recommended reading

The Future of Robotics Is Soft and Squishy

One of DARPA's soft robots, made with silicone

One of DARPA's soft robots, made with silicone // DARPA

Soft robotics is ready to enter the spotlight. These robots are built with soft materials like silicone and powered by the flow of fluids. This allows for unique kinds of movement, with the automatons often taking locomotive cues from the animal kingdom. As recently as 2010, when the video below was made, soft robots weren’t considered a field of study in their own right. But this month, a peer-reviewed journal, Soft Robotics, was launched just for them:

These robots have unique applications: Unlike a hard robot, a soft one can run into a human or animal (or wall) without causing much harm to either party. Their flexibility also makes them adept at tasks in tight, irregular spaces like the rubble of a collapsed building or an unexplored cave. For robots that move by creeping and crawling, hitting surfaces can actually be a good thing: It gives them purchase to move around the environment.

Research is going swimmingly so far. M. Scott Brauer

In one of SoRo’s first papers, MIT researchers report on the soft robotic fish they’ve developed. Because the fish can bend continuously—it has no joints and is controlled by the flow of carbon dioxide pumped through channels in its tail—it can achieve a range of motion that would be impossible for a hard robot, researchers said. The current model can perform about 20 or 30 maneuvers before running out of gas. But the next version will pump water into its channels, allowing it to operate for about 30 minutes continuously.

The fish is just a proof of concept, and probably won’t be going deep-sea diving any time soon. But researchers imagine that it might be deployed with schools of real fish to observe their behavior. And more soft robots are on the horizon. A Boston-based startup is working to replace surgical robots with softer, safer alternatives that won’t risk tearing your organs. And researchers working under DARPA’s Maximum Mobility and Manipulation initiative, which aims to develop nimbler robots for military use, have turned to soft robotics, too:

Reprinted with permission from Quartz. The original story can be found here

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.