Feeds

Openmoko to reveal Linux phone's inner workings

Adapt us, please

Remote control for virtualized desktops

LinuxWorld Enterprising engineers will soon get the chance to find out how Openmoko's Linux-powered phones work and to modify them.

Barely a month after shipping the Neo FreeRunner, Openmoko has said it plans to make the schematics for this - and the Neo 1973 - publicly available under a Creative Commons (CC) license.

No date was given but Openmoko promised publication in "due course" with schematics available from openmoko.com and openmoko.org.

By publishing details of the phones' construction, OpenMoko will open the door to those wanting to adapt or adopt facets of the phone going beyond just changes to the Linux operating system. Openmoko said schematics would, for example, provide information for developers who want to "leverage the GPS functionality for new designs involving the Openmoko phones."

As ever, with open source, there's also the chance to help in debugging.

Openmoko architect Werner Almesberger said in a statement that releasing the schematics would let people "find out how the system works and how to improve it."

OpenMoko currently publishes the phones' CAD files under a CC license so designers can alter the look and feel of devices or employ different materials in construction for - say - verticals or improved ruggedness.

neo_001

Neo FreeRunner: open to change

Releasing the schematics could be a further way to drive uptake of Neo FreeRunner in particular markets and build on early claimed success. Openmoko said the Neo FreeRunner sold out in less than a week following its launch on July 4. Openmoko didn't say how many devices it had in stock.

A timely release of schematics by the community driven Openmoko could capitalize on this early enthusiasm and help drive uptake against a bevy of promised phones running Linux from a range of bigger, better resourced and more focused handset providers supporting the LiMO Foundation and Google's Android through the Open Handset Alliance

Internet Security Threat Report 2014

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.