Feeds

iFixit CEO launches open Toshiba service guide scheme

If you use lawyers to hide your manuals, we'll write our own

Beginner's guide to SSL certificates

Kyle Wiens, head of gadget repair service iFixit - an operation best known for its device disassembly efforts - has called on owners of Toshiba laptops to help pen open source repair manuals to make good the computer makers’ closure of an independent Toshiba documentation archive.

Launching Operation Fix Toshiba, Wiens promised to connect owners of unwanted Toshiba kit with folk willing to take it apart and write repair manuals. iFixit staff will work on extending the site’s existing array of Toshiba repair guides too.

The move comes after Toshiba’s Australian wing used lawyers to force blogger Tim Hicks’ to remove Toshiba manuals from his site, Future Proof, which archives documentation for kit to ensure it’s available even after machines have reached the end of their life as products.

Toshiba’s argument is that this violates its copyright. True, of course, but when such documentation no longer has a commercial value companies like Toshiba should become less defensive, just as many games developers, for instance, turn a blind eye to making games long past their sell-by date available to fans.

Hicks’ site does more than keep computer buffs happy. To Wiens, it enables owners of old computers to keep their machines running, ensuring that equipment takes longer to become obsolete and that less of it gets chucked into landfill. Recycling is all well and good, but a lot of computer kit is disposed of sooner than necessary, when all it needs is some extra memory, a bigger hard drive or a new cooling fan.

As Hicks told The Register yesterday: “It has been argued that I am doing a public service. It is better for those manuals to be out there. If the laptop is out of warranty, what does the vendor care?”

Some might say it's yet another desperate act by an industry in decline. Toshiba's operating profit was down 23 per cent in its most recent quarter thanks to falling sales and profits at its semiconductor, TV and home appliance operations.

“Manufacturers always say that providing repair documentation will lead users to hurt themselves, and that’s what Toshiba told Tim,” said Wiens. “But when people do attempt repair, they are far more likely to damage themselves or their equipment if they don’t have a good manual with appropriate safety warnings.”

There are more details about how to participate in Operation Fix Toshiba on its Indiegogo site. ®

Intelligent flash storage arrays

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.