Feeds

You want a $100 computer? For $300? No sale!

No Laptop per Rich Child

High performance access to file storage

One Laptop per Child (OLPC), a non-profit organisation with the goal of providing children in developing nations with laptop computers, today announced that "contrary to previously published reports OLPC has no plans to make the XO laptops available for sale to the general public."

Sad news for Computerworld's Frank Hayes who says he wants one.

Exactly where the idea comes from that the things would be generally for sale, isn't clear. Well, nearly; it came from the Consumer Electronics Show, where Michalis Bletsas, chief connectivity officer for the project, was quoted saying that eBay could be a partner to sell the laptop. "If we started selling the laptop now, we would do very good business," Mr Bletsas, told BBC News.

The Bletsas interview was long and detailed, and it's hard to understand how it might be wrong. But yesterday, the OLPC project went to the trouble of putting out a denial. OLPC founder Nicholas Negroponte: "Contrary to recent reports, One Laptop per Child is not planning a consumer version of its current XO laptop, designed for the poorest and most remote children in the world."

He said that the XO "will be made available to governments in very large quantities to be given to all children free, as part of the education system."

The denial went on: "Many commercial ventures have been considered and proposed that may surface in 2008 or beyond, one of which is ‘buy 2 and get 1.’ In addition, OLPC is launching OLPC Foundation later this month, specifically to accommodate the huge goodwill and charity that has surfaced around the idea of a $100 laptop."

Which leaves Frank Hayes miffed: "Look, these machines. They're cute, colorful, rugged, and even at $300 each or more they'd be an inexpensive and very welcome addition to any long car trip with kids. Selling them to the general public would be a great way to raise extra money for the project, raise awareness of the project and generally feed the OLPC/XO machinery" he wrote.

Copyright © Newswireless.net

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.