Feeds

Gator menaces Cornish duck pond

Dragnet fails to locate rogue reptile

Intelligent flash storage arrays

The residents of a Cornish village are on full-scale 'gator alert following the discovery of a two-foot cayman in the local duck pond.

According to the Daily Telegraph, 20-year-old Stacey Clayton and daughter Alanna were feeding the ducks in the village pond at St Blazey when mum saw what she thought was a large log floating in the water. In this case, however, the log had eyes and when Clayton chucked at stone at it, it rather alarmingly scuttled off into the undergrowth.

A shaken Clayton recounted: "I noticed this big log in the water, but as I got closer I saw its eyes. I wasn't sure whether it was alive so I threw a stone near it. It lifted its head and looked straight at me. I saw its tail and a dozen teeth coming down from its top jaw. I went home and called the RSPCA. My dad said it was probably a cayman."

An RSPCA dragnet of the area surrounding the pond failed to locate the beast, and the organisation warned locals to keep their eyes peeled for rogue reptiles. It did note, however, that the cold may already have done for the animal.

The RSPCA added that the Cornish cayman incident "highlighted the problem of people keeping exotic animals with little or no knowledge of the care they require".

Gator versus pythonQuite so, although the good Burghers of St Blazey can consider themselves lucky they don't live in the Everglades, where a recent encounter between a six-foot alligator and a 13-foot Burmese python left both the monsters dead.

According to the BBC, Burmese pythons - dumped by their owners - have thrived in Florida's swamps, so much so that they feel confident enough to take on a 'gator. In this case though, the python apparently exploded as it tried to swallow its prey.

Frank Mazzotti, a University of Florida wildlife professor, told AP: "Encounters like that are almost never seen in the wild. They were probably evenly matched in size. If the python got a good grip on the alligator before the alligator got a good grip on him, he could win."

This clash of Titans has led experts to speculate that the python could fight its way to the top of the food chain, outsting its native reptile adversary. "Clearly, if they can kill an alligator they can kill other species," Prof Mazzotti concluded. ®

Intelligent flash storage arrays

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.