Sputnik Support Robot

From Solas Tempus DB
Revision as of 17:58, 9 June 2022 by Cyclops (talk | contribs)

The Sputnik Support Robot (SSR) is a general support and information robot produced by Excalibur Inc. as a personal service companion bot. The robot is designed to serve as a mobile data storage, communications, and general computer interface as well as industrial purposes for detecting safety hazards and autonomous security / reporting. The device primarily uses holography for its primary output interface and voice commands for the primary input interface, though it can use other means.

Even though the official short designation of the devices is an SSR, colloquially a different acronym has cropped up; SPERO (pronounced s'piˌroː). This alternative name has largely replaced the official name in areas where the device is common. Each device attempts to respond to the correct person who says this name, but it is also common to customize what an owner or user calls the device.

SPERO Pronunciation
Size 44 mm Truncated Icosahedron
Weight 206.7 g
Max Speed 110 kph
Standard Speed 6 kph
Power Source Spatial Variance Reactor
Propulsion Antigravity with Thrusters
Mobility Range Approximately 2600 km
Communication Approximately 2 AU
CPU Encapsulated Computer Core

Capabilities

  • Antigravity Propulsion
  • Automatic Gyroscopic Stabilization
  • Magnetic Containment Field
  • A/V Recording & Transmission
EM Detection from Far Infrared to Extreme Ultraviolet
Audio Detection from 50 Hz to 150 Hz
Signal differentiation as low as 0.00001 lux (Visual) and -20 dB (Audio)
  • Conditions Monitoring
Ionizing radiation detection
Subspace anomaly detection
Noxious chemical detection
  • Authentication
Biometric scanning
Voice print identification
  • Communications Relay
Subspace, RF, and Point-to-Point IR Laser
  • Holographic Interface & Projection
Range of low-resolution holographic interface within line of sight up to 95 meters
Range of high-resolution holographic interface within line of sight up to 72 meters

Containment Field

Primarily used by the holographic projectors, the containment field generator allows the creation of real-feeling projections. The field generator output is very low as compared to something like deflector shields or other high output force fields. The system can also be used to project low-level energy barriers across a range of about 38,000 square centimeters area up to 5 meters in front of the device. This field projection is a comparatively low energy output producing a repulsive effect for a few seconds when erected. The device is not designed for a sustained field output, using it for such would drain the SVR quickly.

Security Usage

The device is able to coordinate with a security system it has communication with that will allow it control. As such facilities which use it as a sentry often use the device to activate or otherwise manage force fields produced by the facility, which can at times appear as if they are generated by the device.

Stability

The device uses 4 independent gyroscopic stabilizers to maintain course and speed. The antigravity field is capable of adapting to transient gravitational / acceleration variance of up to 7Gs for no longer than 0.5 seconds. The device is capable of stable flight in up to 4Gs without effecting range. Additional stress on the device's flight can significantly reduce the range due to power drain.

Uses

Originally intended as an extension of personal communications / computing devices acting as a non-sentient but highly adaptive assistant, the devices have been used for a variety of additional purposes. Since the device's introduction in 2384 they have started to appear in private homes being used as monitors / companions for small children, the elderly wishing to live independently.

Industrial sectors have begun to use them as automated security devices, stationing them at dangerous or sensitive areas to block entry and report potential risks. In the public sector they have begun appearing in a similar role, blocking / reporting unauthorized access and serving to assist security forces in authentication of unknown individuals. As of mid 2386 they have been also seen monitoring hazardous areas for spikes in ionizing radiation or other potentially life threatening conditions.

Of more recent uses, some areas have seen an adoption of these devices as a kind of low-maintenance digital pet of sorts. The most recent use for the devices is to use their holographic projector to form abstract 3D artwork that changes to suit the perceived mood of the individual. Coupled with a more powerful controlling computer or AI, they have also been used in the medical field to assist therapeutically with biofeedback.

Programming

The onboard computer has a simple ECC favoring memory storage over processing power, the basic AI is certified non-sentient though is designed to be intuitive. The onboard AI is able to learn new skills, patterns of behavior using neural network processing as well as direct programming via computer terminal or voice commands. The built in skills and programming are task dependent but different programming packages are modular and interchangeable.

Physical Appearance

Even in industrial or corporate use the device usually projects a constant holographic appearance giving virtually unlimited physical forms. It is also possible for the device to project a null appearance, something similar to adaptive camouflage. While the device is technically capable of producing such an effect there are software limits in place to prevent its misuse (such as being used to spy on people).

Holographic Examples

Input / Output

Primary output method is via holographic display of information. Usually the AI chooses simple pictorial or one / two word visual representations. The device is capable of speaking with a variety of synthesized voices, this is not the default mode of operation. Most common is for the device to produce a spherical holographic surface changing color and surface details to suit a particular situation.

The default mode for input is voice commands but the device accepts direct commands sent via any connected terminal. It is capable of recognizing its owner or other authorized user by voice or physical presence (biometric) means. It will also, by default, accept remote commands that have already been authenticated.

Output Examples

These are some examples of how the device will respond to basic output needs.

Learning vs. Programming

The AI is designed to be adaptive but the level of adaptation is defendant on the device's settings. With enough time the AI is capable of learning to distinguish certain intentions which can alter its behavior beyond what has been explicitly programmed. The heuristic algorithm can be configured via voice command or direct terminal interface. The maximum learning / problem solving level is similar to that of a domestic dog or cat.

Personality

Though some programming packages are more rigid than others the default / consumer package is adaptive enough for the devices to develop heuristic behaviors based on experience. In this way each device can develop unique behaviors based on that experience. Each unique behavior adds to a device's personality, owners can configure devices to override and remove problem behaviors or leave them open to learning / developing new personality traits as time goes on.

Civilian models left on default with learning enabled will also have some autonomy while not being used. Sometimes this kind of autonomy will be used to download information, create better maps of the surrounding areas, and perform maintenance tasks if that is part of their programming. Otherwise multiple devices in the same space can interact together, even play the way animals might. There are software protections in place to prevent devices from damaging each other or the surrounding areas but otherwise they can be left to autonomously interact with each other or other people.

Terms of Service Agreement

The devices are Certified Non-Sentient, part of that certification is that software blocks are placed within the ECC as well as hardware blocks within the device itself which are designed to prevent it from becoming sentient. As such part of the ToS agreement is that the owner will not disable these blocks or install an AI into the device.

Further terms include (but are not limited to):

  • Prohibition on using the device for any illegal activity
  • Prohibition on using the device to harm or with intention to harm others
  • Prohibition on using the device for the purposes of misleading or otherwise misrepresenting the truth
  • Prohibition on experimentation on the device, it's programming or hardware with intent of harming the AI
This particular clause is designed to protect the well being of the AI, while it is not sentient it does feel and can have emotional responses, that is it may be able to experience basic emotion. Thus should not be harmed, tortured, or otherwise misused with the intent of seeing the depth of feeling which it is capable of perceiving.

Violating the ToS agreement is not a criminal offense but these restrictions are enforced and devices may be recalled or otherwise collected should the agreement be violated. Protections are in place so that a person, group, company, or government could be effectively blacklisted from future owning of a device should the ToS be violated.

Hacking & Expanding

Though the devices are non-sentient by their very programming, it is not impossible to replace their ECC with another one or a Type 4 Multinodal Core. The devices by themselves are capable of housing an AI if their ECC is replaced. While the ECC enclosure is designed for a lower-power unit than the typical AI unit, this can be modified. Other miscellaneous modifications would need to be made to the unit, for instance a larger battery to charge from the SVR along with some higher resolution data pathways. Since the Type 4 Multinodal Core is independently powered from a host system, it does not require additional power output from the SVR.

Modification of the device to house an AI is not illegal in any criminal sense, but it does violate the Terms of Service agreement.