Feeds

Frozen polar waste gets Wi-Fi hotspot

Santa and elves said to be pleased

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Intel has rigged up a Wi-Fi hotspot just 80km from the North Pole, presumably so that Sir Ranaulph Fiennes and his ilk can check his email next time they take a little stroll across the ice-pack.

The hotspot was set up by two Intel employees who recently went on an expedition to ninety degrees north. The adventurous staffers installed an 802.11b/g access point at the main camp site, and a wireless LAN of three IBM T41 and T42 Centrino notebooks.

The access point is near the Barneo ice camp, located on the 89th northern parallel. The tented camp is used to support a variety of research expeditions in the Arctic region. It is not occupied year-round, since its safety is somewhat contingent on favourable weather conditions.

The installation was designed as a test to find out what the limits of the technology are - as well as the limits of journalists' appetite for stupid press stunts. The arctic circle is not an especially forgiving environment, even in April, when the camp is usually inhabited. Temperatures rarely top -22°C, and the average humidity is 85 per cent.

The cold is particularly hard on LCD screens and battery life, and the humidity along with the large variations in temperature between inside and outdoors can lead to condensation forming inside machines. Not good.

However, the network is up and running and can now be accessed by any camp visitor carrying a mobile PC or a pocket PC supporting wireless standards, according to the chip-maker. The network connects to the internet via an iridium satellite phone.

The Intel staffers then went to camp NP-33, the only drifting polar scientific station in the world, to give the researchers there a Centrino-based IBM T42 notebook.

Some might say that this is a clear sign that Intel's wireless strategy is adrift. Others might think it has more to do with the benefits of floating IP addresses. We're pretty sure anyone suggesting such terrible puns in this office would immediately be escorted out of the building and asked not to return. ®

Related stories

WiMAX summit: 'Standards-plus' could harm 802.16 roadmap
IEEE rejects Nokia-backed next-gen Wi-Fi proposal
WiMAX to steal 3G and DSL market share

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.