A Robot Won’t Steal Your Job Just Yet…

The technology industry likes to talk about how automation is set to change the world. Chatbots present a new way of interacting with software, self-driving cars promise to reshape our cities, and the increasing capability of AI to handle ever more complex and “human” tasks could reshape our economy.

But amid all the futurism, one thing gets lost: actual robots.

London startup Automata Technologies is one of those hoping to reverse the trend. The company makes a tabletop robotic arm, which it hopes will democratise access to automation for every industry by costing a fraction of the tens of thousands of dollars a typical industrial robot costs today, under £5,000 up front, or under £500 a month for a “robotics as a service” package.

Technology baron Elon Musk is scared of AI, warning of visions of the robot apocalypse when Terminator-esque machines decide they no longer need humans.

But judging from the progress made by arguably the most advanced humanoid robots, if Terminator does show up, it won’t even be able to stack shelves without falling over.

The advances made by former Google-owned Boston Dynamics, featuring a series of robots including the Atlas humanoid automaton, which while impressive in many respects is far from a highly capable robotic killing machine, or job takers.

While robotics have certainly come a long way, now able to stand, or even roll on skates can only be described as the stuff of nightmares, Boston Dynamics has shown that an i, Robot-style future is currently very, very far from reality.

So for the time being, the now Soft Bank-owned Boston Dynamics may not have achieved the goal of a house robot, but at least it has provided the world with amusement at a robot that tries so hard, but ultimately fails. But maybe don’t laugh too hard, a machine never forgets.

Guardian

You Might Also Read: 

Mini Robots Support Soldiers:

Get Ready: Robots Will Destroy Jobs:

Industrial Robots Are A Security Weak Link:

 

« The AI Apocalypse
The “augmented human” Concept Becomes Reality »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Swiss Accreditation Service (SAS)

Swiss Accreditation Service (SAS)

SAS is the national accreditation body for Switzerland. The directory of members provides details of organisations offering certification services for ISO 27001.

NewGens

NewGens

NewGens is a solution and service provider to banking institutions in the APAC region. Areas of expertise include cybersecurity, AML, fruad prevention, compliance and risk management.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.