The field of computer science and engineering concerned with creating robots, devices that can move and react to sensory input. Robotics is one branch of artificial intelligence.
Robots are now widely used in factories to perform high-precision jobs such as welding and riveting. They are also used in special situations that would be dangerous for humans — for example, in cleaning toxic wastes or defusing bombs.
Although great advances have been made in the field of robotics during the last decade, robots are still not very useful in everyday life, as they are too clumsy to perform ordinary household chores.
Robot was coined by Czech playwright Karl Capek in his play R.U.R (Rossum’s Universal Robots), which opened in Prague in 1921. Robota is the Czech word for forced labor.
The term robotics was introduced by writer Isaac Asimov. In his science fiction book I, Robot,published in 1950, he presented three laws of robotics:
1. A robot may not injure a human being, or, through inaction, allow a human being to come to harm.
2. A robot must obey the orders given it by human beings except where such orders would conflict with the First Law.
3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.
(adj.) When used to describe software or computer systems, robust can describe one or more of several qualities: a system that does not break down easily or is not wholly affected by a single application failure a system that either recovers quickly from or holds up well under exceptional circumstances a system that is not […]
- rogue access point
A rogue access point, also called rogue AP, is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network, and is not under the management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies, and additionally can allow […]
- rogue antivirus software
Also called smitfraud, scareware, or rogue security software, this type of software is defined as malware – it is designed specifically to damage or disrupt a computer system. In this case, not only is the software going to disrupt your system, it’s going to try and trick you into making a purchase using your credit […]
- rogue certification authority certificate
A false digital certificate used to secure Web sites. A rogue Certification Authority (CA) certificate allows malicious users to impersonate any Web site on the Internet, including banking and e-commerce sites secured using the HTTPS protocol. A rogue CA certificate would be seen as trusted by Web browsers, and it is harmful because it can […]
- rogue peer
A rogue peer is an end-user computer-usually a laptop-that has both bridging and wireless enabled. Since the basic functions of an access point are bridging and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The vulnerability with a rogue peer can be much more severe than with a rogue […]