Feeds

UK island seeks beer-loving monarch

Unusual situation vacant

High performance access to file storage

If you're bored senseless at work and fancy a complete change of scenery coupled with immediate elevation to the monarchy, have a shufti at the website of Barrow Borough Council which is offering one lucky chap or chapess the chance to become the "King (or Queen) of Piel".

The Piel in question is a 20-acre plot "situated off the southern tip of Walney Island three miles southeast of Barrow-in-Furness". It boasts Site of Special Scientific Interest status, a 14th century castle, six former coastguard cottages, and the grade-II listed Ship Inn - the licensee of which is granted the honourary royal title.

The situation has been vacant since the abdication of former king Rod Scarr back in April. Scarr lived on the island with his wife and daughter and told the North-West Evening Mail: "We've seen some bad times, but they're certainly outweighed by the good ones. It's a place that gets in your blood and it has been a wrench to leave."

Since King Rod's untimely exit, the council has charged itself with refurbishing the Ship Inn, and reckons it'll be fit to host a coronation early next year. Accordingly, "formal 'expressions of interest' are, therefore, sought from all persons/parties interested in the future tenancy, subject to terms and conditions to be agreed, of The Ship Inn and Piel Island".

There are some nice snaps of the Piel Island kingdom here, but potential landlords should be warned that it has no mains 'leccy or phone line, is accessible by ferry only on summer weekends, and if you want to get out of the place in a hurry you'll have to wait until the tide goes out and make a dash for it across the exposed sands. On a tractor or similar, naturally.

On the other hand, you might end up spending weeks stuck in a pub by a roaring log fire with no phone to interrupt your beer-fuelled armchair musings. Hmmm... ®

Bootnote

A hearty cheers to Roy Silcocks for alerting us to this unique opportunity.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.