Feeds

Open Phones with Open Moko

Can an open Linux phone platform change the mobile application game?

The essential guide to IT transformation

While all eyes may have been on San Francisco and the launch of the developer-unfriendly Apple iPhone, the real game changers were demonstrating their strategy at CES 2007, in Las Vegas.

While the hardware may be similar, the strategy is a complete reversal of Apple's closed platform and proprietary hardware. OpenMoko is an open Linux-based mobile application development platform that's designed to help operators and developers build innovative applications on top of a basic phone platform.

That platform is the FIC neo1973, an attractive curved device with a single large VGA touch screen, and a built in GPS. While it's only GPRS, this is a first cut at delivering open hardware, so we can expect future hardware to support faster data connections.

Out of the box the FIC mobile phone has very few features. You can make calls, send text messages – and that's pretty much it. The hardware, however, is much more capable. Applications are handled in an open manner, with access to proprietary hardware functions – including location data and connectivity tools.

A set of core tools mean all applications can access finger and stylus information, with core libraries that offer UI and PIM access. Other libraries offer GSM and GPS support – so your applications can take advantage of both network and hardware features.

The philosophy behind OpenMoko is interesting – by providing capable hardware, with a good UI and basic software, the project intends to quickly build a library of available applications. Existing Linux code can be ported to OpenMoko, while an SDK means that existing development tools (and skills) can be used to create new phone-centric applications.

Like most Linux distributions OpenMoko includes an application manager tool, which can download both operator-approved or community software. It's the equivalent of apt-get for your phone, which will keep applications updated as well as providing a tool for finding new features. Advanced users can opt for community applications, while trusted operator-verified applications mean that you don't need to ride the bleeding edge.

Sean Moss-Pultz, the project's architect, expects the first samples of OpenMoko hardware to ship in March 2007. The SDK should be released at the same time, though you can sign up for early access here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.