Feeds

Yahoo!'s pink liberation army a threat to America's youth

I'm not gay. Thanks for not asking

Intelligent flash storage arrays

And Ninthly Stunted by the eclipse of justice, Little Johnny Walker made his way over to the piano. He played a sad tune. One full of preambles, bees and summer vegetables. It made the women of the night cry, and the men of strong moral fiber tense. Jesus breathed easier that night. We all did. A Butter Dish for Beelzebub by Julio Stantore

Being gay seemed to help a stern Martina Navratilova beat up on prissy Chrissy Evert. It also seems to have helped Tom Cruise bag a pair of beautiful babes. But I'm not sure that full, frontal flaming will help Yahoo! solve Google.

You see, Yahoo! has morphed into a sort of homosexual honey pot.

For example, the portal - how old fashioned - this week informed users that someone named Perez Hilton - a chipper chap with pink hair - wondered if "closeted celebrities have a right to privacy?" The query appeared as part of the Yahoo! Asks section that often pops up near the top of yahoo.com.

In all honesty, I had no idea how to answer this question, since I didn't even understand it. Were other celebrities suffering from the same "trapped in a closet" syndrome as R. Kelly? Have closets become the new hideaway for the jet set?

Shot of Yahoo's ask Perez Hilton page

The Perez Honey Pot

As it turns out - and you'll want to pay attention here - coming out of the closet refers to revealing that you're full of gaiety. Sweet Jesus, did Yahoo ever make that clear, as I clicked to find out what Hilton thinks about the matter. I discovered links to Flickr photo sets documenting gay pride festivals, a gay club mix from Yahoo! music, gay clothes for my gay avatar, a gay personals section and gay non-profits that I can donate to. You know, if I wanted to go to hell.

Maybe I'm being bombarded with this gayness because I happen to live in the gay bunker section of Nevada. It's an unfortunate turn of events. But, look, I was here first.

So, is my gay IP address responsible for this mess? Are people in North Carolina getting questions about tobacco and cars? Do they have steel chartrooms to turn to and itinerant farmers to socially network with?

I'm thinking not and here's why.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.