Feeds

Right: Which one of you lot invented 'tw*tdangle', eh?

Lingo police want your biometrics, and sharpish

Providing a secure and efficient Helpdesk

Ok, here's the deal: We at the Vulture Central Neologism Soviet want the name and personal details of whoever it was who invented the term "twatdangle", and we want them now.

The reason? Well, no one-way ticket to the Gulag for the individual responsible, rather a congratulatory free shirt from El Reg's merchandising tentacle Cash'n'Carrion.

Yes, we're rather taken by the term down here at Vulture Central. No sooner had we published this provocative piece on the galactically-talented media strumpet David Blaine hanging upside-down for, well, minutes at a time, than some bright spark got straight to work and forged the indubitably immortal new term.

However, and as the comments to our Blainito Mussolini follow-up show, there's some doubt as to who actually had the lexicographical light bulb moment.

So, was it in fact UK comedian Marcus Brigstocke, or a member of the unwashed masses? Of course, we could do the research ourselves, but we can't be arsed. Over to you lot, then.

And while you work it out, we'd like to note for those of you interested in things linguistic that, within hours of its coining, "twatdangle" had evolved from a simple noun into a verb ("to twatdangle") and an agent noun (twatdangler"). Such is the terrifying power of the English language coupled to the interweb.

To recap: We want the name, email addy and inside leg measurement of the scoundrel behind "twatdangle", Either give him up, or we'll use our IP-address-sniffing attack hounds to flush the bastard out. The clock is ticking... ®

And where is the IT angle on this story, exactly?

Ah, we're glad you asked us that. We've noted of late that, and despite previous advisories, we're still plagued by commentards disputing the validity of certain content on El Reg on the grounds it doesn't meet their own particular standards of IT purity.

Well, here's a reminder for you: If you don't like this sort of content, then don't click here, or here, or especially here. If that's too complicated for you, take a cue from the headlines to the offending articles, which often flag their non-IT content through the cunning use of words. Sorted.

Security for virtualized datacentres

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.