Feeds

Cameron flaunts footage of pristine, featureless bottom

Fails to ram robot fist into it (with Rolex on wrist!)

SANS - Survey on application security programs

Celebrity mega-auteur James Cameron, fresh from his partially successful submarine mission to the deepest recess of the oceans, has stunned the interwebs with the release of some video showing the "featureless" seabed which he reached after such great efforts.

Here's a press-conference vid including the footage:

Cameron, renowned for giving the world such flicks as The Abyss (alien hippies live at the bottom of the oceans and vanquish an alliance between the US military and an oil company) and Avatar (alien hippies live on distant worlds and vanquish a mining company employing ex-US-military mercenaries) seemed upset at not discovering any aliens or hippies.

Another disappointment from the trip was the failure of the film-maker's submarine, DeepSea Challenger, to retrieve a bottom sample. The vessel was equipped with a robotic arm for this purpose, but a hydraulic failure unfortunately kyboshed the bottom-groping part of the expedition.

As was also the case with the first expedition to the bottom of the Challenger Deep, a diving watch manufactured by corporate sponsor Rolex was attached to the outside of the sub. In this case a specially developed Oyster Perpetual Deepsea Challenge, rated for no less than 12km depth at static pressure, was strapped around the robot arm which unfortunately failed to scoop up any samples.

There's no particular reason to suppose that the watch will have failed to function throughout, as the Deep Sea Special attached to the bathyscaphe Trieste, making the first descent to the bottom of the world back in 1960, had no problems. ®

Bootnote

For a change of pace, you might like to join in the argument about poseur's dive watches in our new Forums section as opposed to the usual Comments.

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.