Feeds

Dell Streak GPL snub enrages Android fans

Web 2.0 frenzy ensues

High performance access to file storage

It seems Dell hasn't quite got used to working with the GNU General Public Licence - it has failed to release some of the core code used by its Streak tablet, much to the annoyance of the open-source community.

Users of Dell's tablet/phone hybrid wouldn't notice, but Android fans are prone to a little hacking, and while some were attempting to build a replacement kernel it became clear that Dell hasn't been as open with its source as it should have been:

"I've just spent few hours trying to build android-msm-2.6.32 Linux kernel for Dell Streak" says smokku on the MoDaCo forums, "It turns out that it is impossible, without device specific board files. These files are in the Linux kernel source tree Dell used to build kernel for Streak and Dell is obliged under the terms of GPL, to give this source to any owner of Streak requesting it."

Nothing gets the Linux crowd more riled than someone failing to follow the GPL, which requires amendments to be shared, and the above posting is immediately followed by calls for a mass protest to flood Dell's Twitter feeds and Facebook presence.

To ensure that every Web 2.0 angle is covered, the self-styled Dell Streak Community has set up a petition to demand release of the code. It has attracted almost 300 signatures.

Not that Dell has explicitly refused to supply said code. The GPL requires no timetable for releasing source code and cooler heads on the forums do point out that the Streak team is pretty busy right now, and that it might be wiser to wait a few weeks before unleashing the full weight of protest.

But that would miss the fun of protesting from the comfort of one's chair, and enjoying the satisfaction of success when Dell releases the code (as it had probably always intended).

We've asked Dell if that is indeed its intention, and will let you know when we hear from them. ®

SANS - Survey on application security programs

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.