Feeds

Internet embraces teledildonics

Saddam Hussein boosts robosex industry

Seven Steps to Software Security

Researchers and industry types in the emerging self-pollution field of teledildonics are pushing their vision of a future where people hook all manner of sex toys up to their computers.

A recent meeting heard that Sinulate Entertainment, which markets such devices for the romantically challenged, has already sold thousands of online mutual onanism kits, Reuters reports. President Steve Rhodes said: “The Iraq war...was kind of a boom for our company,” presumably in the form of lonely squaddies.

Gina Lynn, Wired's sex columnist, has apparently "used and enjoyed" the system in the name of journalism, according to Reuters. She said: “people are still really afraid of any sort of combination of sex and technology and the internet. What people are missing here is the point, which is the human connection that we are facilitating through the technology.”

Julia Heiman, director of the Kinsey Institute for Research in Sex said that the prospect is of being able to create an ideal partner. She opined: “What is very likely to be present before 2016 would be a multi-sensual experience of virtual sex. There is a possibility of developing erotic materials that would allow you to create a partner of certain dimensions and qualities.”

Teledildonics skeptics abound too though. San Francisco sexologist Carol Queen said: “I do find that a world full of people getting it on with you know, perfect gizmos instead of each other has some sort of a post-Orwellian kind of sense to it. I don't really think most people are going to want this.”

Quite.®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.