Feeds

Microsoft nixes stripper ban for Vista launch

Show 'em if you got 'em. And El Reg does

Internet Security Threat Report 2014

The old Microsoft used to ban strippers from interrupting its product launch events.

In Sept. of 2000, Microsoft unveiled a fleet of new server software products at San Francisco's Warfield Theater - a music venue in a pretty grimy part of the city. To protect its audience from filth, Microsoft bought out the Crazy Horse strip club next door, closing down the boob parade for a few hours. The new Microsoft has cast off such Puritanical restraints, opting instead to promote the Vista operating system alongside breasts whenever possible.

Have a look for yourself here, so long as timid coworkers aren't around.

We were mistaken in assuming that Microsoft would pull back from this publicity stunt. It's shopping Vista in front of Second Life inhabitants at four sex-charged venues - a lesbian sex hangout, two gentleman's clubs and a strip club-cum-whore house.

This pornographic nonsense was the brainchild of Microsoft's European Enthusiast Evangelist Miel Van Opstal.

The Register's vulture avatar looking at Microsoft's Vista billboard inside a gentleman's club

Along with promoting sex clubs, Van Opstal made sure to draw attention to his own spot in Sadville - Strawberry Estate, which is not at all like Molestation Grove.

Despite our reservations, Microsoft can have its Vista sex clubs. After all, how can Mac OS X compete with naked women offering themselves up from atop pose stones?

The Vulture Takes Flight

While Microsoft has gone titillating, The Register has gone respectable with its entry into Sadville.

It's our pleasure to reveal the winner of our design a Second Life avatar logo contest.

Step up, Sean Parsons - a wonderful reader from Alberta.

Shot of the Register's vulture avatar

Parsons hand-crafted an exquisite vulture replete with Register logo necklace - or as we like to call it - birddallion. Our avatar can hop about, do a dance, open and close his beak when speaking and flies like no other avatar in the game.

For his efforts, Parsons will receive a generous package of El Reg merchandise.

Thanks, Sean. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.