Google’s Autonomic Robotic Car – What Side Are You On?

Google’s Autonomic Robotic Car – What Side Are You On?

Google’s Autonomic Robotic Car – What Side Are You On?

Google is often known for its groundbreaking innovations, one of them the Google Self-Driving Car; started under the supervision of semi-secret Google X facility. The project deals with the development and advancement in the technology for autonomous cars. The software which runs these cars has been given the name of Google Chauffeur. It runs under the supervision of top-notch engineer Sebastian Thrun, who is also a cofounder of Google Street View.

Google equipped its project team with many cars. Some of the specifics that were leaked from Google’s arsenal of cars include the following cars:

Toyota Prius
Audi TT
Lexus RX450h

Google’s autonomic robotic cars are equipped with $150,000 of equipment which includes a light radar. The range finder that can be observed on top of the autonomous cars is the Velodyne 64-beam laser which generates a 3D map of the environment. This map generated from the laser beam is then coupled with high-resolution maps of the world. This produces a data model which allows the car to drive on its own. The system has now been revamped to allow high-definition inch-precision map of the area in which the car is supposed to be driven. The car will also collect data on how the traffic lights are, and how traffic is in its immediate surroundings while making some computing on remote servers. Cars have also started opting sensors which would allow them to estimate the distance between obstacles. High-precision calculations must be made in real time by the car to enable smooth, effortless journeys.

At the beginning of the project, the cars that were designed included a manual override system to bypass the autonomic navigational system in favor of the conventional one. This allowed the driver to control the car on his own. In May this year, Google announced its new line of cars from which, steering wheel and gas pedals were removed. Hence, a truly autonomous car has now been manufactured.

Google aspires to change how the world drives and they have achieved many milestones in this regard. In April 2014, the team announced that their vehicles have logged 700,000 autonomous miles which is almost equivalent to 1.1 million km. Google has also convinced the states to pass laws which allow driving autonomous cars. The first state in the US to pass the law was Nevada, and, today many states have joined hands with Google in the venture of autonomic cars including the states of Florida, California, and Michigan.

Considering the significant amount of accident free miles that Google has put up in its testing log, it would be interesting to see autonomic cars on the road. It should be kept in mind that the autonomic cars were tested at various locations. One such location included, San Francisco’s Lombard Street, which is rather famous for its twisting turns. Other locations include Lake Tahoe and the Golden Gate Bridge. The cars were mostly driven during regular city traffic and have been tested thoroughly in the presence and even absence of drivers. Two accidents did occur before August 2011, but Google has maintained that they were solely due to human error and had no relation to the driverless cars.

This however does not free the developers from the responsibility. Care must be taken by them to test the autonomic car against potential threats such as lack of service and/ or hacking as all these cars have a direct link to Google. Proper security systems must be installed. This technology is developing so fast that lawmakers are concerned that these vehicles would “outstrip existing laws.”

The advocates argue that these cars are the future, but activists say that these cars pose more of a danger than a regular human driven car.

Surely, both arguments have logic behind them, but judging from the wide success of the tests that Google has conducted, coupled with the ever increasing support for driverless cars, it is very likely that in the next couple of months, when you stop at the turn signal, there would be no driver in the car next to you, only passengers.

By Margaret Evans

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Cloud Computing – The Good and the Bad

Cloud Computing – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be a big part of our future in both business and personal spheres. The current and future possibilities of global access to files and data, remote working opportunities, improved storage structures, and greater solution distribution have…

The FTC, Data Privacy and Facebook

The FTC, Data Privacy and Facebook

Data Protection Facebook is in deep water over their recent decision to start harvesting phone numbers from one of the apps they own, called WhatsApp. WhatsApp is a mobile phone app that allows people to place long distance phone calls and send SMS messages for free. A complaint was filed with the Federal Trade Commission…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…