Feeds

For flock's sake: Scared sheep send SMSes to Swiss shepherds

Da big bad wolf S cmng ovr hill

Build a business case: developing custom apps

Swiss boffins have been testing SMS-equipped sheep to see if they can send a warning text message when the big, bad wolf approaches, and it looks like they can.

The sheep don't voluntarily send the message, but a heart-rate monitor fitted to a sheep's collar can detect when the animal is stressed, and automatically sends an SMS message when that stress gets high enough, hopefully allowing swift intervention from the shepherd.

The trials, reported by the AFT, involved only 10 sheep who were fitted with collars and threatened with wolfdogs. Even the muzzled hounds were able to send the sheep into enough of a panic to trigger the text message, and the plan is to run (literal) field trials early next year.

Monitoring the heart beat seems technically possible, and one wouldn't have to fit the entire flock with collars for the plan to be effective, but the work does follow one South African farmer who adopted a similar solution together last month to catch sheep rustlers.

Erard Louw has reportedly already caught one thief in action thanks to his collars, which are triggered by sheep breaking out into a trot. Lambs run all the time, but sheep rarely run more than a few steps unless they're being chased by something, so by observing the direction of the jogging adults, the collar can let the farmer know where his sheep are running to.

British sheep don't have to worry about wolves, and rarely worry about rustlers either, in fact they don't even flock properly, and need walls and fences keep them together*. But in Switzerland wolves are on the increase, with the AFP reporting that two sheep were killed by a wolf in St Gall (a canton near Germany) only last week. ®

* Your correspondent once worked on a game based around sheep, including several months spent developing sheep-flocking algorithms, so was very disappointed to discover this fact.

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
Ancient pager tech SMS: It works, it's fab, but wow, get a load of that incoming SPAM
Networks' main issue: they don't know how it works, says expert
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.