Feeds

Robo Development Conference in pictures

Know thy roboenemy

Intelligent flash storage arrays

Robo Developer Robots. Sure, they're evil, but are they a threat to us yet?

The Register takes a look at the show floor of Robo Developer Conference in San Jose to see how the coming war with machines may play out.

Monty the robot

Our first stop is a robot named Monty, from Anybots. He stands at about 5'7" and has one fully articulated hand, driven by 18 motors and one gripper. Monty is remotely controlled by a man behind a curtain, who is wearing various sensors that let Monty mimic his movements. According to Anybots, Monty can perform a wide range of manual labor tasks. For instance, his publicity shot shows Monty washing dishes — which I would assume is a fantastic way to electrocute yourself and loved ones.

And would you trust a filthy robot with The Heirloom China?

Would you?

Dexter the robot

Anybots also has a walking automaton named Dexter. This robot quickly showed its true sinister nature by repeatedly spasming violently before it pitched headfirst into the crowd. Those bungee cords are not for show.

I was told by several vendors that getting a robot to walk is one of the hardest things to do. This doesn't come as a surprise. The constant chatter on the show floor was regularly accented by the dull "thump" of robots hitting the floor. Take any robot demonstration — what so often is just beyond the frame of sight is two engineers, poised nervously at the sidelines like ball retrievers at a tennis tournament.

Remote control for virtualized desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.