Feeds

Carnegie Mellon wins the robotic Urban Challenge

Stanford relegated to second

Bridging the IT gap between rising business demands and ageing tools

DARPA used various criteria to determine the winner, looking at how quickly the robots completed the course and how many traffic violations they endured. The organization collected this data from the vehicles and by watching the robots from the sky with an airplane. That plane sent back video with up to .5m resolution of the event, allowing officials to replay incidents in slow motion as needed to determine who was at fault.

Still, some of the criteria seemed iffy. For example, vehicles were punished if they were caught in traffic caused by another vehicle, since that would replicate real life circumstances. We saw Stanford's car Junior suffer as Cornell delayed for 10 to 20 minutes.

Shot of bartender holding Chelada drink

Weird Victorville drink called Chelada. Beer and Clamato - Ew.

DARPA officials revealed the winners during a ceremony today here in Victorville, California - a small town outside of Los Angeles.

Will there be another Grand Challenge? Maybe not. The government has taken away DARPA's ability to offer cash prizes for these types of events without federal approval.

"I don't know why they did it, but they did it," DARPA Director Anthony Tether said. "I don't have the authority to say, 'Yes'.

"We never really finish anything (at DARPA). We just show that it can be done. We take the excuse off the table. I think we are close to that point. "

Red Whittaker has called for something like a 24-hour race that force the vehicles to deal with different terrains, weather and day/night conditions.

According to Thrun, these events prove crucial to US technology development. They help encourage youngsters' interest in robotics.

"We are going to build a whole new student force for the next thirty years to come." ®

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

Mobile application security vulnerability report

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.