Feeds

Sword-wielding robot smites by Wii Remote

Fly-by-Wii

Security for virtualized datacentres

Someone has adapted an industrial robot to allow it to be controlled using the remote controller that ships with Nintendo's Wii games console. A neat example of Wii Remote hackery, to be sure, but what'll happen when the robot gets to hold its own controller?

The guys at the USB Mechatronics website used the robot, a Kuka KR16, to wield a sword, linking the mechanical arm to a laptop capable of reading the signals sent out by the Wii Remote. Software running on the notebook converts the input to KR16 control codes, effectively duplicating the Remote's movements as robotic sword thrusts, strokes and parries.

wiimote-controlled robot parries - image courtesy usb mechatronics

The team also got the robot swinging a tennis racket.

But think about the possibilities for recursion are, well, endless... what if the robot has a Wii Remote in its metal mitts? Playing a Wii game by controlling a WiiMote-wielding robot would make for an interesting test of the code's responsiveness. Or how about using a Wii Remote to control a robot to control a robot to control a robot to control...

wiimote-controlled robot plays tennis - image courtesy usb mechatronics

Scary stuff, particularly if a hundred of the things, mounted on caterpillar tracks, come speeding toward you over the sand dunes all in a line and waving scimitars in unison. Please notify 2000AD, the ABC Warriors have arrived...

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.