Run with MeeGo
Today's users are demanding more powerful and feature-rich devices to take with them on the go. Next-generation smartphones allow users to enjoy a rich and dynamic Internet experience, watch HD movies and multitask like never before on a small-form-factor device. The MeeGo platform is specifically designed to enable the application and services ecosystem for these mobile, rich Internet and media-centric devices.
The MeeGo v1.1 Handsets UX (Figure 10) provides a technology snapshot that offers key handset technologies, such as cellular, connectivity, sensors and mobile browsing, as well as a basic development UX for voice calling, SMS messaging, Web browsing, music and video playback, photo viewing and connection management.
With this project release, developers will be able to work on future device and user experience software development, while simultaneously participating in the MeeGo Project to complete the Handset UX in the upcoming 1.2 release.
MeeGo on Handsets
If you have access to a Nokia N900 handset or an Aava Handset, you can find step-by-step instructions on how to install and run MeeGo on those devices from meego.com/devices/handset. The instructions will guide you through installing the root filesystem on an external micro-SD card. Give it a try, and have fun experimenting with it.
The MeeGo SDK 1.1 beta was released on November 10, 2010, and it's available for download along instructions from meego.com/developers. It enables application developers to develop, install and debug applications, as well as run applications on the Nokia N900, Netbook and Aava devices with MeeGo. For developers without reference hardware, QEMU (qemu.org) provides an emulated environment for debugging and testing applications.
The MeeGo Project encourages developers to use the MeeGo API, which currently consists of Qt 4.7 and Qt Mobility 1.0. The MeeGo API comes with a forward-compatibility promise and will be extended in future releases. The final nonbeta version of the SDK will be aligned with the MeeGo compliance specification (being finalized at the time of this writing). More information on MeeGo compliance is available at wiki.meego.com/Quality/Compliance.
MeeGo is an open-source project developed in public under the auspices of the Linux Foundation. Since it was announced in February 2010, the world has been able to watch and participate as the project builds up and delivers the core software stack in addition to three reference user experiences for handsets, IVI systems and Netbooks, with more to come as MeeGo also targets connected TVs and tablets.
The development continues following a six-month release schedule. MeeGo 1.2 is scheduled for April 2011. Currently, there are hundreds of features targeting MeeGo 1.2 that already have been filed in the MeeGo Featurezilla (a tool that tracks feature development). The development tree of MeeGo 1.2 is open, and development is ongoing.
MeeGo Project: www.meego.com
Developer Resources: meego.com/developers
Mailing Lists: meego.com/community/mailing-lists
IRC Discussions: meego.com/community/irc-channel
MeeGo Source Code: meego.gitorious.org
MeeGo Bugzilla: bugs.meego.com
MeeGo Forums: meego.com/community/forum
Precompiled Images: meego.com/downloads
MeeGo Releases: meego.com/downloads/releases
MeeGo OBS: wiki.meego.com/Build_Infrastructure
Ibrahim Haddad manages the Linux Foundation's Mobile Linux initiatives and works with the community to facilitate a vendor-neutral environment for advancing the Linux platform for next-generation mobile computing devices. Ibrahim is a Contributing Editor at Linux Journal.
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems
Join editor Bill Childers and Bit9's Paul Riegle on April 27 at 12pm Central to learn how to keep your Linux systems secure.
Free to Linux Journal readers.Register Now!
|diff -u: What's New in Kernel Development||Aug 20, 2014|
|Security Hardening with Ansible||Aug 18, 2014|
|Monitoring Android Traffic with Wireshark||Aug 14, 2014|
|IndieBox: for Gamers Who Miss Boxes!||Aug 13, 2014|
|Non-Linux FOSS: a Virtualized Cisco Infrastructure?||Aug 11, 2014|
|Linux Security Threats on the Rise||Aug 08, 2014|
- diff -u: What's New in Kernel Development
- Tech Tip: Really Simple HTTP Server with Python
- NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance
- Security Hardening with Ansible
- Monitoring Android Traffic with Wireshark
- Lock-Free Multi-Producer Multi-Consumer Queue on Ring Buffer
- Validate an E-Mail Address with PHP, the Right Way
- RSS Feeds
- Kernel Korner - Why and How to Use Netlink Socket
- August 2014 Issue of Linux Journal: Programming