Feeds

Linux Foundation merges MeeGo into Tizen

Linux OS always the bridesmaid

Combat fraud and increase customer satisfaction

The Linux Foundation has officially put MeeGo on the back burner and is working towards a new open source OS called Tizen, which will have a greater emphasis on HTML5 support.

MeeGo, itself a merger of Intel’s Moblin and Nokia's Maemo projects, was launched last year as a joint venture between the two companies under the auspices of the Linux Foundation. The goal was an open source, multi-use OS based around Linux and optimized for running on smaller processors, chiefly Intel’s Atom.

However, Nokia’s move to Microsoft’s sphere of influence meant that the company dropped the OS after producing a single ‘contractual obligation’ phone and developers have been dumping work on the OS in droves. Now the plan is to absorb all the work on MeeGo into a new OS, named Tizen, which will be co-developed by Intel and Samsung and which will focus more on future internet standards.

“We believe the future belongs to HTML5-based applications, outside of a relatively small percentage of apps, and we are firmly convinced that our investment needs to shift toward HTML5. Shifting to HTML5 doesn't just mean slapping a web runtime on an existing Linux, even one aimed at mobile, as MeeGo has been,” says Intel’s Imad Sousou, a MeeGo spokesman. “Emphasizing HTML5 means that APIs not visible to HTML5 programmers need not be as rigid, and can evolve with platform technology and can vary by market segment."

The plan is to have a new OS and a software development kit ready for use in the first quarter of 2012, and the OS is envisaged being used in mobile phones, tablets, automotive computing, and embedded systems, just as MeeGo was originally intended to do 18 months ago. And presumably with some success this time.

“I want to personally thank everyone who has participated in MeeGo over the past year and a half, and I encourage you to join us at Tizen.org. We hope to use what we learned from the MeeGo project to make Tizen successful,” wrote MeeGo community manager Dawn Foster in her blog statement. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.