Feeds

Taser markets electric cattleprod gun to the laydeez

Available in shocking pink, naturally

Security for virtualized datacentres

It's well known that if you want to sell women stuff, it needs to be pink. There's just something about the colour that triggers a possessive lust in their illogical minds, forcing them to buy things. Apparently.

pink taser

Taser C2: the handbag just got more dangerous.

The pink girly-marketing phenomenon is already established, but today it crossed a new frontier.

Taser, maker of electric cattleprod-dart stunguns to the world's police forces, yesterday began shipments of the "highly anticipated C2 Personal Protector".

The company is making a strong push to sell this to all those girls out there who don't like nasty guns, riot gas, telescopic truncheons, or suchlike boy's toys; but who still want to be able to leave annoying people thrashing and sizzling in the dirt, Dark-Jedi style.

The C2 boasts a "non-gun design" which is "light, sleek, hand-held... can fit in a pocket or a purse." It's available in "four designer colours: Black Pearl, Titanium Silver, Electric Blue, and" - of course - "Metallic Pink."

"We designed the Taser™ C2 by listening to our customers," said Kathy Hanrahan, president of Taser. This seems a bit odd, as her customers at the moment are mainly coppers looking for an alternative to shooting people.

"Our focus since 1998 has primarily been in the law enforcement arena," admits Hanrahan. "However, over the past year our engineers were able to provide our technology for consumer self defense at an affordable price."

Base price is $300 - a trifling sum, no doubt, to see a tiresome boyfriend's skeleton flashing on and off through his skin.

"I will control my own destiny," says the Taser C2 webpage. "In today's world, maintaining self confidence involves the need for self protection. For independent, self-reliant women, the TASER™ C2 is an effective protection device that fits any lifestyle ... Buy Now."

My own destiny - pink taser billboard

And if you get in my way I will electrocute you.

"It is a woman's product," Ms Hanrahan told the New York Times, which obligingly filed its writeup in the "Fashion and Style" section.

Opinion at Vulture Towers was divided. ®

Remote control for virtualized desktops

More from The Register

next story
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
Apple CEO Tim Cook: My well-known gayness 'is a gift from GOD'
'I have benefited from the sacrifice of others'
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.