Feeds

Da Vinci Code judgment decoded

Judicial mischief spotlights naval glory

Gartner critical capabilities for enterprise endpoint backup

Disappointingly, the hidden message inserted by a High Court judge into his ruling on the Da Vinci Code copyright trial has already been solved. Mr Justice Peter Smith's code, reported yesterday, has been cracked by a London lawyer.

It reads:

Jackie Fisher, who are you? Dreadnought

Rather than a clue to the lizard conspiracy that probably permeates every level of the judiciary, Smith's message actually promotes his personal hero from British naval history, a long standing hobby interest.

John Arbuthnot "Jackie" Fisher sailed the seven seas in the late Victorian and Edwardian eras. He's considered a forgotten hero of naval history and is the Judge's pet admiral. Fisher was a big reformer and chairman of the committee that commissioned the groundbreaking battleship Dreadnought.

Smith used the Fibonacci Sequence, which appears in The Da Vinci Code to encrypt the historical nugget. Under the Fibonacci Sequence each number is the sum of the previous two numbers thus:

1, 1, 2, 3, 5, 8, 13, 21...

Some arithmetic gymnastics based in the sequence was used to rearrange the italicised letters in Smith's judgment to decrypt them.

Marvellously, Jackie Fisher is said to be the originator of the belligerent gem: "Never explain, never apologise." Smith apparently lives by this maxim. He told The Times: "It was for my own pleasure. The answer is nothing to do with the case." ®

5 things you didn’t know about cloud backup

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.