Feeds

Microsoft launches iPad-happy website for wimmin

Ladies night, oh what a site

Internet Security Threat Report 2014

Microsoft launched a website for women yesterday based on Adobe’s Flash technology, and it renders particularly well on Apple’s iPad.

The site's homepage animation does not currently run on Microsoft’s own Silverlight software, which is the vendor’s rival to Flash.

The Register has asked Microsoft when it plans to slot Silverlight into “Glo”. We’ll update this story when we get a response.

As for the latest MSN site, Microsoft has cobbled together a “lifestyle” portal for women in conjunction with brand partners Hachette Filipacchi Media US and BermanBraun.

According to the accompanying blurb, Glo hits all the right clichéd female notes on style, beauty, living and relationships.

Microsoft described it as “a unique escape for women on the web”, presumably because there’s so much porn and chatter about computers available online for all those sex-starved men out there.

Sadly, as far as we could tell, the company is yet to entice punters through the Glo door with offers of free drinks all night for the ladies, while men have to pay before entering the girly domain.

But Microsoft insists that Glo is “in-the-know” and provides “inspiration and practical ways” for women to “attain their best life”.

Unsurprisingly the site pulls in content from other parts of Microsoft’s online estate, including Bing and MSN.

Meanwhile, Microsoft is wooing advertisers to sign up to Glo with the following declaration.

"Glo transports women from the everyday to their best day, through smart, engaging content about style, beauty, home and relationships. Glo is there when women escape to 'me time,' delivering fun and inspiration with a smart inclusive voice, wrapped in a beautiful, sophisticated package."

All of which suggests that Microsoft has gone a bit Mel Gibson. But we're not talking Mad Max or Lethal Weapon, this is more like watching a re-run of What Women Want. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.