Feeds

Aussie parrots hit the sauce and hit the deck

What shall we do with the drunken lorikeet?

7 Elements of Radically Simple OS Migration

Spring is sprung, the grass is rizz, and the little birdies is dropping out of the sky, drunk.

It’s actually a regular event in the Northern Territory, at least: the beginning of the northern wet season also coincides with parrots like the Red-Collared Lorikeet somehow hitting the sauce and staggering into animal shelters to sleep it off.

As Australian Geographic reports, “drunk lorikeet” season is typified by birds falling over, having trouble flying, and colliding with things. Like your average pub drunk, they’re also prone to a parrot version of “I love youse brother”, instead losing their fear of people.

Northern Territory blogger Bob Gosford Tweeted to El Reg that “I’ve seen them roaring drunk and laughing out loud like Irish backpackers”.

The common explanation is that as the weather becomes warmer and wetter, some of the fruit that the birds favour start fermenting, knocking the parrots for six. And it’s not all fun and games: the wildlife carers say the benders and subsequent hangovers kill about half of the parrots brought into shelters each year. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?