Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Beware, the robot is teleoperated (Score 2, Interesting) 93

The robot is being teleoperated in those videos.

Certainly that's the case. I think the intention of this project is to create a platform for future research.

By making it open-source (and hopefully affordable), it has better chances of being accepted as a standard benchmark for the next generation of embodied AI (which, as its name implies, isn't here yet). Think about it as the physics engine, not the game itself...

Having said that, let's embark on the more interesting discussion of what are the prospects of a robot successfully roaming around our homes. I claim that cleaning is achievable with present-day technology, but more lively interaction with us (humans) around is still far away...

Your thoughts, AC?

Microsoft

Submission + - VMware attacks Microsoft?

An anonymous reader writes: On Monday VMWare will release a white paper detailing its concerns with license changes on Microsoft software that may limit the ability to move virtual-machine software around data centers to automate the management of computing work. This was reported by Steve Lohr of the New York Times in an article published on February 24, 2007. Two choice quotes: "Microsoft is looking for any way it can to gain the upper hand," said Diane Greene, the president of VMware. ... "This seems to be a far more subtle, informed and polished form of competitive aggression than we've seen from Microsoft in the past," said Andrew I. Gavil, a law professor at Howard University. "And Microsoft has no obligation to facilitate a competitor."
Windows

Journal Journal: Microsoft's Real Plan?

What's Microsoft's real plan? With the advent of .Net, the Microsoft/Novell deal, the splitting of Microsoft into three major groups internally, and the impossibility of Windows being developed the same way that Vista was for the the generation of Windows it becomes quite possible that Windows as we know it - with an NT Kernel and all - is no longer the future of Windows. Just how might Microsoft surive? Check out my full blog describing
Security

Tor Open To Attack 109

An anonymous reader writes "A group of researchers have written a paper that lays out an attack against Tor (PDF) in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential avenue of attack is that Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network."

Slashdot Top Deals

Time-sharing is the junk-mail part of the computer business. -- H.R.J. Grosch (attributed)

Working...