Feeds

Meet Antarctic sysadmin Richard Youd

Cisco, VMWare, and maybe helping with emergency surgery, at the bottom of the world

  • alert
  • submit to reddit

SANS - Survey on application security programs

Life in the Antarctic

Richard has sent us a few other photos that depict the things an Antarctic Sysadmin get up to. We bet your job doesn't involve things like going for rides in inflatable rubber boats (IRBs).

Richard Youd and other Davis Stationeers aboard an IRB. Photo: Graham Oakley

Richard Youd and other Davis Stationeers aboard an IRB.
Photo: Graham Oakley

Disaster recovery takes on a whole new meaning when you've been trained as a surgical assistant.

Richard Youd scrubs before his surgical training. Photo Copyright Pip

Richard Youd scrubs before his surgical training.
Photo Copyright Phil O'Brien

You want a new certification to get ahead? What about one scaling towers. In a blizzard. Cos that's what Richard is allowed to do as part of his Antarctic gig.

Richard Youd undergoing tower rescue training. Photo Copyright Doug McVeigh

Richard Youd undergoing tower rescue training.
Photo Copyright Doug McVeigh

Taxi ride to a meeting today? Richard may have to hop on a 'copter to get things done.

Richard Youd in a helicopter near Davis Station. Photo Copyright Phill O'Brien.

Richard Youd in a helicopter near Davis Station.
Photo Copyright Phill O'Brien.

®

3 Big data security analytics techniques

More from The Register

next story
From corporate bod to startup star: The 10-month gig that changed everything
What I learned as a techie in my time away from globo firms
Facebook snubbed Google's Silicon Valley wage-strangle pact, Sheryl Sandberg claims
Report details letter COO wrote to court addressing 'no-compete deal' lawsuit
Another day, another nasty Android vuln
Memory corruption mess can brick your mobe
Barclays warns freelance techies of DOUBLE DIGIT rate cut
'IT was a car crash before, so this isn't going to get any better' - sources
VMware announces compulsory bi-ennial VCP recertification
Downside: more time and money; Upside: VMware hints at two-yearly release cycle
Sysadmins and devs: Do these job descriptions make any sense?
Industry lobby group defines skills used in 25 common IT jobs
Who earns '$7k a month' but can't even legally drink? A tech intern!
Glassdoor reveals astonishing salaries of Silicon Valley undergrads
Your CIO is now a venture capitalist and you work at their startup
This just happened without you changing job, by the way
Turnover at the top in Oz telco-land as AAPT, Huawei, Optus, lose top brass
Move along, nothing to see here but orderly transitions
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.