recommended reading

Auto industry drops robot chauffeurs in favor of the safest car of all time

Shchipkova Elena/

What's the difference between a robotic car made by Google, and the ones made by actual carmakers? The future, as always, was on display at the Consumer Electronics Show today, where Toyota and Audi unveiled their new autonomous cars of the future — concepts that should not be confused with the Google version, which is a self-driving car. Now, they're pretty much the same thing, with a series of sensors and automated controls that let a car think and act on its own. The much discussed Google car has a camera on top with a special LIDAR sensor and so does Toyota's new Lexus LS sedan. What the Google car doesn't have is a name like the Lexus's: Advanced Active Safety Research Vehicle.

Google chief Eric Schmidt has said that he thinks cars should be able to drive themselves. The auto industry would still like to sell you a driving machine, thank you very much — and make them a lot safer. This may or may not have a lot to do with Toyota's recent struggles based on safety concerns. (Google also uses the Toyota Prius for its robot-driven car.) But, hey, the Lexus is still very cool, what with the high-definition cameras that can detect traffic signals from over 160 yards away, front- and side-facing radar, and sensors that can precisely track the orientation of the car at all times. That sounds pretty accident-proof: When nothing feels wrong, the car lets the driver do the work; when it perceives a threat, the robotic system kicks in.

As you can see with this video of Audi's Pikes Peak TTS research car, the autonomous cars of the industry's future can drive on their own — but they won't:

While Google insists that its robotic chauffeurs will make driving safer by leaving humans out of the driver's seat altogether, a lot of people don't believe that. Plus, when things go wrong, the legal implications get blurry. Humans behind the wheel make a lot of ethical questions disappear — and robot back-up might make people feel better just in case. Plus, having a robot do all the work takes the fun out of driving anyway, right?

(Image via Shchipkova Elena/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.