Feeds

120 Underground Wi-Fi hotspots will erupt in 2012

Spewing LOLcats all over 19th century caverns ...

Beginner's guide to SSL certificates

Transport for London is tendering for bidders to open Wi-Fi hotspots at underground stations, and possibly even at bus stations and stops.

The decision follows a trial with BT OpenZone at Charing Cross tube station in central London.

Transport for London said the tender was for up to 120 tube stations, out of a total of 260.

The contract will be awarded to a provider or reseller by the end of 2011 with the aim of getting some stations at least online by the Olympics.

The first stage will be to open London Underground's own Wi-Fi networks at 16 stations for customers to use.

Research from the Charing Cross pilot found over half those questioned felt that access to Wi-Fi would make their experience of using the Tube better. We're assuming the other half wanted to know where their bloody train was.

TfL will charge providers for access; it will be up to them to collect payment from users.

Access will not explicitly be for voice – we asked about VoIP but didn't get a clear answer. And access is to the platform edge only, not onboard trains.

Given the state of most of the underground network, voice calls would be impossible anyway. The 19th century network is going through another of its endless upgrades – even TfL's press emails come with a boilerplate warning of disruptions and delays.

The tender will be advertised in the Official Journal of the European Union later this month and in the national press next Tuesday.

Meanwhile, the pilot programme at Charing Cross continues until later this year.

Discussions with mobile phone companies to provide access "on the deep Tube network" are continuing.

You can find out more about the Tube upgrade programme here, or there's more on internet access at stations here. ®

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.