Feeds

Astronaut runs Boston marathon from space

Four hours, 24 mins

Intelligent flash storage arrays

NASA astronaut Sunita Williams has completed the Boston Marathon in an unofficial time of four hours and 24 minutes, despite being strapped to a treadmill in orbit on the International Space Station.

Williams qualified for the Boston Marathon with her three hour 37 minute run in the 2006 Chevron Houston Marathon. She said she hoped the run would inspire kids to make fitness part of their daily lives.

"I think a big goal like a marathon will help get this message out there," she said.

Back on Earth, Russian Lidiya Grigoryeva won the women's race, finishing 48th overall with an official time of 2:29:18.

The men's title was taken by Robert K Cheruiyot, who crossed the line in 2:14:13. Kenyan Cheruiyot set a new course record of 2:07:14 last year. Commenting on this year's performance, he said it was not possible to set a good time in Boston if a north-easterly was blowing.

Williams, of course, did not have to do battle with the elements, but she did have to deal with the friction from the straps holding her to the treadmill.

Fellow NASA astronaut Karen Nyberg, Williams' sister Dina Pandya, and long-time friend Ronnie Harris all offered their support from Earth by running "with" Williams in the Boston marathon.

The Boston Marathon is unusual among the big city marathons in that runners must qualify for a place by completing another marathon in a specified time. As such it is held in high esteem by serious runners. Most city marathons select participants by lottery, or on a first-come, first-served basis. ®

Remote control for virtualized desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.