Feeds

Frozen polar waste gets Wi-Fi hotspot

Santa and elves said to be pleased

  • alert
  • submit to reddit

Boost IT visibility and business value

Intel has rigged up a Wi-Fi hotspot just 80km from the North Pole, presumably so that Sir Ranaulph Fiennes and his ilk can check his email next time they take a little stroll across the ice-pack.

The hotspot was set up by two Intel employees who recently went on an expedition to ninety degrees north. The adventurous staffers installed an 802.11b/g access point at the main camp site, and a wireless LAN of three IBM T41 and T42 Centrino notebooks.

The access point is near the Barneo ice camp, located on the 89th northern parallel. The tented camp is used to support a variety of research expeditions in the Arctic region. It is not occupied year-round, since its safety is somewhat contingent on favourable weather conditions.

The installation was designed as a test to find out what the limits of the technology are - as well as the limits of journalists' appetite for stupid press stunts. The arctic circle is not an especially forgiving environment, even in April, when the camp is usually inhabited. Temperatures rarely top -22°C, and the average humidity is 85 per cent.

The cold is particularly hard on LCD screens and battery life, and the humidity along with the large variations in temperature between inside and outdoors can lead to condensation forming inside machines. Not good.

However, the network is up and running and can now be accessed by any camp visitor carrying a mobile PC or a pocket PC supporting wireless standards, according to the chip-maker. The network connects to the internet via an iridium satellite phone.

The Intel staffers then went to camp NP-33, the only drifting polar scientific station in the world, to give the researchers there a Centrino-based IBM T42 notebook.

Some might say that this is a clear sign that Intel's wireless strategy is adrift. Others might think it has more to do with the benefits of floating IP addresses. We're pretty sure anyone suggesting such terrible puns in this office would immediately be escorted out of the building and asked not to return. ®

Related stories

WiMAX summit: 'Standards-plus' could harm 802.16 roadmap
IEEE rejects Nokia-backed next-gen Wi-Fi proposal
WiMAX to steal 3G and DSL market share

Seven Steps to Software Security

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.