Feeds

Taiwan hit by sudden outbreak of rebranding madness

Strategy Boutiques strike to deadly effect

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

LogoWatch In June last year we reported of a particularly nasty outbreak of whalesong-driven rebranding madness in Spain and France.

This highly-infectious disease - symptomised by dynamic power brunches where the words "thrust" and "synergy" hang in the joss-stick fuelled smog like corporate mantras - appeared to have been contained within the EU. No further outbreaks were confirmed during 2003, even among British firms who are traditionally highly susceptible to attack by flipchart-bearing Strategy Boutiques.

That Cyberlink logo in full

So it is with a chill in our hearts that we announce today an extremely serious case in the unlikely location of Taiwan. We say unlikely, because the Taiwanese normally have better things to do than push back the envelope of the corporate paradigm. Until now. Take it away the all-new, all-singing, all-dancing

Cyberlink logo

:

The new logo is a representation of CyberLink's energy and professional spirit, and a reflection of a company that has integrity, welcomes change and strives for innovation. In an ever-changing digital multimedia market where speed is the key to success, the slanting 'CyberLink' connotes activity, fast motion, and implies of never standing still. Meanwhile bold type depicts the company's sustainable business model and the professional approach that CyberLink takes to dealing with customers. The red platform reflects employees' passion, strength, and vision, in tackling new market opportunities. CyberLink's record is of identifying new markets and going directly for them with speed and the aim to be the number one.

"2004 will be a year of changes; only those who are willing to change can succeed," said Alice H. Chang. "As a leader in the DVD software market, this new logo reflects our technological dynamism, characterises our ongoing professionalism and symbolises our speed and agility in this ever-changing industry."



It's clear that the relevent authorities must deploy every available resource to contain this jibberish before it spreads to the great financial centres of the Orient. The effects of a full-scale epidemic are too terrifying to contemplate. ®

Next gen security for virtualised datacentres

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.