You might like my new startup, then: https://safebots.ai
I spent way too much time on actually building this — with Claude and double checking everything — so an article I publish can be OK to push out. We aren’t building a bridge for thousands of cars here, it’s an article.
A lot of things are automated and 95% of the time they are correct. The key is knowing whether the last mile is worth fixing, if the consequences are minor.
I read through your presentation but I still feel pretty confused about what ur startup does. Could you explain it?
The purpose is to try to catch a sliver of all that fun money flying around in the current VC money.
I wanna give him a shot at explaining it
Shimman is wrong. The goal is much bigger, and almost the opposite of what he thinks. It's trying to solve the problem of people chasing "slivers" of money and selling out, which happened in Web2 and Web3: https://safebots.ai/singularity.pdf
What the startup does is make a verifiably trusted, zero-configuration, turnkey environment for businesses to move their data into and run AI workloads on, without worrying about their data being stolen, or some Agents doing unpredictable things. The environment is super-secured, with no ssh. It's an appliance, with over-the-air M of N updates. Think more "Tesla car" and less "OpenClaw". That's the foundation.
That environment then builds everything around a graph database, for people, organizations, and even code. We have Grokers that can ingest a codebase statically once, and then present the graph databases as a far better "RAG" than cosine similarity and pinecone vector databases.
At its most basic level: Agents can't be trusted. We want predictable Workflows, not agents. They can do 99% of everything Agents can, if done properly, and the remaining 1% are the dangerous parts https://safebots.ai/agents.html
It's a lot of innovations at once, including:
Collaborative Bots that are safer than agents.
Workflows and tools that can read, reason and propose actions.
Policies that must be satisfied before actions can be taken.
Logging of everything. Verifiable security and audits for SOC2 compliance etc. etc.
Everything is configurable and designed for serious businesses, not a grandma that finished a Chinese course on how to install OpenClaw on her terminal and not get pwned