Feeds

Limbaugh: If you hate Apple then you're a lefty blog-o-twat hipster

'Pro-Samsung, Google, Android guys are faking news to make it look bad for Apple'

Seven Steps to Software Security

Conservative radio jock Rush Limbaugh has discovered the existence of bloggers and determined they hate Apple and, thusly, Republicans.

Limbaugh reckoned love for Android, Google and Samsung is the only thing that can explain why bloggers have been laying into the iPhone and iPad maker lately. Nine out of 10 tech bloggers are biased against Apple, Limbaugh predicted based on absolutely no factual data whatsoever and without having met "a blogger".

Limbaugh is the most popular radio host in the US and his audience of millions are known as “ditto heads” for subscribing to their leader’s views.

Limbaugh added that the bloggers are probably Democrats, "most of them think they're young and hip, pop culture hip, that's high-tech, of course it would be".

Republicans to them, he says, “must seem like aliens from Mars, racists, sexists [and] bigot homophobes.”

Here's the "theory": Apple is just like the Republican party in that the latter is a victim of a cruel bias in the “mainstream” media while Apple is similarly trashed online by bloggers, we're told. So, according to Limbaugh, Apple fans are getting at a taste of what it’s like to be a Republican.

That’s the theory, anyway, and it’s all one big “teachable moment” for poor young Apple-backing bloggers such as John Gruber of Daring Fireball.

According to a transcript published on Limbaugh's website, here: “Apple is the equivalent of the Republicans on these blogs, and Google, Android, and Samsung are the equivalent of the Democrats. They're perfect, they can't do anything wrong, they're ideal, and everybody hates Apple.”

The portly pundit continued: “Pro-Samsung and Google, Android guys are faking data, faking news to make it look bad for Apple when it really isn't.”

The host declined to say which blogs had been “ripping Apple to shreds,” but he seems to have been told by one of his show’s researchers about how some blogs earlier this year had mindlessly picked up and recited some suspect sales data that wrongly said Google’s Nexus 7 beat the iPad in Japan.

In March 2012, tech companies were among advertisers who abandoned his programme after he attacked Georgetown law student Sandra Fluke for calling on employers to include contraception in medical insurance provided by employers – he went on to apologise for the remark.

Among his pet theories: the Obama-government-controlled US meteorological office in 2012 predicted that a hurricane was going to hit Tampa, Florida, to put the frighteners on Republican party members heading to their national convention in the city, and smart meters “give government the power to wirelessly control your heat, your air conditioning, your water flow, your electricity all from the cozy central office." ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.