Feeds

Koreans create dancing droid

Who says white bots can't dance?

Business security measures using SSL

Korean boffins have created a robot that can, they claim, can dance. 'Your plastic pal who's fun to be with' here at last, we wonder.

Dance Away

Mahru: play that funky music, white-bot
Image courtest Daily Chosun

The mechanical man's called Mahru, and it can wave its arms around while trundling around on two legs. Apparently, it does this to the tune Tell Me by the Korean popular beat combo the Wonder Girls.

How well it can strut its funky stuff remains to be seen - Mahru will get its first public outing at the Robot World 2008 show that kicks of in Seoul on Thursday.

Dance Away

Stayin' alive

Mahru was made by a team at the Korea Institute of Science and Technology. Team leader You Bum-jae claimed the droid was designed to manual labour. Boogieing on down might not sound like the kind of tasks humans need help with, but You said a robot's ability to move all of its limbs separately and simultaneously was a major step forward in creating a work 'bot.

Not that You's creation is the first to do so: Honda's Asimo holds that honour, he admitted.

Video Report: Honda unleashes stair-climbing robot

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.