Feeds

Reg hacks confront really wide Oz load terror

Down Under's Stuart Highway: The shocking, lane-swallowing truth

Seven Steps to Software Security

During our coverage this week of the World Solar Challenge, live from Down Under's Stuart Highway from Darwin to Adelaide, some of you weren't too impressed with our account of meeting a big truck bearing an improbably large mining vehicle – some kind of monster Tonka Toy with wheels the size of a two-storey house.

Such loads are announced by some lead wheels, such as a van, bristling with flashing lights and large signs, warning oncoming drivers that they're about to confront a substantial Oz highway beast.

Well, a couple of commentards snorted in derision at the modest dimensions of this menace, citing legendary loads of such magnitude that whole towns astride the highway had to be demolished to facilitate their passing.

We weren't going to take that lying down, and here are a couple of snaps we took on Wednesday just north of Coober Pedy. These were grabbed from the safety of the Stuart Highway verge, or more accurately, the ditch next to the verge:

Building on the back of a trailer on Oz's Stuart Highway

Another building on a truck on Oz's Stuart Highway

No doubt our Oz readers can recount even more terrifying examples of "the time they moved and entire town on the back of a road train from Alice Springs to Darwin", or "that's nothing, my uncle Bob once carried 500 sheep balanced on a pole tied across the back of his ute 430km from our homestead to market".

Bring it on – but we want photographic evidence.

And while we're dealing with comments from you, our beloved readers, we're happy to deliver the distance from Darwin to Adelaide in proper units.

We've been providing race distances in kilometres, as is the local custom, but since that measurement has a distasteful whiff of the French about it, here's Darwin-Adelaide in approved units:

  • Linguine: 28,721,429
  • Double-decker buses: 436,164
  • Brontosauruses: 29,078

So now you know. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.