Feeds

Scientists tremble before 'thunder-thighs' sauropod

Early Cretaceous dino delivered quite a kick

Top three mobile application threats

Scientists have identified a new species of Early Cretaceous sauropod - a six-tonne beast with a fearsome set of rear legs which have prompted paleontologists to dub it "thunder-thighs".

A team including Dr Mike Taylor of University College London unearthed the remains of an adult and juvenile in Hotel Mesa Quarry in Grand County, Utah. According to the team's report summary in the journal Acta Palaeontologica Polonica, the adult specimen packed an eye-catching hip-bone, aka ilium, which is "proportionally taller than in any other sauropod, 52 per cent as high as long".

It continues: "The large preacetabular lobe of the ilium anchored powerful protractor and abductor muscles."

Artist's impression of thunder-thighs kicking a lesser dinosaur into touch. Pic: UCLTaylor explained to the BBC: "As you put the skeleton together, you can run muscles down from the hip-bone to join at the knee and that gives you a whopping thigh.

"If predators came after it, it would have been able to boot them out of the way."

Taylor backed his kick-like-a-huge-mule theory by dismissing the idea that these thunder thighs were built for speed. He said: "What's interesting is that if it were a sauropod that could move particularly fast, you would expect to see very strong muscles on the back of the leg to pull it along. But we don't; this is the opposite. It seems most likely to us that what this is about is being able to deliver a strong kick."

Accordingly, the team dubbed the creature Brontomerus mcintoshi – from the Greek bronto (thunder) and merós (thigh). The "mcintoshi" bit of the name comes not from a belief that the animal had a synthetic waterproof skin, but is rather "in honor of veteran sauropod worker John S McIntosh, whose seminal paleontological work, done mostly unfunded and on his own time, has been an inspiration to all of us who follow", as the team's full report (PDF) into the find puts it.

The scientists admit that "precise interpretation" of Brontomerus mcintoshi's thunderous thighs is "impossible without functionally related elements such as femora and proximal caudal vertebrae".

They weren't able to recover more of the animals' skeletons due to extensive plundering of the Hotel Mesa Quarry. Taylor lamented: "The fossil-hunters basically pillaged this site. They left behind broken remnants and smashed bits of bone; and in some cases they were using broken bones to hold down tarpaulins – that's really the most disgraceful aspect of it."

The BBC has more on the find and its significance here. ®

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.