Feeds

Fashion world gets cyber catwalk

Social networking makeover

Seven Steps to Software Security

Fashionistas will be waking up and logging on this morning before heading off to the oh-so-skinny-size-zero-who-looks-the-most-ridiculous-this-season-face-off that is London Fashion Week, as they now have IQONS, their very own social networking website to play with.

According to the official blurb on the website, "IQONS offers a mechanism for its members to 'connect to the highest echelons of fashion'. Influential, highly respected people from the fashion industry, which we refer to as Iqons, will review and comment on the work showcased by members of the site."

The site, which launched yesterday at London Fashion Week with support from the likes of Vivienne Westwood and John Galliano, hopes to offer its users a MySpace equivalent for the fashion world.

Aspiring wannabes hoping to get their first break in the highly-competitive world of fashion will be able to showcase their trendy talent in cyberspace.

Website co-founder Rafael Jimenez told reporters: "The fashion world was sometimes a hostile and competitive environment so this is a tool to help young designers get involved.

"If you are talented someone will spot you and you will get through," he added.

The website currently has more than 4,500 users signed up, most of whom are waiting to be plucked from obscurity.

So models, designers, buyers, and all those other trendy types who work in the fashion biz have finally woken up and smelt the skinny latte (with soya milk, of course). Now they'll get out of bed to log on and network. After all, lingering around catwalks all day can be terribly tiring, darling. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.