Feeds

Living with robots: The $3.5m DARPA Urban Challenge

The race is on

High performance access to file storage

12:25 Boo-yah! It had to happen. Robots have collided. MIT and Cornell have crashed. You can't count on those high-priced East Coast schools.

The vehicles rubbed front bumpers before the safety drivers behind them could stop them with their remote shutoff devices. Now they're parked, and the teams are going over the systems to see if they can go back into the field. If the front sensors have been damaged, they'll struggle to return.

Check that. Just after I finished the last sentence, Cornell set out again. MIT is still running checks.

In all honesty, these eventful moments are welcomed by the observers. This thing is all about waiting and watching cars go around and around the course.

Stunt driver waiting and waiting

Stunt Man Waiting

And, just after I finished the last sentence, MIT started up again as well.

2:45 p.m. Well after a whole lot of very little, three vehicles made it to the finish line. Stanford once again beat out Carnegie Mellon, and Virginia Tech came next.

Unlike the previous races, however, this was not just a contest based on speed. So, we won't know the real winner until DARPA has used its secret formula that combines speed points with deductions for traffic penalties. The organization will probably announce the finalist tomorrow.

Meanwhile, three vehicles continue on the course.

Sunday 9:03 a.m. Sorry for the delay. I lost all access to a network connection. Ultimately six teams finished the race with Cornell, MIT and a team from University of Pennsylvania coming in later.

The winner will be announced shortly.®

Bootnote

You'll be able to watch the event live here.

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.