Feeds

Parmo v poutine: The ultimate post-pub nosh deathmatch

Middlesbrough battles Canada for supersaturated supremacy

Remote control for virtualized desktops

It's Friday, and since we have no doubt you lot will be rolling out of your local hostelry later having partaken of a few liveners, you might want to consider just what mouthwatering treat will best cap off your night on the town.

Well, we at the El Reg Special Projects Bureau have a couple of suggestions from the wonderful world of post-pub cuisine.

As promised, our highly-trained operatives took time off from audacious spaceplane projects to tackle the parmo – a Middlesbrough delicacy whose fame has already spread as far as Sunderland, but is now set to burst onto the international stage.

However, in the interests of science, we decided to pitch the parmo against another dish whose name is uttered in hushed tones: Canadian poutine.

Yes, we hear you ask, qu'est-ce que c'est this poutine of which you parlez? Since you ask, it's an unholy alliance of chips, gravy and cheese curds, which will now do battle with the parmo's deep-fried pork fillet for the ultimate post-pub nosh deathmatch crown.

So, let's get straight down to the kitchen, where my son Rui agreed to tackle the parmo/poutine challenge, as long as he didn't have to wear a dress.

First up on the poutine front is the small matter of knocking up some cheese curds. It's a simple matter involving milk, lemon juice, a pinch of salt and some cheesecloth, but you'll have to do it the night before. Here's Rui getting stuck in:

Rui making cheese curds

The next day, we decamped to the more ample kitchen of local bar owners Tito and Yolanda to tackle the poutine proper, and were joined by my daughter Katarina after she heard the word "chips" and developed a sudden interest in the project.

Since you'll probably be tackling this recipe when you're a bit the worse for wear, we've provided this handy cut-out-and-keep pictorial recipe guide, with easy-to-read captions. We suggest you print it out and laminate it, then nail it to the wall above the cooker:

Photo guide to preparing poutine

Et voilà! Your poutine is ready to serve...

Rui and Katarina serve the poutine

Security for virtualized datacentres

More from The Register

next story
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Voyager 1 now EIGHTEEN LIGHT HOURS from home
Almost 20 BEEELION kilometres from Sol
HUGE SHARK as big as a WWII SUBMARINE died out, allowing whales to exist
Who'd win a fight: Megalodon or a German battleship?
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
ROGUE SAIL BOAT blocks SPACE STATION PODULE blastoff
Er, we think our ISS launch beats your fishing expedition
Comet Siding Spring revealed as flying molehill
Hiding from this space pimple isn't going to do humanity's reputation any good
BAE points electromagnetic projectile at US Army
Railguns for 'Future fighting vehicle'
LONG ARM of the SAUR: Brachially gifted dino bone conundrum solved
Deinocheirus mirificus was a bit of a knuckle dragger
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.