Feeds

Living with robots: The $3.5m DARPA Urban Challenge

The race is on

Internet Security Threat Report 2014

9:05 a.m.

All 11 teams got away successfully and have performed well throughout the first hour of the course.

Seeing these vehicles live proves remarkable even for a cynic like me. Some of the vehicles have been tearing down the road and negotiating sharp turns with ease. They've also met head-to-head on the track and passed the tests.

Even more, the cars know when they're able to pass another car. They also know how to advance in order at a four-way stop with indicators on and all.

Shot of the giant TerraMax

Giant TerraMax from afar

I shocked at how accepting the observers are of the technology. The massive TerraMax system has come ripping by corners a couple of times with only a fence and a wee barricade separating it from the people yet no one even seems to flinch.

TerraMax coming right for me

It's coming right for us

There have been a couple moments when the cars struggled with a lane change and started heading toward barriers. But all of the vehicles so far have managed to assess the situation after some time and continue moving.

MIT's vehicle aimed at competitors

MIT vs. Man

Gear heads out there might be interested to know that the MIT team has a full on server cluster inside its machine. It requires a massive air conditioning unit to keep the hardware cool.

9:35 a.m. About 15 minutes after the last post, some of the vehicles started to struggle. One went off road. TerraMax almost took out a building pillar.

And now we're hearing that three of the vehicles have been booted from the race. Team AnnieWay from Germany is done. We're waiting to hear on the other two.

9:44 Ouch. TerraMax was one of the booted teams. It's the crowd favorite and the most unique looking vehicle in this year's competition. It's also DARPA's favorite, since OshKosh - the maker's of the vehicle - have used a military rig for their design. A larger version of TerraMax was also one of five to complete the 2005 race. Disappointment all around.

The Honeywell/IVS bot is out as well.

Three of the defeated vehicles in a row

The pain of defeat

11:12 a.m. Five vehicles have been kicked off the course now, and six have all completed mission one. TeamUCF and CarOLO - another German team - are the ones sent off.

Now let's have a closer look at some of the remaining vehicles in action.

Beginner's guide to SSL certificates

Next page: 11:22

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.