Feeds

Google in crusade against neckties

Global privacy counsel obsessed with male physique

High performance access to file storage

A brief summation of Google's new privacy policies. One: Your search data will be made anonymous after it sits on the company's servers for 18 months. Two: Your Google browser cookies will expire if you don't visit the site for two years. And three: a man should not be allowed to hide his "shrinking shoulders" and "protruding paunch" behind a business suit and necktie.

Last week, after The Financial Times asked whether the necktie still has a future, Google's global privacy counsel fired off a letter to the venerable paper that clarifies the company's stance on the matter.

Photo of Red Brin

Following harsh criticism from privacy watchdogs, Google data retention guru Peter Fleischer recently unveiled changes to the company's server log and cookie policies, but he refuses to endorse the necktie, claiming that any privacy it affords is outweighed by its threat to physical health.

"It constricts circulation to the brain," he explained. "And it acts as decorative camouflage for the business suit, designed to shield the middle-aged male physique, with its shrinking shoulders and protruding paunch, from feeling sufficiently self-conscious to hit the gym."

He went on say that, in the long run, traditional business attire actually undermines trust between co-workers. "Men should lose their 'business attire' and wear T-shirts to work," he told The FT. "Wouldn't you like to know whether your business partners are fit? Why should you trust a man in business if he abuses his own body? And heaven knows what waves of creativity might be unleashed, when men are freed from conformist garb."

After The FT questioned whether alternative garb is a proper representation of male virility, Fleischer pointed to Google as proof that T-Shirt-wearing men can still have high testosterone levels: "If your fashion editor can hardly imagine a better garment for men to exhibit their personality, power and masculinity than wearing ties, well . . . I work at Google. Our unofficial motto is, 'Be serious without a suit.'"

Yes, he did say "unofficial motto," but Reg readers can rest assured that Fleisher laid out Google's necktie policy in his official capacity as global privacy counsel. There's little doubt that the company thinks its employees are overflowing with "personality, power, and masculinity."®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.