Browse Definitions :
Definition

teach box

A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system. The term especially applies to programmable robots.

Robot programming can be divided into levels, starting with the least complex and progressing to the equivalent of human intelligence. The table shows a four-level scheme.

 

Programming Level Description
4 Human intelligence
3 Complete tasks
2 Sequences of motions or operations
1 Single motions or operations

An example of a level-1 teach box is a remote-control for the doors of a car. When the wireless receiver gets the signal from the remote unit, it locks or unlocks the doors. Another example of a level-1 teach box is the remote box that controls a hi-fi sound system or videocassette recorder (VCR).

An example of a level-2 teach box is the microcomputer that controls a telephone answering machine. When a call comes in, the sequence of operations is recalled from memory. The machine answers the phone, makes an announcement, takes the message, and resets for the next incoming call.

Level-3 teach boxes are used in aerospace, miliatary, and industrial applications.  Level 3, just below human-equivalent artificial intelligence ( AI ), is called task-level programming. Programs at level 3 can instruct a robot to execute complete operations, such as shoveling the snow from a driveway or flying an aircraft on a reconnaissance mission.

The intended movements of a robot are entered into memory by pressing buttons or guiding a joystick or other three-dimensional control device. The robot's path, variations in speed, rotations, and gripping/grasping movements are all programmed. Then, when the memory is recalled, the robot reproduces these movements in the exact sequence, and to the exact extent and speed in all dimensions.

Also see artificial intelligence and robotics .

This was last updated in May 2011

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close