Feeds

Star Wars exec: These ARE THE DROIDS I was LOOKING FOR

UK crew chosen to build R2-D2 for new film

High performance access to file storage

The next Star Wars movie will see the return of droid favourite R2-D2, who will be built for the film by two Brit fans who are in a Star Wars robot-building club.

JJ Abrams, Lee Towersey, Oliver Steeples, Kathleen Kennedy and R2-D2

JJ Abrams, Lee Towersey, Oliver Steeples, Kathleen Kennedy and R2-D2 behind the scenes at Pinewood

According to the official blog, Lucasfilm president Kathleen Kennedy saw the R2-D2 Builders Club area at a Celebration Europe event in Germany this summer, where she met Oliver Steeples and Lee Towersey, members of the worldwide group.

Kennedy and film director JJ Abrams were so impressed with the robotic fans' fully functioning, film-accurate astromech droids that they recruited them to work on the effects team for the new movie.

"[Kennedy] posed for pictures with us, looked at all the droids we’d built and was very complimentary," Steeples said. "I mentioned that the R2-D2 Builders in the UK were available if required, as a semi-joke. When I was contacted to work on the film by [executive producer] Jason McGatlin, it was on her recommendation."

The pair already know how to build a droid and keep it working, but they're hoping they can improve on the mechanics of their existing robots for the film.

“We’re currently in a research and design phase where we’re looking at drive options for reliability on all possible terrains, whether it be a one-motor-does-all, or a system which is easily adjusted depending on terrain," Towersey explained. "We have a few mocked up ideas which we hope to road test very soon.”

Steeples, who's from Berkshire and Towersey, based in Middlesex, are now working full-time on the film at Pinewood Studios. It's not the first time their faithful reproductions of droids have gotten them into showbiz, both men worked on Star Wars-themed ads for Currys as well. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.