Feeds

NASA extends olive branch to robots for moon mission

Can't we all just get along?

High performance access to file storage

Robo Developer NASA intends to get more touchy-feely with robots before they take off for the moon again.

Their attempts to reach out to the robot community really took off in the last few years when NASA changed its exploration focus from the international space station to returning to the moon. They even made an dramatic Hollywood-like "preview" of the mission to prove it. (And if you want to show something is real, Hollywood is definitely the way to go.)

"You probably noticed the majority of the footage is CG," said Terry Fong, a NASA Director speaking yesterday at the Robo Development conference in San Jose. "I guarantee in 10 to 15 years that this can be replaced with real footage."

Unlike the previous Apollo moon missions, NASA will be investing heavily in robotics this time round. And so, NASA developed the Human-Robotics Systems Project which, Fong said. is one of its most heavily funded programs in 10 years.

The main themes of the Human Robotics System program are surface mobility, surface handling, and interestingly, human-systems interactions.

Some are more equal than others

The relations between humans and their robot counterparts are of great importance to NASA. For instance, there's no "side of the road" to threaten to pull a rocket over to if the bots are getting rambunctious. But it goes deeper than that.

"In a traditional interaction, a human is the user and the robot is a tool," said Fong. "This works great for some things, but not for others. We are trying to make humans and robots have more equal roles."

Sounds like dangerous talk. Those who lie down with robots wake up with critical errors.

"When robots run into trouble, they don't ask for help or seek advice. That's something they need to do," said Fong. "Robots will need to overcome these limitations. Robots and humans need to support each other."

Fong believes that for successful space exploration, robots and humans need to function as partners. Robots need to understand how humans work as a team, and humans need to be comfortable functioning with them.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.