Feeds

A life on the ocean wave(length)

I'm in the Pacific! No, the PACIFIC!

High performance access to file storage

Sailors could soon be able to call home from the middle of the ocean on an ordinary GSM mobile phone, thanks to a tie-up between Blue Ocean Wireless (BOW) and Inmarsat-reseller Stratos Comms.

The companies have linked up with an as-yet unnamed GSM operator to put small GSM basestations, called picocells, onto merchant ships. Calls to or from the crew are backhauled over the ship's existing satellite connection - via Inmarsat, in this case. The system will also support SMS and data, the companies said.

Sailors will need to buy a pre-paid SIM to use the on-board network, according to Dublin-based BOW. The current plan is that the picocell will automatically turn itself off if it detects a land-based network, at which point the seafarers will need to swap back to their existing SIM cards.

There's no word yet on what calls and text messages sent from mid-ocean might cost, but a BOW spokesman hinted that they might not be as expensive as the public GSM networks that are already available on some ferries, for example.

He said that with good seafarers in short supply, systems such as this are installed by shipowners not to make a profit - like the ferry-based ones - but to keep the crew happy and improve staff retention.

"Crew are more picky now," he said. "They won't sail on a vessel that doesn't have email access, for example."

It also cuts the cost of running today's satphone-based crew calling schemes, and enables the shipping company and its customers to keep in touch with its cargo, he said.

Most containers already have GPRS-capable RFID tags attached. As well as location reporting, these can issue alarms if the container doors are opened, say, or if refrigerated goods don't stay refrigerated. Currently, the tags simply 'go dark' at sea, but with a GSM cell on board, they could provide reports anywhere.

The system is based on a picocell and gateway device from another Irish company, Altobridge, and has already been trialled on two container ships. Blue Ocean said it hopes to sell similar systems to the owners of luxury yachts and other sea-going ships, as well.®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.