Feeds

At the Toyshop of Doom

DSEi - toys for the homicidal boy

  • alert
  • submit to reddit

High performance access to file storage

Pictures Today sees the opening of DSEi, the UK's biggest weapons and kill-tech trade show. The whole ExCel centre in the Docklands is full of exhibitors showing off their guns and gadgetry. The place is packed with generals and admirals looking to snap up the latest must-have piece of kit.


You like guns? We have many. Also, portable compression chambers in case you get the bends.

Lots of people, needless to say, reckon that making stuff for fighting and killing with is just plain wrong: and indeed Reed, the operators of DSEi, are looking to sell the show off to someone. But they say that's just because it doesn't really fit with their core business, not because it involves nasty yucky guns and stuff.


Suits you, sir. Go on, feel it. Feel it, sir. And robots? But of course, sir.

Here on the Reg killer-robot desk, we take a more nuanced view of death tech.

We're against scattering cluster bomblet submunitions in school playgrounds as much as the next chap. We don't like paying triple price for kit that arrives late and doesn't work any more than any other taxpayers. Often we wonder whether we actually need a lot of the shiny exploding stuff the government buys on our behalf - the more so at a time when it pays combat soldiers about half what it does a fireman. We're not happy with how things are in Iraq, either. But we thought the Falklands was adequately righteous; and Afghanistan, Sierra Leone, Timor, Gulf War I etc.


How about a stealth corvette? Scandinavian quality. And HUDs - not just for fighter pilots any more.

And, shamefully no doubt, we like a really big explosion - along with plenty of other action-movie fanciers. We like hardware that does cool things. Not to put too fine a point on it, some of us quite like guns. And we especially like digital gadgets - even if we sometimes doubt their usefulness. (Well, this is the Reg.) Digital gadgets attached to guns? Even better.


Bighorn - for when a small horn just won't do. And you know you want one of these wing things (article to follow).

So we're actually pretty chuffed to be at DSEi, and we'll be bringing you lots of military gadget coverage over the next few days. As a taster, here are a few snaps from around the halls. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.