Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Dark Shadow is Cast Over the Good Work Robots Do

b2ap3_thumbnail_manufacturing_robot_mistakes_400.jpgThe point of living in a world where technology takes over everything is that it’s supposed to make life easier. Although, keep in mind that imperfect humans are responsible for creating these technologies. Therefore, technology is flawed, maybe even to the point of putting people in harm’s way. This fundamental truth makes for an uneasy trust between man and machine.

Take for example a tragic incident that occurred last month at a Volkswagen plant in Germany, where a robot was actually responsible for the death of a worker. This robot was designed to piece together cars by moving and manipulating auto parts. According to The Guardian, the error occurred while the robot was being set up by a team of technicians. Due in part to a human error (supposedly), the robot grabbed the worker, instead of an auto part, causing critical injury.

A second example of why we should be suspicious of robots comes from the road. Led by the efforts of Google, several major technology companies are developing and testing self-driving cars. As great as it sounds to sit back and play magnetic travel chess while a robot chauffeurs you around town, the high number of reported fender benders from the testing phase gives us good reason to be a little nervous. Think about it, how do you feel about being on the same road as fast-moving, metal-death traps that are vulnerable to hacking attacks?

Buried deep in the human psyche, connected perhaps with our survival instincts, is a mistrust to give up too much control to something (or someone) that we don’t fully understand. When it comes to machines and computers, just how much do you understand about how they work? Unless you’re a computer programmer or an IT technician, it’s likely that you don’t know enough about these machines to totally erase the fear that robots will one day rise up and enslave us all. This is why science fiction movie franchises are exploring this narrative in fantastic detail, like The Terminator and The Matrix, have connected so deeply with people’s imaginations (and wallets).

Just how safe are you from the technology that you’re dependent upon? While it’s unlikely that you work with battlebots equipped with saw blades and flamethrowers, or that you play traffic roulette with a driverless car, you’ve got a lot riding on your company’s data. In fact, it would take just one major disaster for your system to crash, causing major data loss. This kind of a data loss disaster can potentially ruin a business, and by extension, your livelihood.

A disaster like this can happen at the hands of an incompetent user, an error from an imperfect machine, or even something else entirely, like a random act of nature. One way to gain peace of mind while living under such a looming threat is to learn more about the machines that you trust with so much responsibility, and it’s unlikely that you’ve got the time to analyze and understand the inner workings of your computer network. Alternatively, you can outsource the care and maintenance of your machines to the knowledgeable IT professionals at Total Tech Care.

Because, at the end of the day, who do you trust more; man, or machine?



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 July 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hosted Solutions Business Computing Hackers Backup Business Microsoft Google Malware Network Security Internet Workplace Tips Efficiency Software Email Mobile Devices Data Innovation User Tips Productivity Productivity Hardware communications Business Continuity Disaster Recovery IT Services VoIP Smartphones Browser Smartphone Android Computer Miscellaneous Network Windows 10 Business Management Server Tech Term Communication Upgrade Chrome Office Outsourced IT Cybercrime Windows Managed IT Services Virtualization Cloud Computing Computers Small Business Data Backup Save Money Hacking Holiday Social Media IT Support Microsoft Office Gadgets Alert IT Support Data Recovery Telephone Systems Managed IT Services Automation Mobile Device Windows 10 Collaboration Managed Service Provider Ransomware Social Engineering Mobility Internet of Things Quick Tips Artificial Intelligence BYOD Mobile Device Management Recovery Employer-Employee Relationship Users Router Operating System Law Enforcement Spam Remote Monitoring Mobile Computing Cybersecurity Office 365 Money App Application Saving Money Passwords Facebook Applications Health Remote Computing BDR How To Private Cloud Phishing Marketing Wi-Fi Password Office Tips Information Bandwidth Information Technology Networking VPN Avoiding Downtime Mouse Flexibility Word HaaS Managed IT Bring Your Own Device Data Management IT solutions Work/Life Balance Entertainment Website Budget Training Encryption Gmail Google Drive Settings Big Data Two-factor Authentication Virtual Reality Voice over Internet Protocol Save Time Data Protection User Error WiFi Meetings Cleaning Vulnerability Paperless Office Hacker Apps USB Windows 7 History Scam The Internet of Things Lithium-ion battery Wireless Education Data Breach Staff Managed Service Safety Connectivity Sports Redundancy Keyboard Human Resources Firewall Government Data Security YouTube Black Market Samsung SaaS Cryptocurrency Network Congestion Apple Display Social Fraud Virus Value Document Management Spam Blocking Unified Threat Management Solid State Drive Electronic Medical Records Wireless Technology eWaste Downtime Computer Accessories Hiring/Firing Data storage Automobile Retail Hard Drives Instant Messaging Botnet Comparison Wearable Technology Robot Excel Data Storage Printer Computing Infrastructure Virtual Assistant Bluetooth CES Biometrics Access Control Business Intelligence Content Management Patch Management Telephone System Digital Signage Worker Risk Management Machine Learning IT Management Battery Servers Blockchain End of Support Shadow IT IT Consultant Software as a Service Legal DDoS Physical Security IT Plan Humor Internet Exlporer Unsupported Software Environment HIPAA Update PDF Charger Fax Server Telephony Google Docs Proactive IT Augmented Reality OneNote Identity Theft Computer Care Best Practice Infrastructure Skype Netflix Two Factor Authentication Domains Remote Worker Vendor Addiction Root Cause Analysis Credit Cards Database Scalability Business Owner Knowledge Experience Maintenance HBO Password Manager Bloatware Start Menu Smart Tech Multi-Factor Security NarrowBand Wiring Cache Data loss Manufacturing Search PowerPoint Leadership Windows Media Player IaaS iPhone Music Safe Mode User Tablets Outlook Business Mangement Entrepreneur Tools Practices Trending People GDPR Security Cameras Wireless Internet Screen Mirroring Amazon Biometric Security How to Loyalty Files Troubleshooting Shortcut File Sharing Managing Stress Frequently Asked Questions Recycling Cost Management Hosted Computing Windows 10s Mobile Office Chromecast Camera Smartwatch Social Networking Wire Cast Amazon Web Services Cameras 5G webinar Colocation Books Uninterrupted Power Supply Business Technology Tip of the week Criminal Inventory Public Cloud Employer Employee Relationship Warranty Monitor Employee Smart Office Online Shopping OLED Assessment Conferencing Emergency Memory Windows Server 2008 Administrator Travel Specifications Going Green Running Cable Reputation Virtual Desktop Streaming Media Evernote Printer Server Cabling Television Content Tech Support Microchip Authentication Audit Millennials Techology Laptop Customers Science Wireless Charging Default App Public Computer Audiobook Search Engine Nanotechnology Computer Fan Workforce Google Search Rootkit Touchpad Customer Relationship Management HVAC Cables IT Infrastructure Flash Politics Workers Advertising Transportation Analyitcs SharePoint Bing Programming FENG Telecommuting Net Neutrality Vendor Management Investment IBM Distributed Denial of Service Customer Service Notifications Enterprise Content Management Cortana Sync Digital Signature Benefits MSP Help Desk Devices Consultant Remote Work ISP ROI Supercomputer Relocation Password Management Windows 8 Software Tips Google Apps Analytics Accountants Emails Smart Technology IT service Antivirus Shortcuts Thought Leadership Best Available Cryptomining Video Games Windows Server 2008 R2 Worker Commute Current Events NIST WIndows 7 Tablet

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...