Feeds

Hardware hackers get second Bugs bite

Modular Linux goodies return

Boost IT visibility and business value

Hardware hackers can soon start building their own Linux gadgets with a fresh batch of Lego-like building blocks from Bug Labs.

Bug Labs told The Reg it's targeting "late September/early October" for a second release of BUGmodules, version 1.3. Bug Labs had said earlier this month it hoped for release this week, but also warned at the time things could slip.

Version 1.3 will see completely new modules offering GSM, WiFi and ZigBee wireless - along with an upgrade to the existing BUGbase unit that these and existing modules plug into. The BUGbase is also adopting SD flash memory to provide capacity at a low price.

Blogged about and expected is a new build system - Poky replacing Linux Target Image Builder (LTIB). Poky is based on Open Embedded, which offers a large package library for those building systems on Bug Labs. The Bug Labs team had tested the JamVM virtual machine as part of a move off phoneME mobile stack, but is sticking with PhoneME for the moment.

During a recent interview, Bug Labs member Ken Gilmer told us the plan is to supply a larger number of devices than it did during this spring's first release, as these had quickly sold out. Bug Labs is not saying how many units it sold then or how many it plans this time.

BUGlabs family

Gone, baby, gone: the first generation of Bugs

Bug Labs launched its initial modules with a view to letting people build their own hardware with a mix-and-match architecture. Some have seen this as paving the way for DIY consumer gadgets, as the family included a monitor, digital camera, GPS receiver and motion detector.

While the hardware is fairly basic - and a world away from a finished consumer product - Gilmer said they have encouraged experimentation.

Gilmer claimed strong interest among those in academia and vertical sectors, and people using Java and the modular OSGi architecture.

The new batch is designed to reach a broad number of people including those working in web services and kernel development. "We are trying to embrace a lot of people at the same time," Gilmer said. "In the Java world, people get it. Most of the interest is at the Linux layer".®

Boost IT visibility and business value

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.