Feeds

Reader succumbs to apostrophe apoplexy

Misplaced punctuation outrage

  • alert
  • submit to reddit

Seven Steps to Software Security

FoTW Our stateside correspondent Cade Metz had until this week managed to avoid attracting reader ire and thereby becoming a fully-fledged Reg hack via the usual FoTW baptism of fire.

Well, we're delighted to welcome Cade to the Vulture Central elite, whose membership he has deservedly earned by the following apostrophe outrage:

Between Earth and Maps, Google seems intent on serving up tightly woven digital photos of just about everything. It's ImageAmerica purchase comes just a few days after an eagle-eyed Gizmodo reader spotted a new fleet of Chevy Cobalts that will soon be snapping 360-degree photos for Google StreetView, the company's eye-level window onto the world. Enjoy your privacy while you can.

Suffice it to say, this shocking crime against punctuation has now been corrected, while Cade was subjected to the traditional punishment: two hours in the corner wearing the pointy hat followed by three weeks in our penal battalion* (writing copy for Channel Reg).

This, we reckon, should satisfy even the most fanatical grammar hardliner, but maybe not John Whitehead:

Piss poor

You claim a journalist's privilege to piss on everyone from a great height as if you've actually achieved something yourself yet you still haven't worked out how to use an apostrophe. Why should anyone begin to take you seriously? Go back to school, grow up a bit, see something of the world, work out that glibness and sophistication aren't synonyms and then try writing something worth reading.

Blimey. For the record, all Reg journos have now been signed up for an intensive apostrophe refresher course, at the end of which they will be issued with their official licences to piss on absolutely everyone from a very great height. ®

Bootnote

*He's joined by the member of El Reg's Strategy Boutique who this week sent an email declaring that we offer advertisers "cutting edge reader engagement solutions". Under interrogation, he admitted to having indulged in a brainstorm which concluded with the decision to "approach our customers/partners from a 360 degree holistic viewpoint which will allow turnkey solutions to their own unique value propositions". When shown the instruments of torture, he further confessed the whole thing had been conducted to the sound of "Medieval Monk chanting". We've got an exorcist and a specialist deprogramming team from Silicon Valley on standby. Watch this space.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.