Feeds

Eleven - if you will - rocktastic music movies

We go to 11 to celebrate Nigel Tufnel Day

  • alert
  • submit to reddit

3 Big data security analytics techniques

The Wall

RH Numbers

Pink Floyd's masterpiece is the mesmerising tale of Pink, a highly disturbed rock star who goes from one extreme to the next as he fails to cope with the an absent dad, fame, the infidelity of his wife, the tyranny of school and the post-war austerity years.

The soundtrack, of course, is Pink Floyd's 1979 album of the same name, which plays from start to finish, attaching further meaning to the words of each song through the medium of film.

Bob Geldof takes centre stage as Pink and plays the part well, dealing with the effects of a troubled childhood to a drug-fuelled rock lifestyle - and losing his marbles as a result.

With daunting animations – based on drawings by Gerald Scarfe – packed with majestic metaphors and tones of a Freudian nature, The Wall is an epic that even those not so fond of Pink Floyd should sit down and watch.

Pink Floyd: The Wall

Reg Rating 85%
More info IMDB

Walk the Line

RH Numbers

2005's look at the life of country-rock legend Johnny Cash lit up the world of cinema and won numerous awards. From Cash's early days on a cotton farm to the meteoric rise to fame, Walk the Line covers the life of one of America's all-time musical greats.

Actor-turned-rapper Joaquin Phoenix takes on the lead role, with Reese Witherspoon in the shoes of June Carter, the woman Cash decides he wants to spend his life with. As usual, no music biopic is complete without a serious dose of instability and psychological distress, on the way dealing with relationship issues, religious beliefs and, of course, Cash's ongoing problems with drugs and booze.

Both actors were so electric in their roles that they each received Academy Award nominations, with Witherspoon eventually taking home the gong.

Walk the Line

Reg Rating 85%
More info IMDB

SANS - Survey on application security programs

Next page: This is Spinal Tap

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.