Feeds

Mozilla becomes latest to dump Mac OS X 10.4 support

Tiger, tiger, losing fight

High performance access to file storage

Mozilla will ditch support for Apple’s aged Mac OSX 10.4 - AKA Tiger - when it releases the next version of its Gecko rendering engine.

The open source browser maker plans to push out Gecko 1.9.3 later this year, and at the same time support for Tiger will be dropped altogether, even though the Mozilla Foundation estimates that nearly 1.5m Mac OSX 10.4 users are surfing the web with Firefox 3.5.

Meanwhile 36,000 Tiger-fanciers are running Firefox 3.6, which is Mozilla’s current iteration of its popular browser.

Firefox developer Josh Aas kicked off email discussions about the planned change last Friday.

“In September of 2009 we stopped supporting Mac OS X 10.4 (‘Tiger’) on mozilla-central [the outfit’s main repository] but we left much of the code required to support that platform in the tree in case we wanted to reverse that decision.

"We have come to a point where we need to make a final decision and either restore 10.4 support or remove this (large) amount of 10.4 specific code,” he noted.

He said that support for the Tiger operating system, which Apple released in April 2005, had been a “hindrance” to adding modern technologies to the Firefox browser.

“The approximately 25 per cent of our Mac OS X users still on 10.4 would continue to be supported by Firefox 3.6 until that product reaches end of service, which won't be until several months after the next major version of Firefox is delivered (built on Gecko 1.9.3) later this year,” he said.

However, some people aren’t happy about Mozilla’s decision to switch off Tiger's Firefox life support.

“While Mozilla may think that dropping support for Mac OS X 10.4 is a good idea, you're dead wrong,” grumbled a mysterious respondent with the tag name of Mulder.

“There is no need to do this; it's a short-sighted plan to avoid supporting well over a million users who are still running 10.4 for various reasons; i.e., they can't afford to upgrade their equipment; 10.5 and 10.6 drop or break features that work perfectly well in 10.4; that upgrading would require them to purchase new versions of software that works perfectly well under 10.4; or even that many people think both 10.5 and 10.6 suck.”

The discussions can be read in full here. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.