Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ready or Not, Self-Driving Cars Will Soon Be On the Roads [VIDEO]

b2ap3_thumbnail_auto_driving_cars_400.jpgArtificial intelligence might be quite a ways off, but despite this, the push continues to make driverless cars a regular occurrence on the roads. Just look at how Google has its driverless cars rolling across testing grounds in Mountain View, California, and if they have their way, we might see a lot more of these vehicles hitting the roads in the near future.

According to the National Highway Traffic Safety Administration, Google’s self-driving vehicles can be considered a driver. According to ZDNet, Google wanted to clarify how their driverless cars could meet the Federal Motor Vehicle Safety Standards. In order for Google’s cars to be seen as compliant with the safety standards, all they had to do was change the position of the brake pedal and sensors, after which the vehicles were declared safe enough.

For examples of how one of these automated cars views its surroundings, watch this video:

This declaration is a huge step forward for the artificial intelligence development endeavor, but it presents an intriguing concept. Who’s to blame for an automobile accident stemming from the incompetence of a self-driving vehicle? You can’t necessarily sue a vehicle for causing an accident, unless you want to blame the manufacturer for creating a faulty product. But, what if the manufacturer simply blames the passenger because they failed to properly “set up” the vehicle? How would something like this work?

As you can probably expect, liability is a major concern for any autonomous process. With autonomous technology, though, this is a blurred grey line at best. As the feds claimed in their letter to Google, “If no human occupant of the vehicle can actually drive the vehicle, it is more reasonable to identify the ‘driver’ as whatever (as opposed to whoever) is doing the driving.” If something goes wrong, people want to find out who (or what) is at fault, and having vehicles capable of driving themselves makes it more difficult to do so.

Another huge issue is just how well Google’s autonomous cars fit into the current Federal Motor Vehicle Safety Standards. In particular, the regulations mention specific actions taken by human anatomy which describe how a motor vehicle should be controlled. As reported by WIRED:

The rule regarding the car’s braking system, for example, says it “shall be activated by means of a foot control.” The rules around headlights and turn signals refer to hands. NHTSA can easily change how it interprets those rules, but there’s no reasonable way to define Google’s software—capable as it is—as having body parts. All of which means, the feds “would need to commence a rulemaking to consider how FMVSS No. 135 [the rule governing braking] might be amended in response to ‘changed circumstances,'” the letter says. Getting an exemption to one of these rules is a long and difficult process, Walker Smith says. But “the regular rulemaking process is even more onerous.”

While liability will remain a major problem for autonomous cars, it’s still a significant step in the right direction. What this approval means is that computers can be considered humans, or at least human-like. This acknowledgement means that developers of artificially intelligent entities will have an easier time with their goals; yet, the process will still likely be filled with all sorts of legal maneuvers and such. Though Google has slated its automated cars to be available to the public by 2020, we might have to wait just a little bit longer, even for the most basic form of AI.

Would you trust an autonomous car to get you from point A to point B safely? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Upgrade Managed IT Services Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Windows 10 Passwords Saving Money Holiday Tech Term Gadgets Chrome Virtualization Social Media Managed Service Managed IT Services Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Facebook Computers BYOD Health Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Information Covid-19 Spam Managed Service Provider Office 365 Alert Telephone Systems Information Technology Remote Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility Encryption Human Resources Application Applications Remote Monitoring Data Breach Law Enforcement Big Data App History Password Mobile Computing Money Blockchain Data Storage Patch Management Remote Computing Paperless Office Government Mobile Office Private Cloud Managed IT Office Tips Training How To Apps VPN Website Budget Two-factor Authentication Google Drive Vulnerability Windows 7 Word Mouse HaaS Avoiding Downtime Servers Infrastructure Voice over Internet Protocol Data Security Wireless Bring Your Own Device Flexibility Data Management Work/Life Balance Marketing WiFi Gmail IT solutions Entertainment Settings End of Support Firewall USB Education Physical Security Safety Virtual Reality Conferencing Sports Apple HIPAA Vendor Staff Redundancy Software as a Service Telephone System Managed Services Scam Social Keyboard Machine Learning Display Connectivity Remote Work User Error Meetings Vendor Management Employee/Employer Relationship RMM Risk Management Save Time Hacker The Internet of Things Data Protection Cleaning Lithium-ion battery Shadow IT Help Desk Hiring/Firing Legal Content Management Fax Server Printing Business Technology Access Control Internet Exlporer SaaS Virtual Assistant Managed Services Provider IT Consultant Authentication PDF Database Business Intelligence Humor Network Congestion Worker Proactive IT eWaste Remote Workers Audit IT Management Update Processor Best Practice YouTube Botnet IT Plan Black Market Google Docs Hard Drive Identity Theft Wearable Technology Hard Drives Unsupported Software Retail Instant Messaging Document Management Solid State Drive Charger Wireless Technology Robot Computing Excel Augmented Reality How to Downtime Biometrics Fraud Compliance Computer Care Virus Virtual Desktop OneNote Remote Worker Current Events Data storage Telephony Automobile Unified Threat Management Samsung Computer Accessories DDoS Cryptocurrency Digital Signage SharePoint Computing Infrastructure Value Going Green Comparison Procurement Spam Blocking Electronic Medical Records CES Printer Workplace Strategy Customer Service Net Neutrality Environment Bluetooth Battery Antivirus Employees Employee/Employer Relationships Mobile Audiobook Wire Windows 10s Evernote Printer Server Touchpad Travel Windows 365 Windows 8 ISP Cast Printers ROI Tip of the week webinar Millennials Emergency IT service Video Conferencing Sales Bitcoin Professional Services Politics Smart Office Shortcuts Public Cloud Advertising Wireless Charging Employer Employee Relationship Assessment Point of Sale Personal Tablet Cryptomining Supply Chain Management Virtual Private Network Windows Server 2008 Workforce Notifications Domains Monitoring Batteries Tools Cables Television IaaS Windows 8.1 Maintenance Digitize Bloatware Project Management Windows Server 2008 R2 Nanotechnology Relocation Telecommuting Customer relationships Cortana Manufacturing Video Games Digital Signature Public Computer Email Best Practices IT Assessment Tablets Entrepreneur Warranty Regulations Worker Commute Transportation Google Apps Rootkit Computer Tips Managed IT Service Experience HVAC Security Cameras Computer Fan Consultant Biometric Security Scalability Analysis Analytics Virtual CIO Shortcut OneDrive Peripheral Cost Management Administrator Business Owner Devices Workers Benefits NarrowBand Digital Security Cameras Social Networking Using Data Enterprise Content Management FENG Best Available MSP 5G WIndows 7 Search Accountants IBM Copiers Quick Tip Microchip Flash Thought Leadership iPhone Credit Cards Smart Technology Password Manager Running Cable Ergonomics Password Management Smartwatch Memory OLED Software Tips Supercomputer Multi-Factor Security Development PCI DSS Search Engine Virtual Machine Sync Twitter Emails Files Business Mangement Chromecast 2FA Fiber Optics NIST Employee Cabling User Smart Tech PowerPoint Trending Windows Media Player Messaging Uninterrupted Power Supply Policy Hypervisor Addiction Netflix Colocation Amazon Two Factor Authentication Recycling Dark mode Trend Micro Science Root Cause Analysis Wiring Default App HBO Managing Stress Practices Knowledge Monitor Music SMS Procedure Saving Time Skype Cache Amazon Web Services Criminal Cameras Distributed Denial of Service dark theme Customer Relationship Management Shopping Safe Mode Google Search Data loss Analyitcs GDPR IT Infrastructure Outlook Hosted Computing Leadership Reputation Troubleshooting Streaming Media AI Tech Support FinTech Programming Start Menu Content Wireless Internet Bing Online Shopping Techology Loyalty Laptop Social Network File Sharing Screen Mirroring Camera Investment Frequently Asked Questions Inventory Customers Specifications Books

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code