Feeds

Famous Five remake with added technology

Internet, WAP and lashings of ginger beer

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A remake of the TV series of Enid Blyton's "Famous Five" will have the main protagonists using the Internet and WAP phones in their adventures.

"The New Famous Five" will be made by the same group that was responsible for "Byker Grove." Peter Murphy, director of programming at Zenith commented: "Our aim is to bring Famous Five into the 21st century while at the same time keeping the core values of the Blyton books."

The owners' of Blyton's books could not say whether the new version would be more up to date with its representation of the boys and girls. Readers of the stories probably remember the boys chasing round doing interesting stuff while Anne cooked dinner. And even George was never really allowed to join in.

In the updated version this could be represented as the boys working to crack the bad guys' encryption, while the girls order Pizza on their WAP phones and bring round Jolt cola, instead of Ginger Beer.

The series will be thirteen episodes long, and there will be a series of new books to accompany it. ®

Related Stories

Internet startup 'Drama' on BBC2

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.