Feeds

Dell Streak GPL snub enrages Android fans

Web 2.0 frenzy ensues

Remote control for virtualized desktops

It seems Dell hasn't quite got used to working with the GNU General Public Licence - it has failed to release some of the core code used by its Streak tablet, much to the annoyance of the open-source community.

Users of Dell's tablet/phone hybrid wouldn't notice, but Android fans are prone to a little hacking, and while some were attempting to build a replacement kernel it became clear that Dell hasn't been as open with its source as it should have been:

"I've just spent few hours trying to build android-msm-2.6.32 Linux kernel for Dell Streak" says smokku on the MoDaCo forums, "It turns out that it is impossible, without device specific board files. These files are in the Linux kernel source tree Dell used to build kernel for Streak and Dell is obliged under the terms of GPL, to give this source to any owner of Streak requesting it."

Nothing gets the Linux crowd more riled than someone failing to follow the GPL, which requires amendments to be shared, and the above posting is immediately followed by calls for a mass protest to flood Dell's Twitter feeds and Facebook presence.

To ensure that every Web 2.0 angle is covered, the self-styled Dell Streak Community has set up a petition to demand release of the code. It has attracted almost 300 signatures.

Not that Dell has explicitly refused to supply said code. The GPL requires no timetable for releasing source code and cooler heads on the forums do point out that the Streak team is pretty busy right now, and that it might be wiser to wait a few weeks before unleashing the full weight of protest.

But that would miss the fun of protesting from the comfort of one's chair, and enjoying the satisfaction of success when Dell releases the code (as it had probably always intended).

We've asked Dell if that is indeed its intention, and will let you know when we hear from them. ®

Internet Security Threat Report 2014

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.