Feeds

Google encourages 10 teams to rocket to the moon

Lunar X Prize joined by Jesus, a penguin and some miners

Providing a secure and efficient Helpdesk

Google and the X Prize Foundation held a ceremony today for the first ten contestants to enter their $30m race to land a privately funded space craft on the Moon.

Eight new teams have joined the previous two entrants, who all gathered at the Googleplex in Mountain View, California to preview their intentions for the purse.

The firms have until the end of 2012 to land an unmanned machine on the lunar surface and successfully send it roving for at least 500 meters. The winning team will receive a $20m grand prize for their effort. That's potentially a fraction of the cost it will take to land a machine there — although some entrants claim they can make it with a budget less than the grand prize.

Second prize is $5m for a team that successfully lands their craft, but cannot make it travel over 500 meters. An additional $5m will be awarded if the rover can go over 5,000 meters.

Google co-founder Sergey Brin said the company decided to put its funds toward the competition after a regular corporate brain storming session.

Brin's curiosity about the the cost to land a craft on the moon left him shocked about its bargain value (in the eyes of a man who lands his jet in a private NASA runway usually reserved for presidential visits, of course).

"This aspect of discovery is being ignored despite its relatively low cost," said Brin.

Sergey Brin: A man who can afford not to wear a suit

The X Prize Foundation aims to spur technological development in space the same way a cash prize tempted Charles Lindbergh to cross the Atlantic by aircraft in 1927. After that, your bevy of Amelia Earharts are bound to follow.

Yet this is a program nurtured and raised in Silicon Valley, and therefore lacks a reasonable amount of shame. That's why we see "Moon 2.0" slogans plastered around for this competition. That's right, "Moon 2.0." Love it, kiss it, rub it all over your naked body.

No, really

Let's meet the contestants.

Internet Security Threat Report 2014

Next page: Odyssey Moon

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
SECRET U.S. 'SPACE WARPLANE' set to return from SPY MISSION
Robot minishuttle X-37B returns after almost 2 years in orbit
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
You can crunch it all you like, but the answer is NOT always in the data
Hear that, 'data journalists'? Our analytics prof holds forth
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.