Feeds

Language-mangling Germans fling open Handygate to selfie-snapping whistleblowers

Nixon-inspired suffix crowned 'Anglicism of the Year'

Seven Steps to Software Security

The suffix "-Gate" has been honoured as the German language's "Anglicism of the Year", having recently resurged in Germany more than 40 years after the Watergate scandal spawned the popular, if awkward, English tack-on.

-Gate saw off strong competition from "Whistleblower", "Hashtag", "Fake" and, inevitably, the celebrated "Selfie" to secure the jury votes down at Anglizismus des Jahres.

The press release says the suffix's use was "sluggish" until recently, when it "exploded" with examples such as "Handygate", in reference to the US spook Merkel mobe-tapping outrage.

"Handy", The Local points out, is another Anglicism used for "mobile phone", meaning a double whammy for English in the inexorable slide of German into the Denglisch linguistic mire.

While whistleblower, selfie and hashtag need no further explanation, "Fake" - already a standalone borrowing, meaning, er, "fake" - now also operates as a prefix with an "abstract meaning component of 'spurious, fake, insincere'".

One example is "Fake-Preußentum" ("fake Prussianism"), which might be better rendered in English as "pseudo-Prussianism".

The Anglicism of the Year was established in 2010 by University of Hamburg linguist Anatol Stefanowitsch. Previous laureates include the magnificent "Shitstorm", and borrowed verb "leaken", the latter a product of the WikiLeaks rumpus. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.