Feeds

French politicians vote non to voting machines

Not popular

Reducing security risks from open source software

Voting machines are not going down well with the political classes in France. The machines were involved in widespread problems on Sunday's ballot and, according to reports, several of the country's political parties have demanded that the technology be withdrawn.

This election was the first Presidential race in which voting machines have been used. Around 1.5 million of the 44.5 million registered voters had to vote on the machines, but according to Agence France-Presse problems with the technology meant people had to queue for up to two hours to cast their electronic ballots.

Many voters simply gave up in the face of such a long wait. Others said they did not trust the machines to protect the anonymity of their vote.

Following the difficulties, the Greens, Communists, and Socialists issued a joint statement describing the machines as "a catastrophe" and calling for them to be scrapped.

France's interior ministry says there have been no problems with the machines since they were first used in 2003, while local authorities blamed the queues on the high voter turn-out. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.