m (→Capabilities: added figures on how far it can travel and what an are) |
m (→Uses: made some small changes) |
||
(One intermediate revision by the same user not shown) | |||
Line 29: | Line 29: | ||
|- | |- | ||
| Mobility Range | | Mobility Range | ||
| style="font-style:normal; font-weight:normal;" | Approximately 2600 km | | style="font-style:normal; font-weight:normal;" | Approximately 2600 km<br>23.6 Hours at 110 kph | ||
|- | |||
| Flight Time | |||
| style="font-style:normal; font-weight:normal;" | Average of 34 days<br>Range of 24 Hours to 92 Days<br>Flight speed and maneuvering dependent | |||
|- | |- | ||
| Communication | | Communication | ||
Line 71: | Line 74: | ||
== Uses == | == Uses == | ||
Originally intended as an extension of personal communications/computing devices, acting as a | Originally intended as an extension of personal communications/computing devices, acting as a up to a [[Artificial Intelligence Classification System|Class 4 AI]] although normally have a simpler Class 1 but highly adaptive assistant, the devices have been used for a variety of additional purposes. It should be noted that legally speaking anything higher than a Class 2 AI requires compliance with the ALFRE Act. Installation of a higher grade AI requires device unlocking by the manufacturer and an agreement for compliance. Since the device's introduction in 2384, they have started to appear in private homes, being used as monitors/companions for small children and the elderly wishing to live independently. | ||
Industrial sectors have begun using them as automated security devices, stationing them at dangerous or sensitive areas to block entry and report potential risks. In the public sector, they have begun appearing in a similar role, blocking/reporting unauthorized access and assisting security forces in authenticating unknown individuals. As of mid-2386, they have also been seen monitoring hazardous areas for spikes in ionizing radiation or other potentially life-threatening conditions. | Industrial sectors have begun using them as automated security devices, stationing them at dangerous or sensitive areas to block entry and report potential risks. In the public sector, they have begun appearing in a similar role, blocking/reporting unauthorized access and assisting security forces in authenticating unknown individuals. As of mid-2386, they have also been seen monitoring hazardous areas for spikes in ionizing radiation or other potentially life-threatening conditions. |
Latest revision as of 21:30, 26 April 2024
The Sputnik Support Robot (SSR) is a general support and information robot produced by Excalibur Inc. as a personal service companion bot. The robot is designed to serve as a mobile data storage, communications, and general computer interface, as well as for industrial purposes such as detecting safety hazards and providing autonomous security and reporting. The device primarily uses holography for its primary output interface and voice commands for the primary input interface, although it can use other means.
Even though the official short designation of the devices is SSR, a different acronym has emerged colloquially—SPERO (pronounced s'piˌroː). This alternative name has largely replaced the official name in areas where the device is common. Each device attempts to respond to the correct person who says this name, but it is also common for owners or users to customize what they call the device.
- SPERO Pronunciation
Size | 44 mm Truncated Icosahedron |
Weight | 706.7 g |
Max Speed | 110 kph |
Standard Speed | 6 kph |
Power Source | Spatial Variance Reactor |
Propulsion | Antigravity with Thrusters |
Mobility Range | Approximately 2600 km 23.6 Hours at 110 kph |
Flight Time | Average of 34 days Range of 24 Hours to 92 Days Flight speed and maneuvering dependent |
Communication | Approximately 2 AU |
CPU | Encapsulated Computer Core |
Capabilities
The device can effectively scan a circular area approximately 39,761 km2 at holographic resolution 23 hours and 37 minutes operating at peek efficiency. Sensors have a combined / effective range of around 26 km in any given direction.
- Antigravity Propulsion
- Automatic Gyroscopic Stabilization
- Magnetic Containment Field
- A/V Recording & Transmission
- EM Detection from Far Infrared to Extreme Ultraviolet
- Audio Detection from 50 Hz to 150 Hz
- Signal differentiation as low as 0.00001 lux (Visual) and -20 dB (Audio)
- Conditions Monitoring
- Ionizing radiation detection
- Subspace anomaly detection
- Noxious chemical detection
- Authentication
- Biometric scanning
- Voice print identification
- Communications Relay
- Subspace, RF, and Point-to-Point IR Laser
- Holographic Interface & Projection
- Range of low-resolution holographic interface within line of sight up to 9.5 meters
- Range of high-resolution holographic interface within line of sight up to 7.2 meters
Containment Field
Primarily used by the holographic projectors, the containment field generator allows the creation of real-feeling projections. The field generator output is very low compared to something like deflector shields or other high-output force fields. The system can also be used to project low-level energy barriers across an area of about 38,000 square centimeters up to 5 meters in front of the device. This field projection is a comparatively low-energy output producing a repulsive effect for a few seconds when erected. The device is not designed for sustained field output; using it for such purposes would drain the SVR quickly.
Security Usage
The device is able to coordinate with a security system it has communication with, allowing it control. As a result, facilities that use it as a sentry often use the device to activate or otherwise manage force fields produced by the facility, which can at times appear as if they are generated by the device.
Stability
The device uses four independent gyroscopic stabilizers to maintain course and speed. The antigravity field is capable of adapting to transient gravitational/acceleration variances of up to 7Gs for no longer than 0.5 seconds. The device is capable of stable flight in up to 4Gs without affecting range. Additional stress on the device's flight can significantly reduce the range due to power drain.
Uses
Originally intended as an extension of personal communications/computing devices, acting as a up to a Class 4 AI although normally have a simpler Class 1 but highly adaptive assistant, the devices have been used for a variety of additional purposes. It should be noted that legally speaking anything higher than a Class 2 AI requires compliance with the ALFRE Act. Installation of a higher grade AI requires device unlocking by the manufacturer and an agreement for compliance. Since the device's introduction in 2384, they have started to appear in private homes, being used as monitors/companions for small children and the elderly wishing to live independently.
Industrial sectors have begun using them as automated security devices, stationing them at dangerous or sensitive areas to block entry and report potential risks. In the public sector, they have begun appearing in a similar role, blocking/reporting unauthorized access and assisting security forces in authenticating unknown individuals. As of mid-2386, they have also been seen monitoring hazardous areas for spikes in ionizing radiation or other potentially life-threatening conditions.
In more recent uses, some areas have adopted these devices as a kind of low-maintenance digital pet. The most recent use for the devices is to use their holographic projectors to form abstract 3D artwork that changes to suit the perceived mood of the individual. Coupled with a more powerful controlling computer or AI, they have also been used in the medical field to assist therapeutically with biofeedback.
Programming
The onboard computer has a simple ECC favoring memory storage over processing power, and the basic AI is certified non-sentient but designed to be intuitive. The onboard AI is able to learn new skills and patterns of behavior using neural network processing, as well as direct programming via a computer terminal or voice commands. The built-in skills and programming are task-dependent, but different programming packages are modular and interchangeable.
Physical Appearance
Even in industrial or corporate use, the device usually projects a constant holographic appearance, allowing for virtually unlimited physical forms. It is also possible for the device to project a null appearance, similar to adaptive camouflage. While the device is technically capable of producing such an effect, there are software limits in place to prevent its misuse, such as being used to spy on people.
Holographic Examples
Input / Output
The primary output method is via holographic display of information. Usually, the AI chooses simple pictorial or one/two-word visual representations. The device is capable of speaking with a variety of synthesized voices, although this is not the default mode of operation. Most commonly, the device produces a spherical holographic surface that changes color and surface details to suit a particular situation.
The default mode for input is voice commands, but the device also accepts direct commands sent via any connected terminal. It is capable of recognizing its owner or other authorized users by voice or physical presence (biometric) means. It will also, by default, accept remote commands that have already been authenticated.
Output Examples
These are some examples of how the device will respond to basic output needs.
Learning vs. Programming
The AI is designed to be adaptive, but the level of adaptation depends on the device's settings. Given enough time, the AI is capable of learning to distinguish certain intentions, which can alter its behavior beyond what has been explicitly programmed. The heuristic algorithm can be configured via voice command or direct terminal interface. The maximum learning/problem-solving level is similar to that of a domestic dog or cat.
Personality
Though some programming packages are more rigid than others, the default/consumer package is adaptive enough for the devices to develop heuristic behaviors based on experience. In this way, each device can develop unique behaviors based on its experience. Each unique behavior adds to a device's personality, and owners can configure devices to override and remove problem behaviors or leave them open to learning/developing new personality traits over time.
Civilian models left on default with learning enabled will also have some autonomy while not being used. Sometimes this kind of autonomy will be used to download information, create better maps of the surrounding areas, and perform maintenance tasks if that is part of their programming. Otherwise, multiple devices in the same space can interact with each other, even play the way animals might. There are software protections in place to prevent devices from damaging each other or the surrounding areas, but otherwise, they can be left to autonomously interact with each other or other people.
Terms of Service Agreement
The devices are Certified Non-Sentient. Part of that certification is the inclusion of software blocks within the ECC, as well as hardware blocks within the device itself, designed to prevent it from becoming sentient. As such, part of the ToS agreement is that the owner will not disable these blocks or install a sentient AI into the device.
Further terms include (but are not limited to):
- Prohibition on using the device for any illegal activity
- Prohibition on using the device to harm or intend to harm others
- Prohibition on using the device for the purposes of misleading or otherwise misrepresenting the truth
- Prohibition on experimentation on the device, its programming, or hardware with the intent of harming the AI
- This particular clause is designed to protect the well-being of the AI. While it is not sentient, it does feel and can have emotional responses, meaning it may be able to experience basic emotions. Thus, it should not be harmed, tortured, or otherwise misused with the intent of seeing the depth of feeling it is capable of perceiving.
Violating the ToS agreement is not a criminal offense, but these restrictions are enforced, and devices may be recalled or otherwise collected if the agreement is violated. Protections are in place to effectively blacklist a person, group, company, or government from future ownership of a device should the ToS be violated.
Hacking & Expanding
Though the devices are non-sentient by their very programming, it is not impossible to replace their ECC with another one or a Type 4 Multinodal Core. The devices themselves are capable of housing an AI if their ECC is replaced. While the ECC enclosure is designed for a lower-power unit than the typical AI unit, this can be modified. Other miscellaneous modifications would need to be made to the unit, such as a larger battery to charge from the SVR, along with some higher-resolution data pathways. Since the Type 4 Multinodal Core is independently powered from a host system, it does not require additional power output from the SVR.
Modification of the device to house an AI is not illegal in any criminal sense, but it does violate the Terms of Service agreement.