Skip to main content

Amtrak rolls out free Wi-Fi for Northeast United States

amtrak
Image used with permission by copyright holder

Announced earlier today, Amtrak is upgrading twelve Northeastern routes with free Wi-Fi access via the AmtrakConnect service. Passengers with devices like a laptop, tablet or smartphone will be able to browse the Internet while riding on the train. However, limited bandwidth restricts activity to basic Web browsing. It’s unlikely that passengers will be able to use a streaming video application like Netflix to watch a movie during the trip. Other restricted activity includes listening to streaming music on a service like Spotify and large file downloads. Amtrak limits the file size on downloads to 10MB, thus passengers looking to download a recent movie off iTunes will be out of luck.

This upgrade is likely an attempt to attract more customers that would fly or drive to their location. Routes that have been upgraded to offer the free Wi-Fi connection in all cars include the New Haven-Springfield Shuttle, New York to Philadelphia-Harrisburg, Pa., New York to Rutland, Vt.,New York to Albany-Buffalo, New York to Charlotte, Boston to Portland, Washington to St. Albans, Vt. and Virginia to Boston. Routes that have specific cars upgraded with the Wi-Fi connection include New York to Savannah, Ga., New York to Philadelphia-Pittsburgh, New York to Toronto and New York to Montreal.  

Recommended Videos

With these upgrades in place, Amtrak estimates that 60 percent of customers will have access to the Wi-Fi network. The next phase of the upgrade involves several routes in California which will bring Amtrak’s coverage up to 75 percent of the typical customer base. Amtrak is planning to roll out the Internet service by the end of 2011 on the Pacific Surfliner, San Joaquin and Capitol Corridor routes. Amtrak is also in the process of upgrading the speed of routes with the development of a high-speed rail in the Northeast. The first phase of the project outlined a new route between Philadelphia and New York that would only take 38 minutes to travel. That route typically takes 90 minutes to two hours by automobile according to Google Maps.

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more