Feeds

Reg readers rage at comment icon outrage

Unwashed masses fire up the Tw*t-O-Tron

  • alert
  • submit to reddit

Shaken staff at Vulture Central are today locked en masse* in the traditional darkened room sipping sweet tea following the rather adverse reaction to our redesigned comments icons.

While a few people favoured us with thoughtful analysis of the new-look El Reg, most were venting steam from both ears while foaming at the mouth and shaking uncontrollably as they struggled in blind rage to fire up the Twat-O-Tron, having realised that we'd tweaked the aforementioned images.

Well, here's evidence of the caring and tender side of The Register: As of right now, we're reinstating the key comments icons whose removal provoked the terrible wrath of the people. (Note: You may need to refresh the comment submission page to get reacquainted with Paris and your other faves.)

And there's more. For some time, we've been considering knocking together 12 further icons to make up a new row of images, the better for commentards to express their mood. However, we're simply too bone idle to do it ourselves, so are inviting you lot to suggest what might be suitable for inclusion.

Don't bother sending images, just post a comment to this story with your suggestions and we'll create the new pics based on the dozen most popular. Fair enough? Good. ®

Bootnote

* Except me, but I have swallowed the entire newsroom emergency supply of valium.

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.