Feeds

Penguins come to Wimbledon

IBM serves up tennis treat

  • alert
  • submit to reddit

Internet Security Threat Report 2014

When the prestige Wimbledon tennis tournament kicks off next Monday, IBM will be providing the technology for the fifteenth consecutive year.

Big Blue will be depending on a grid computer of Linux machines to keep the tournament website up and running. It will also deploy a Wi-Fi network to keep assorted hacks and photographers in touch.

The grid structure means IBM can offer more resources to its website during peak times. In quieter periods the machine will carry out life science research and a credit analysis project.

The internal network is running Linux for the first time this year. The official website is also running the open source operating system. Linux was first piloted at Wimbledon in 1999 but is now of central importance.

The website offers details on all matches, a souvenir shop, an improved broadband version with video and audio and a real-time scoreboard.

IBM collects a lot of statistics about every shot of every game. These include; who served, where the serve landed, how it was returned and any errors made. These statistics are used by TV commentators to help them track developments during games and to create graphics for their shows.

The wireless network was introduced last year to allow photographers to upload their pictures to a content server from where media agencies could access the snaps. This year the wireless network will give access to video streams via handheld computers. ®

Related stories

Branded pigeons invade Wimbledon
Boris Becker sues T-Online
British Wimbledon hope launches Web site

Remote control for virtualized desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.