Feeds

Mozilla becomes latest to dump Mac OS X 10.4 support

Tiger, tiger, losing fight

Build a business case: developing custom apps

Mozilla will ditch support for Apple’s aged Mac OSX 10.4 - AKA Tiger - when it releases the next version of its Gecko rendering engine.

The open source browser maker plans to push out Gecko 1.9.3 later this year, and at the same time support for Tiger will be dropped altogether, even though the Mozilla Foundation estimates that nearly 1.5m Mac OSX 10.4 users are surfing the web with Firefox 3.5.

Meanwhile 36,000 Tiger-fanciers are running Firefox 3.6, which is Mozilla’s current iteration of its popular browser.

Firefox developer Josh Aas kicked off email discussions about the planned change last Friday.

“In September of 2009 we stopped supporting Mac OS X 10.4 (‘Tiger’) on mozilla-central [the outfit’s main repository] but we left much of the code required to support that platform in the tree in case we wanted to reverse that decision.

"We have come to a point where we need to make a final decision and either restore 10.4 support or remove this (large) amount of 10.4 specific code,” he noted.

He said that support for the Tiger operating system, which Apple released in April 2005, had been a “hindrance” to adding modern technologies to the Firefox browser.

“The approximately 25 per cent of our Mac OS X users still on 10.4 would continue to be supported by Firefox 3.6 until that product reaches end of service, which won't be until several months after the next major version of Firefox is delivered (built on Gecko 1.9.3) later this year,” he said.

However, some people aren’t happy about Mozilla’s decision to switch off Tiger's Firefox life support.

“While Mozilla may think that dropping support for Mac OS X 10.4 is a good idea, you're dead wrong,” grumbled a mysterious respondent with the tag name of Mulder.

“There is no need to do this; it's a short-sighted plan to avoid supporting well over a million users who are still running 10.4 for various reasons; i.e., they can't afford to upgrade their equipment; 10.5 and 10.6 drop or break features that work perfectly well in 10.4; that upgrading would require them to purchase new versions of software that works perfectly well under 10.4; or even that many people think both 10.5 and 10.6 suck.”

The discussions can be read in full here. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.