Feeds

Dell Streak GPL snub enrages Android fans

Web 2.0 frenzy ensues

Seven Steps to Software Security

It seems Dell hasn't quite got used to working with the GNU General Public Licence - it has failed to release some of the core code used by its Streak tablet, much to the annoyance of the open-source community.

Users of Dell's tablet/phone hybrid wouldn't notice, but Android fans are prone to a little hacking, and while some were attempting to build a replacement kernel it became clear that Dell hasn't been as open with its source as it should have been:

"I've just spent few hours trying to build android-msm-2.6.32 Linux kernel for Dell Streak" says smokku on the MoDaCo forums, "It turns out that it is impossible, without device specific board files. These files are in the Linux kernel source tree Dell used to build kernel for Streak and Dell is obliged under the terms of GPL, to give this source to any owner of Streak requesting it."

Nothing gets the Linux crowd more riled than someone failing to follow the GPL, which requires amendments to be shared, and the above posting is immediately followed by calls for a mass protest to flood Dell's Twitter feeds and Facebook presence.

To ensure that every Web 2.0 angle is covered, the self-styled Dell Streak Community has set up a petition to demand release of the code. It has attracted almost 300 signatures.

Not that Dell has explicitly refused to supply said code. The GPL requires no timetable for releasing source code and cooler heads on the forums do point out that the Streak team is pretty busy right now, and that it might be wiser to wait a few weeks before unleashing the full weight of protest.

But that would miss the fun of protesting from the comfort of one's chair, and enjoying the satisfaction of success when Dell releases the code (as it had probably always intended).

We've asked Dell if that is indeed its intention, and will let you know when we hear from them. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.