Feeds

Qinetiq rolls out 'third party' SDK for killer robot lines

Droid-legion hax0r warlords should get in on the beta

Boost IT visibility and business value

Killer robots are a bit like iPhones - tons of hype, but not that many units actually sold. Many people reckon that this is because these amazing, potentially multifunction devices' potential is not fully exploited. And that, of course, is because of the lack of a robust developer community.

Armed, yet human-controlled

At last, hardware that could run a real killer app.

Lord knows whether or not that's true for smartphones, but there are definitely some people who believe it is for war robots. For instance Qinetiq, everyone's favourite privatised-in-a-shower-of-gravy former UK gov tech bureau. As part of their transition into the private sector, Qinetiq found it necessary to buy up some profitable companies with US defence contracts, and one of these was Foster-Miller - maker of various well known combat droids.

Thus it is that yesterday saw Foster-Miller Qinetiq North America rolling out a third-party software development kit for the company's war-bots. The SDK is called "Symphony".

"There is no shortage of qualified companies and experts working on new robotics technologies that will change combat forever; the trick is getting those new solutions to the warfighter," said Qinetiq droid army supremo Dr Bill Ribich.

"Symphony is that last, critical piece of the open robotics puzzle that allows industry to develop what the customer needs and get it into the field faster than ever."

Apparently, Symphony is in beta test with "leading providers" both commercial and public-sector, and Symphony 1.0 is expected to go on general release to developers "later this year".

The SDK will allow third-party programmers to apply their skillz to the full panoply of Qinetiq battle machines. These include the fearsome MAARS, which packs a 7.62mm medium machine gun and quad-barrel grenade launcher; also the SWORDS, which has been trialled with even heavier ordnance including a tank-busting rocket launcher. That said, the majority of Qinetiq droids actually seeing field service have been relatively mundane bomb-disposal TALONs, typically packing nothing worse than a water disruptor*.

Recent claims by jihadi bullshitters that they had hacked SWORDS robots in Iraq to turn on their American overseers in a frenzied mechanical bloodbath were discounted. However, should Symphony perhaps turn up on the torrents, such stories will move from the obviously-untrue to the just-barely-possible sector.

You want IT angle? You came to the right shop today. ®

*Although a disruptor is potentially deadly against humans close up, it is single shot and short range.

Boost IT visibility and business value

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?