Doesn't work with BitLocker and a TPM chip. The key is kept in protected memory on the chip and only authenticated code can use it.
I don't think that's true. The passphrase (perhaps hashed?) pay only be in the TPM chip, but the actual cryto key used to decrypt disk sectors is in main memory, because the main CPU is used to do the decryption. There's nowhere near enough bandwidth to and from the TPM chip to let it do the actual disk encryption/decryption. There's not even enough bandwidth to ask the TPM for the key each time you want to do a disk transfer, and erase it from memory after the disk transfer is completed.
This means that software that extracts the encryption key from memory probably can't turn it back into the passphrase that the user enters, but if you have a copy of the disk and the key, you don't actually need that passphrase.
The TPM is not a high-performance device and doesn't do anything but give out the keys on (authenticated) request. What the software does with those keys is up to the software. If someone has privileged or physical access to the machine while the keys are in use, all bets are off.
Due to high cost, bubble memory was successful only in limited niches, so by the mid-1980s it was discontinued. Intel stopped development at the 4 Mbit level; I don't think the other vendors even pushed it that far. Late 1980s research results suggested the possibility of 64 Mbit devices. I suspect that the technology probably wouldn't have scaled much further anyhow.
More recently, IBM has been working on "racetrack memory", which works similarly to magnetic bubble memory.
well, you only have to "make it available"
You have to do more than "make it available". Since it is being commercially distributed, and isn't accompanied with the complete corresponding machine-readable source code, they need to satisfy section 3b of the GPLv2:
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange;
Can anyone who has a Xoom confirm whether it came with such a written offer?
As others have pointed out, this only applies to any GPL'd components of the software, which includes the Linux kernel but little else.
An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.