Feeds

Boffins issue stealth comet apocalypse alert

We're all going to die, part 347

  • alert
  • submit to reddit

High performance access to file storage

Not content with scaring us half to death with dire predictions about killer comets, asteroids, tsunamis, plagues, global warming, floods, locusts and general pestilence, scientists have now discovered a new threat to humanity - the invisible killer comet.

According to the Independent, a team led by Chandra Wickramasinghe at Cardiff University's Centre for Astrobiology says that the chances of Earth being wiped off the celestial map are much greater than previously thought because of the presence of giant invisible comets "made up of loose material [which] reflect so little light that they cannot be seen".

Avoiding the natural desire to panic, professor Wickramasinghe remained calm enough to say: "It's possible we need to think again about mitigating strategies," although he did not elaborate as to whether these strategies might include deploying Bruce Willis to destroy the comet with his bare hands (if he can find it) or simply retiring to the nearest piece of high ground, getting completely drunk and hoping that you'll escape the blast, the subsequent tsunami, the nuclear winter which would undoubtedly follow during which space microbes would destroy 94 per cent of survivors* in the manner of the Andromeda Strain.

Mercifully, though, the Bruce Willis option might not be a hopeless as it at first seems, because by 2008 we can rely on NASA's shiny new Widefield Infrared Survey Explorer which - since it is half-a-million times more powerful than previous telescopes - will be able to "de-cloak" stealth comets.

So there you have it - problem solved. Because if you can see 'em, then you've got enough time to develop a "mitigating strategy" before all life on the planet is wiped out. We at El Reg will sleep sounder in our beds tonight knowing that the threat from stealth comet apocalypse has been duly mitigated. ®

*The other six per cent? Eaten by locusts, naturally.

Related stories

Brits scan skies for impact threats
Scientists call for nanotech caution
Asteroid apocalypse: the online guide
Flood, pestilence and beef sarnies
The world will end tomorrow - official

High performance access to file storage

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.