Feeds

Taiwan hit by sudden outbreak of rebranding madness

Strategy Boutiques strike to deadly effect

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

LogoWatch In June last year we reported of a particularly nasty outbreak of whalesong-driven rebranding madness in Spain and France.

This highly-infectious disease - symptomised by dynamic power brunches where the words "thrust" and "synergy" hang in the joss-stick fuelled smog like corporate mantras - appeared to have been contained within the EU. No further outbreaks were confirmed during 2003, even among British firms who are traditionally highly susceptible to attack by flipchart-bearing Strategy Boutiques.

That Cyberlink logo in full

So it is with a chill in our hearts that we announce today an extremely serious case in the unlikely location of Taiwan. We say unlikely, because the Taiwanese normally have better things to do than push back the envelope of the corporate paradigm. Until now. Take it away the all-new, all-singing, all-dancing

Cyberlink logo

:

The new logo is a representation of CyberLink's energy and professional spirit, and a reflection of a company that has integrity, welcomes change and strives for innovation. In an ever-changing digital multimedia market where speed is the key to success, the slanting 'CyberLink' connotes activity, fast motion, and implies of never standing still. Meanwhile bold type depicts the company's sustainable business model and the professional approach that CyberLink takes to dealing with customers. The red platform reflects employees' passion, strength, and vision, in tackling new market opportunities. CyberLink's record is of identifying new markets and going directly for them with speed and the aim to be the number one.

"2004 will be a year of changes; only those who are willing to change can succeed," said Alice H. Chang. "As a leader in the DVD software market, this new logo reflects our technological dynamism, characterises our ongoing professionalism and symbolises our speed and agility in this ever-changing industry."



It's clear that the relevent authorities must deploy every available resource to contain this jibberish before it spreads to the great financial centres of the Orient. The effects of a full-scale epidemic are too terrifying to contemplate. ®

Top three mobile application threats

More from The Register

next story
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Pirate Bay's 10 millionth upload: Colour us shocked, a SMUT FLICK
P2P badboys show online piracy is alive and humping
Teen girl arrested with 70-year-old man's four inch weapon inside her
Charged with introducing .22 snubbie to penile facility. It wasn't firing blanks
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.