Feeds

Jolla entices hardware hackers with free device development kit

Unique 'smart covers' make modding your mobe a snap

The Power of One Brief: Top reasons to choose HP BladeSystem

Upstart Finnish smartphone company Jolla has released a developer kit that enables independent tinkerers to create devices for The Other Half (TOH), Jolla's exclusive, snap-on peripheral system.

TOH devices look like phone covers, and they snap onto the back of Jolla handsets like covers, but they contain electronics that allow each TOH device to provide additional content or functionality to the phone.

The most basic type of TOH devices provide what Jolla calls "ambiences" – bundles of wallpapers, ringtones, system sounds, and other media – so that when you snap the device onto the handset, the phone is automatically re-skinned to match the theme of the device's plastic.

Jolla itself is now selling two such add-ons, dubbed "Aloe" and "Keira Black", each of which provides a unique theme.

But TOH can be used for a wide range of other applications as well. In essence, any type of peripheral that can connect to the handset via Bluetooth or I2C can be built into a TOH cover for easy snapping onto a Jolla phone.

Each cover identifies itself to the handset via NFC, which allows the phone to automatically download any required drivers or additional software from Jolla's online store. That goes for ambience devices, too – the actual media is downloaded from the store, rather than being stored on the TOH device itself.

Jolla's developer kit includes detailed specs outlining Jolla's hardware requirements for TOH devices – explaining where you shouldn't put electronics, for example, because they'll interfere with the phone's antennas – plus model files that can be fed to 3D printers to fabricate the necessary plastic parts.

Screenshot of 3D models for Jolla's The Other Half devices

Any color that you want, as long as it looks just like this ... Jolla's kit includes printable 3D models

Perhaps the most intriguing part of the kit, however, is the license under which Jolla is offering it. Jolla phones run Sailfish OS, a mobile Linux variant, so their software has always been hacker-friendly. With the TOH development kit, Jolla has made plain that it wants its hardware ecosystem to be open, too – mostly.

Jolla's TOH developer license not only grants a perpetual license to distribute, use, and implement the TOH spec, but it also grants a perpetual license to any and all patents Jolla may own that are related to it – including ones it may be granted in the future.

It also stipulates that any developer who claims that someone else's implementation of the TOH spec violates their own rights will instantly have their license terminated – in other words, everyone play nice, and no suing each other.

There's just one stipulation: you can't charge a fee for your TOH devices, either directly or indirectly. Or rather, if that's what you want to do, you'll need to take the matter up with Jolla to work out licensing terms. There has to be some money for Jolla in here somewhere, after all. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.