With increasing connectivity of computer workstations, mobile devices, information systems, and laboratory instruments, the attack surface for hackers is growing
Matthew Gombolay, PhD, discusses the hopes and fears of a successful robotic implementation and advises readers on scenarios where such a change will most likely be successful