Feeds

Philip K. Dick's kid howls over Googlephone handle

Do Androids dream of electric sci-fi allusions?

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Philip K. Dick's daughter is "shocked and dismayed" that Google has apparently named its fabled cellphone after one of her father's creations without consulting his estate.

Isa Dick Hackett has even gone so far as to discuss the matter with her legal counsel, The New York Times reports.

On Saturday, Google confirmed that it has developed a new phone around the semi-open-source mobile operating system it calls Android, and according to press reports, the company intends to sell the device under the name "Nexus One."

The Philip K. Dick novel Do Androids Dream of Electric Sheep? concerns a bounty hunter charged with tracking down a group of escaped robots tagged with the name Nexus-6. These are said to be the sixth generation in a line of, yes, androids, and, well, you get the picture.

"In my mind, there is a very obvious connection to my father’s novel," said Isa Dick Hackett, president of the Dick estate outfit that handles licensing of his work. "We were never consulted, no requests were made, and we didn’t grant any sort of permissions."

Sheep is the basis for the cult film Blade Runner, which also uses the Nexus-6 name.

Though Google has not confirmed the name of its phone - or that it even plans to sell the thing - the "Nexus One" moniker turns up in two government filings. HTC, the Taiwanese outfit manufacturing the phone, used the name in an FCC filing, and on Friday, Google filed an application with the US Patent and Trademark Office to use the "Nexus One" handle with, yes, a cellphone.

It's worth noting that in the wake of Android's debut, Google was sued by a man who claimed to own that name. And last month, when the company introduced its new Go programming language, software architect Frank McCabe pointed out that he already uses that name for his programming language. McCabe does not have a trademark on the Go moniker, but his language is documented in a 2007 book and a 2004 research paper. ®

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Vodafone to buy 140 Phones 4u stores from stricken retailer
887 jobs 'preserved' in the process, says administrator PwC
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.