Feeds

Hardware hackers get second Bugs bite

Modular Linux goodies return

The Power of One Brief: Top reasons to choose HP BladeSystem

Hardware hackers can soon start building their own Linux gadgets with a fresh batch of Lego-like building blocks from Bug Labs.

Bug Labs told The Reg it's targeting "late September/early October" for a second release of BUGmodules, version 1.3. Bug Labs had said earlier this month it hoped for release this week, but also warned at the time things could slip.

Version 1.3 will see completely new modules offering GSM, WiFi and ZigBee wireless - along with an upgrade to the existing BUGbase unit that these and existing modules plug into. The BUGbase is also adopting SD flash memory to provide capacity at a low price.

Blogged about and expected is a new build system - Poky replacing Linux Target Image Builder (LTIB). Poky is based on Open Embedded, which offers a large package library for those building systems on Bug Labs. The Bug Labs team had tested the JamVM virtual machine as part of a move off phoneME mobile stack, but is sticking with PhoneME for the moment.

During a recent interview, Bug Labs member Ken Gilmer told us the plan is to supply a larger number of devices than it did during this spring's first release, as these had quickly sold out. Bug Labs is not saying how many units it sold then or how many it plans this time.

BUGlabs family

Gone, baby, gone: the first generation of Bugs

Bug Labs launched its initial modules with a view to letting people build their own hardware with a mix-and-match architecture. Some have seen this as paving the way for DIY consumer gadgets, as the family included a monitor, digital camera, GPS receiver and motion detector.

While the hardware is fairly basic - and a world away from a finished consumer product - Gilmer said they have encouraged experimentation.

Gilmer claimed strong interest among those in academia and vertical sectors, and people using Java and the modular OSGi architecture.

The new batch is designed to reach a broad number of people including those working in web services and kernel development. "We are trying to embrace a lot of people at the same time," Gilmer said. "In the Java world, people get it. Most of the interest is at the Linux layer".®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.