Feeds

iRobot buys underwater minisub-droid firm

Roomba maker to clean up on sea floor

High performance access to file storage

iRobot Corp, famed as the manufacturer of the "Roomba" autonomous floor-cleaner, has bought underwater robot maker Nekton Research - suppliers of droid submarines to the US military.

“We believe that the underwater market is the next frontier for robots,” said Helen Greiner, iRobot co-founder.

“This acquisition positions us for leadership in robot solutions on both the land and sea.”

iRobot has already made substantial sales of ground-crawling machine warriors such as the PackBot to the US armed forces, in addition to its civil products. The company has also recently licenced US government-funded "Seaglider" technology from the University of Washington.

“Nekton’s Ranger will be a strong complement to the Seaglider we have licensed from the University of Washington," said Joe Dyer, chief of industrial and gov gear at iRobot.

"With these two unmanned underwater vehicles (UUVs) we will be better positioned to meet the needs of our customers.”

iRobot will pay $10m for Nekton, plus a further $5m conditional on "achievement of certain business and financial milestones". It's expected that Nekton will bring in revenues of $6m to $8m in 2008 from its existing customers. These include the Office of Naval Research, US Special Operations Command and the renowned Pentagon wingnut-boffinry arm, DARPA.

It's planned that iRobot will provide cash and support necessary for Nekton to produce a new and more capable version of its existing "Ranger" robo-minisub.

“We are extremely happy to be joining the iRobot team," said Rick Vosburgh, former Nekton president and now iRobot Executive Director, Maritime Systems.

“We expect to be offering a next-generation Ranger by late 2009, which would not have been possible without iRobot.”

There are already large numbers of underwater remotely-operated vehicles. However, these typically use a cable link to human operators on the surface, as wireless high-bandwidth comms through water are extremely difficult to achieve. There are a few machines which can carry out simple tasks independently under water - such as the Talisman from BAE Systems - but iRobot are probably right to say that there's still room left in the subsea droid market. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.