Feeds

Send in the clowns robots

Rising from the swamp of futility

Internet Security Threat Report 2014

RoboBiz Our trip last week to the Robo Business conference in Pittsburgh confirmed one thing - the vast majority of robotics companies are in search of federal pork. About 80 per cent of the systems on display were small, autonomous vehicles capable of scouting missions, disarming bombs or carrying material.

In this photo retrospective of the event, we'll bring you plenty of military gear, but we're going to start off with the weird, the cool and the useless.

If you missed the stories from last week, have a gander here. Now, on to the photos.

Our first robot is either the weirdest or the most sexually-charged device on display. It comes from Yost Engineering - a small custom hardware and software shop in Ohio. The company was started by a professor who found it tough to pursue projects in a university environment where publishing and not producing was favored.

Shot of a strange Yost contraption that resembles a sex toy

With a straight face, the Yost folks explained that this device could one day be used as a type of robotic octopus arm. It has a number of hinges and can bend in a variety of ways. It also has a camera and light attached to the tip, er, top.

We asked if it had a name and just got a laugh. You can see why.

Shot of the Yost device getting bent

Yost also makes this artificial intelligence oddity. The freak in the hockey mask blinked and opened its mouth, as it tried to answer questions posed by Robo Business attendees. Yost has developed some manner of natural language system that lets the robot learn over time. It seemed to work okay.

Yost's hockey mask robot

If you have $450,000 to spare and illegal aliens in the neighborhood are really getting you down, then have a gander at this baby from Skeyes Unlimited.

Yes, the world of aerial surveillance has really opened up with systems like these that take the "hard" out of hardcore snooping. This unmanned chopper can cruise about 60 miles roundtrip on a single tank of gas and deliver "real-time 3D aerial mapping." We're told that the unit can be used for border patrol or by companies that want to monitor, say, a pipeline and make sure no one is messing with their tube.

Photo of a surveillance helicopter

The FAA has fired up some experiments to determine just how safe these autonomous paparazzi really are. "The lack of FAA clearance is one of the barriers for commercial use right now," a Skeyes spokesman said.

No kiddin.

Don't want to go whole hog and buy the mini-copter? No problem. You can walk around with this surveillance system on a stick.

We're thinking a collection is in order to get one of these for Dvorak.

On we go.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.