they tried that. in an emergency they just stopped. the problem was they were stopping in the middle traffic and in the middle of intersections, so it's now an pull over button. or just open the door.
the button is giant and blue and impossible to miss and you can see from the video it isn't on the screen. the screen in the video is mostly brown with a sliver of blue on the side.
I guess the only option they have is "pull over" which in this case just caused the car to continue circling looking for a safe place to pull over. If they had an actual kill switch, we'd probably be watching another video of some guy on a call to waymo support while stuck in the middle of a highway.
To be clear, I'm talking specifically about the first line of support at Waymo here. I am not precluding that they have higher levels of control behind layers of authorisation.
Yes, in much of the world there are mandatory passenger-facing emergency break levers in every carriage of passenger trains. The US is the outlier here.
And yes, passengers should absolutely be able to bring their vehicle to an immediate stop. It's an "emergency break"! Of course you need an emergency break in an autonomous car! What exact alternative are you proposing for when you're in an AI-operated car hurtling under the chassis of a white truck that it failed to detect in snow conditions?
It seems like an incredibly obvious and basic legislative requirement for self-driving cars to have some kind of immediate manual break for emergencies. I'm kind of shocked that that apparently isn't the case now?
Sounds likely, in which case there needs to be a much more "break glass in case of emergency" control which gradually lowers the maximum speed cap of the vehicle.
So even if the vision/pathfinding believes there is nowhere to park and nowhere else to turn, it will still coast to a stop in a way that is not inherently less-safe than a more-normal car running out of gas and stalling on the road.
It's worse than that - an attacker on the same local network as the target machine can tie up the legitimate DHCP server by reserving all available addresses and then start advertising themselves as an alternate DHCP server (to inject the malicious routing to the target).
Because this website bypasses paywalls and loginwalls - it has accounts for a lot of the social media websites, so you don't see a generic "Login to see this page" but the actual contents.
The original post did not come off as condescending to me, but instead just highlighted how BigCorp cloud marketing departments have an incentive to sell developers on “infrastructure is tough, just pay us”. (I say this as a consumer of AWS services and fan of their products).
Currently OCR support is limited to PDF > TXT conversion but we're hoping to add support for other output formats at some point. Feel free to shoot me an email at chris [at] zamzar [dot] com if you'd like to chat further.