Feeds

Apple moans over sex toy ad

iGasm gets lawyer's knickers in a twist

Security for virtualized datacentres

Apple isn't tickled over an Ann Summers sex toy ad that mimics the company's iconic silhouette ipod campaign.

News of the World reports Apple lawyers are flushed over sex shops hawking a £30 iGasm peripheral, which plugs into a music player and vibrates to the beat.

The ads picture the silhouette of a woman on bended knee with familiar white wires leading from ears, to peripheral, to — ah — down there. By the looks of things, she is very pleased with her purchase.

Like a grandmother banging on a bathroom door, demanding to know what you could possibly be doing in there that takes thirty five minutes, Apple is seeking to put a stop to such ribaldry.

Apple has released the cease and desist hounds, but NotW reports the stores aren't bowing to Apple's threats.

Apple has form here: last December it grumbled about iPod-driven sex toy the iBuzz being promoted with a silhouette image not dissimilar to one of its own iPod promos.

Ann Summers boss Jacqueline Gold told the publication: "Perhaps I can send them an iGasm to put a smile back on their faces!" ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.