Feeds

Everest climber finds 3G signal, sends Tweet

Cloudline computing

Choosing a cloud hosting partner with confidence

A British climber has allegedly become the first person to Tweet, use Facebook and make a 3G phone call from atop Mount Everest today, raising the point that nowhere, not even the top of the effin' world, is safe from the reaches of cellphones and social networking.

It was the ninth occasion the unlikely named Kenton Cool has reached the summit, this time with a Samsung Galaxy S II. As well as making the first 3G phone call at the peak of the world's tallest mountain, Cool updated his Twitter and Facecrack status, and uploaded a picture for all to see.

Mount Everest

The climber connected to 3G masts erected last year, which brought online services to Nepalese inhabitants and mountaineers, who in past climbs, were forced to lug around heavy satellite phones. Or simply not bother ringing to tell people where they are.

You just can't run from the ringtone can you? Even above the clouds on the world's peak, someone'll get you.

"Sorry, I can't do that - I'm so snowed under right now."

Perhaps London Underground - which has decided against cellular connectivity in time for the Olympics - is the only remaining safe haven.

Well, that and my loo for some reason, but it's more dangerous than Everest in there. ®

Intelligent flash storage arrays

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.