Feeds

Living with robots: The $3.5m DARPA Urban Challenge

The race is on

Top three mobile application threats

12:25 Boo-yah! It had to happen. Robots have collided. MIT and Cornell have crashed. You can't count on those high-priced East Coast schools.

The vehicles rubbed front bumpers before the safety drivers behind them could stop them with their remote shutoff devices. Now they're parked, and the teams are going over the systems to see if they can go back into the field. If the front sensors have been damaged, they'll struggle to return.

Check that. Just after I finished the last sentence, Cornell set out again. MIT is still running checks.

In all honesty, these eventful moments are welcomed by the observers. This thing is all about waiting and watching cars go around and around the course.

Stunt driver waiting and waiting

Stunt Man Waiting

And, just after I finished the last sentence, MIT started up again as well.

2:45 p.m. Well after a whole lot of very little, three vehicles made it to the finish line. Stanford once again beat out Carnegie Mellon, and Virginia Tech came next.

Unlike the previous races, however, this was not just a contest based on speed. So, we won't know the real winner until DARPA has used its secret formula that combines speed points with deductions for traffic penalties. The organization will probably announce the finalist tomorrow.

Meanwhile, three vehicles continue on the course.

Sunday 9:03 a.m. Sorry for the delay. I lost all access to a network connection. Ultimately six teams finished the race with Cornell, MIT and a team from University of Pennsylvania coming in later.

The winner will be announced shortly.®

Bootnote

You'll be able to watch the event live here.

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

3 Big data security analytics techniques

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.