battery Instant Messaging Robot Shadow IT Excel Humor Legal Augmented Reality Unsupported Software Fraud Biometrics Virtual Desktop Internet Exlporer Digital Signage Charger Remote Worker PDF Cryptocurrency DDoS Compliance Computer Care OneNote Current Events SharePoint Proactive IT Telephony Procurement Net Neutrality Samsung Comparison Workplace Strategy Best Practice Customer Service YouTube Help Desk CES Virus Value Black Market Environment Printing Content Management Fax Server Spam Blocking Business Technology Unified Threat Management Electronic Medical Records Computer Accessories Access Control Managed Services Provider Document Management Hiring/Firing Solid State Drive Wireless Technology Virtual Assistant SaaS Database Authentication How to Downtime Remote Workers Printer Network Congestion Data storage Bluetooth Processor Automobile eWaste Update Business Intelligence Computing Infrastructure Hard Drive Worker Google Docs Going Green Audit IT Management Identity Theft IT Consultant Wearable Technology Rootkit Accountants Techology Ergonomics Laptop Computer Fan MSP Smartwatch Microchip OLED Thought Leadership Credit Cards Customers Development PCI DSS Virtual Machine Workers Password Management Audiobook Running Cable Benefits Password Manager Multi-Factor Security 2FA Touchpad Memory Fiber Optics FENG Employee Messaging Search Engine Cabling IBM Twitter Advertising Policy Flash Hypervisor NIST Politics Smart Technology Business Mangement Smart Tech Trending Dark mode Trend Micro Consultant SMS Notifications Software Tips Default App Analytics Supercomputer Addiction Amazon Procedure Science Sync Saving Time Emails Recycling Google Search Practices dark theme Shopping Best Available Wiring AI WIndows 7 IT Infrastructure Cache Amazon Web Services Relocation Customer Relationship Management FinTech Netflix Safe Mode Bing Distributed Denial of Service Two Factor Authentication Criminal Hosted Computing Video Games Analyitcs Social Network Root Cause Analysis GDPR HBO Investment Knowledge Wireless Internet Worker Commute Music Online Shopping Programming Employees Skype Employee/Employer Relationships File Sharing Experience Camera ISP Inventory Scalability Specifications Windows 365 Data loss Video Conferencing User Outlook ROI PowerPoint Leadership Wire Windows Media Player Business Owner Antivirus Troubleshooting Evernote Travel Sales NarrowBand Windows 8 Start Menu Bitcoin Shortcuts Screen Mirroring Printers Cryptomining Loyalty Search IT service Millennials Point of Sale Personal Supply Chain Management Managing Stress Frequently Asked Questions Smart Office Books Wireless Charging iPhone Monitoring Tablet Mobile Batteries Windows 10s Cast Virtual Private Network Cameras Domains Workforce Windows 8.1 Digitize Tip of the week Windows Server 2008 R2 webinar Emergency Cables Files Employer Employee Relationship Maintenance Customer relationships Chromecast Professional Services Public Cloud IaaS Project Management Manufacturing Assessment Nanotechnology Telecommuting Email Best Practices Bloatware IT Assessment Uninterrupted Power Supply Windows Server 2008 Cortana Colocation Digital Signature Computer Tips Tablets Tools Managed IT Service Security Cameras Warranty Biometric Security Printer Server Television Virtual CIO Monitor Entrepreneur OneDrive Peripheral HVAC Google Apps Analysis Shortcut Digital Security Cameras Using Data Streaming Media Administrator 5G Public Computer Devices Reputation Cost Management Copiers Social Networking Quick Tip Tech Support Regulations Enterprise Content Management Content Transportation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code