Pogoplug, Sheevaplug and other like devices
-
- Member
- Posts: 25
- Joined: Fri Dec 04, 2009 10:08 am
Pogoplug, Sheevaplug and other like devices
Has/is anyone looking into doing OS hacking for one of these devices?
Re: Pogoplug, Sheevaplug and other like devices
I'm not, but there is an interesting project from Bdale Garbee which is working looking at, called the FreedomBox. There's a presentation on it here.
As for OS-development specifics, they look cool but have enough tricky hardware (as shown by Bdale) that developing on them isn't trivial.
As for OS-development specifics, they look cool but have enough tricky hardware (as shown by Bdale) that developing on them isn't trivial.
Re: Pogoplug, Sheevaplug and other like devices
I'd certainly like to see more people doing OS hacking on the Bifferboard (http://www.bifferos.com), whilst the bootloader normally boots Linux it can also boot multiboot binaries, Coreboot payloads and simple binaries that are called at their load adresss. Since it's 486-compatible a lot of the stuff on osdev is relevant.
I've been fooling around with software UART code this w/e:
https://sites.google.com/site/bifferboa ... ware-uarts
regards,
Biff.
I've been fooling around with software UART code this w/e:
https://sites.google.com/site/bifferboa ... ware-uarts
regards,
Biff.
- gravaera
- Member
- Posts: 737
- Joined: Tue Jun 02, 2009 4:35 pm
- Location: Supporting the cause: Use \tabs to indent code. NOT \x20 spaces.
Re: Pogoplug, Sheevaplug and other like devices
That is most certainly an interesting board :O
17:56 < sortie> Paging is called paging because you need to draw it on pages in your notebook to succeed at it.
Re: Pogoplug, Sheevaplug and other like devices
I rather like the 1W power consumption - that's the same as an ARM Cortex-A15 with on board Mali graphics!bifferos wrote:I'd certainly like to see more people doing OS hacking on the Bifferboard (http://www.bifferos.com), whilst the bootloader normally boots Linux it can also boot multiboot binaries, Coreboot payloads and simple binaries that are called at their load adresss. Since it's 486-compatible a lot of the stuff on osdev is relevant.
I've been fooling around with software UART code this w/e:
https://sites.google.com/site/bifferboa ... ware-uarts
regards,
Biff.