Feeds

Hardware hackers get second Bugs bite

Modular Linux goodies return

7 Elements of Radically Simple OS Migration

Hardware hackers can soon start building their own Linux gadgets with a fresh batch of Lego-like building blocks from Bug Labs.

Bug Labs told The Reg it's targeting "late September/early October" for a second release of BUGmodules, version 1.3. Bug Labs had said earlier this month it hoped for release this week, but also warned at the time things could slip.

Version 1.3 will see completely new modules offering GSM, WiFi and ZigBee wireless - along with an upgrade to the existing BUGbase unit that these and existing modules plug into. The BUGbase is also adopting SD flash memory to provide capacity at a low price.

Blogged about and expected is a new build system - Poky replacing Linux Target Image Builder (LTIB). Poky is based on Open Embedded, which offers a large package library for those building systems on Bug Labs. The Bug Labs team had tested the JamVM virtual machine as part of a move off phoneME mobile stack, but is sticking with PhoneME for the moment.

During a recent interview, Bug Labs member Ken Gilmer told us the plan is to supply a larger number of devices than it did during this spring's first release, as these had quickly sold out. Bug Labs is not saying how many units it sold then or how many it plans this time.

BUGlabs family

Gone, baby, gone: the first generation of Bugs

Bug Labs launched its initial modules with a view to letting people build their own hardware with a mix-and-match architecture. Some have seen this as paving the way for DIY consumer gadgets, as the family included a monitor, digital camera, GPS receiver and motion detector.

While the hardware is fairly basic - and a world away from a finished consumer product - Gilmer said they have encouraged experimentation.

Gilmer claimed strong interest among those in academia and vertical sectors, and people using Java and the modular OSGi architecture.

The new batch is designed to reach a broad number of people including those working in web services and kernel development. "We are trying to embrace a lot of people at the same time," Gilmer said. "In the Java world, people get it. Most of the interest is at the Linux layer".®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cloudy CoreOS Linux distro declares itself production-ready
Lightweight, container-happy Linux gets first Stable release
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?