SlideShare a Scribd company logo
Good Robot Bad Robot
What do you think?
Asimov’s Laws
A robot may not injure a human being
or, through inaction, allow a human
being to come to harm.
A robot must obey the orders given to it
by human beings, except where such
orders would conflict with the First Law.
A robot must protect its own existence
as long as such protection does not
conflict with the First or Second Law.
Good robot bad robot
Good robot bad robot

More Related Content

More from James Governor

Sympathy for the DevRel
Sympathy for the DevRelSympathy for the DevRel
Sympathy for the DevRel
James Governor
 
A Tale of Two ITs. Tech, Power, Responsibility
A Tale of Two ITs. Tech, Power, ResponsibilityA Tale of Two ITs. Tech, Power, Responsibility
A Tale of Two ITs. Tech, Power, Responsibility
James Governor
 
Progressive delivery at DevOps World
Progressive delivery at DevOps WorldProgressive delivery at DevOps World
Progressive delivery at DevOps World
James Governor
 
Progressive Delivery at Spring One Platform
Progressive Delivery at Spring One PlatformProgressive Delivery at Spring One Platform
Progressive Delivery at Spring One Platform
James Governor
 
The Quickening at Futurestack 2018
The Quickening at Futurestack 2018The Quickening at Futurestack 2018
The Quickening at Futurestack 2018
James Governor
 
Future Platforms
Future PlatformsFuture Platforms
Future Platforms
James Governor
 
Logging and machine data at Scale. re:Invent 2017
Logging and machine data at Scale. re:Invent 2017Logging and machine data at Scale. re:Invent 2017
Logging and machine data at Scale. re:Invent 2017
James Governor
 
Convenience is the killer app
Convenience is the killer appConvenience is the killer app
Convenience is the killer app
James Governor
 
Convenience is the killer app
Convenience is the killer appConvenience is the killer app
Convenience is the killer app
James Governor
 
Data transformation is the new digital transformation
Data transformation is the new digital transformationData transformation is the new digital transformation
Data transformation is the new digital transformation
James Governor
 
Space cluster disrupt for red hat
Space cluster disrupt for red hatSpace cluster disrupt for red hat
Space cluster disrupt for red hat
James Governor
 
Disruptors and trends in app dev test industry
Disruptors and trends in app dev test industry Disruptors and trends in app dev test industry
Disruptors and trends in app dev test industry
James Governor
 
Space cluster disrupt, Open Innovation labs
Space cluster disrupt, Open Innovation labsSpace cluster disrupt, Open Innovation labs
Space cluster disrupt, Open Innovation labs
James Governor
 
Devops market opportunity
Devops market opportunity Devops market opportunity
Devops market opportunity
James Governor
 
Test 2020 HPE Discover 2016
Test 2020 HPE Discover 2016Test 2020 HPE Discover 2016
Test 2020 HPE Discover 2016
James Governor
 
Hacking the robots
Hacking the robotsHacking the robots
Hacking the robots
James Governor
 
Java for Cloud Natives at JAX London 2016
Java for Cloud Natives at JAX London 2016Java for Cloud Natives at JAX London 2016
Java for Cloud Natives at JAX London 2016
James Governor
 
Test 2020 hpe discover 2016
Test 2020 hpe discover 2016Test 2020 hpe discover 2016
Test 2020 hpe discover 2016
James Governor
 
Dreamforce 2015 microservices
Dreamforce 2015 microservicesDreamforce 2015 microservices
Dreamforce 2015 microservices
James Governor
 
Dev ops and paas at hp discover 2015
Dev ops and paas at hp discover 2015Dev ops and paas at hp discover 2015
Dev ops and paas at hp discover 2015
James Governor
 

More from James Governor (20)

Sympathy for the DevRel
Sympathy for the DevRelSympathy for the DevRel
Sympathy for the DevRel
 
A Tale of Two ITs. Tech, Power, Responsibility
A Tale of Two ITs. Tech, Power, ResponsibilityA Tale of Two ITs. Tech, Power, Responsibility
A Tale of Two ITs. Tech, Power, Responsibility
 
Progressive delivery at DevOps World
Progressive delivery at DevOps WorldProgressive delivery at DevOps World
Progressive delivery at DevOps World
 
Progressive Delivery at Spring One Platform
Progressive Delivery at Spring One PlatformProgressive Delivery at Spring One Platform
Progressive Delivery at Spring One Platform
 
The Quickening at Futurestack 2018
The Quickening at Futurestack 2018The Quickening at Futurestack 2018
The Quickening at Futurestack 2018
 
Future Platforms
Future PlatformsFuture Platforms
Future Platforms
 
Logging and machine data at Scale. re:Invent 2017
Logging and machine data at Scale. re:Invent 2017Logging and machine data at Scale. re:Invent 2017
Logging and machine data at Scale. re:Invent 2017
 
Convenience is the killer app
Convenience is the killer appConvenience is the killer app
Convenience is the killer app
 
Convenience is the killer app
Convenience is the killer appConvenience is the killer app
Convenience is the killer app
 
Data transformation is the new digital transformation
Data transformation is the new digital transformationData transformation is the new digital transformation
Data transformation is the new digital transformation
 
Space cluster disrupt for red hat
Space cluster disrupt for red hatSpace cluster disrupt for red hat
Space cluster disrupt for red hat
 
Disruptors and trends in app dev test industry
Disruptors and trends in app dev test industry Disruptors and trends in app dev test industry
Disruptors and trends in app dev test industry
 
Space cluster disrupt, Open Innovation labs
Space cluster disrupt, Open Innovation labsSpace cluster disrupt, Open Innovation labs
Space cluster disrupt, Open Innovation labs
 
Devops market opportunity
Devops market opportunity Devops market opportunity
Devops market opportunity
 
Test 2020 HPE Discover 2016
Test 2020 HPE Discover 2016Test 2020 HPE Discover 2016
Test 2020 HPE Discover 2016
 
Hacking the robots
Hacking the robotsHacking the robots
Hacking the robots
 
Java for Cloud Natives at JAX London 2016
Java for Cloud Natives at JAX London 2016Java for Cloud Natives at JAX London 2016
Java for Cloud Natives at JAX London 2016
 
Test 2020 hpe discover 2016
Test 2020 hpe discover 2016Test 2020 hpe discover 2016
Test 2020 hpe discover 2016
 
Dreamforce 2015 microservices
Dreamforce 2015 microservicesDreamforce 2015 microservices
Dreamforce 2015 microservices
 
Dev ops and paas at hp discover 2015
Dev ops and paas at hp discover 2015Dev ops and paas at hp discover 2015
Dev ops and paas at hp discover 2015
 

Recently uploaded

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Good robot bad robot

  • 1. Good Robot Bad Robot What do you think?
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Asimov’s Laws A robot may not injure a human being or, through inaction, allow a human being to come to harm. A robot must obey the orders given to it by human beings, except where such orders would conflict with the First Law. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.