Strictly speaking, robotics, drones, automated telephone calling and autonomous (driverless) cars are only tangentially related. They all work without human intervention and utilize tools such as machine-to-machine (M2M) sensors, artificial intelligence and advanced imaging.
At a higher level, the key is that they replace something that most folks probably intuitively feel wouldn’t be replaced: intelligence for a conversation, eyes and muscles for driving, a way of getting products from a distribution point to a buyer, and an exoskeleton for locomotion.
And, at an even higher level, they are all a bit creepy.
With the ever-increasing capabilities of mobile apps and devices, users can now have a nearly limitless canvas to scratch out and rearrange ideas. ... More >>
Drone security is complicated, however, because it encompasses so many different types of security threats. This is creating challenges for programmers, lawmakers and the general public, who need to address drone security without lessening the positive aspects of the devices. ... More >>
While there are clear benefits to introducing wearables into enterprise functions, organizations must address issues concerning employee privacy and data security. ... More >>