Feeds

Reg hack uncovers perfect antidote to internet

A profound, earth-moving experience

Security for virtualized datacentres

So far so good. Bring on the second length of tube:

Teasing the second section of tubing into the well

Moving with panther-like speed before the pit walls collapsed, we threw in a load more stone to surround the first two tube sections...

The frist two sections of tube in place and surrounded with stone

...then mounted the final tube section before sticking plastic sheeting on top of the stone fill:

Rui surrounding the well tubes with plastic sheeting

Said stone fill acts as an external "reservoir" into which water can flow freely, while the plastic sheet stops backfill soil leaching down. Reg reader well experts are welcome to take issue with Ramon's methodology here, but he's the bloke who's dug more of these than you can shake a divining rod at.

With the Sun having passed the yardarm, all that remained was to fill the hole...

Filling in the hole with soil

...tidy up a bit...

Rui doing the last bit of cleaning around the well

...and lay some concrete as a base for the brickwork which will eventually finish the job and prevent dogs/children/distracted journalists from plunging head-first into the abyss:

Rui and the finished well head

All in all, a profound, earth-moving experience, and the perfect antidote to the internet. Six hours of hard graft, heavy machinery, concrete tubes and stone followed by, naturally, lashings and lashings of ice-cold beer. Cheers. ®

Bootnote

I'm extremely chuffed to report that after a couple of days, the well had two metres of water in it - an impressive result in the middle of a serious drought.

Security for virtualized datacentres

More from The Register

next story
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
LOHAN invites ENTIRE REG READERSHIP to New Mexico shindig
Well, those of you who back our Kickstarter tin-rattling...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.