Find Me on Facebook
Follow Me on Twitter
Add Me on LinkedIn
Mail Me
Read my Feeds

Google challenges Apple with video chat service

Google has launched its own video chat service for Android smartphones to compete with the Facetime application on the iPhone.

The Nexus S, Android operating system smartphone
The Nexus S, Android operating system smartphone Photo: AFP/GETTY

And unlike the Apple software, the video chat update to Google Talk works over 3G as well as WiFi networks. It uses the front-mounted cameras on high-end Android handsets.
According to the Google Mobile Blog, the new feature will be rolled out to the firm's own-brand Nexus S smartphone "in the next few weeks" as part of the Android 2.3.4 update.
Other smartphones running Google's mobile OS, such Samsung's Galaxy range, will get the update at an unspecified later date.
The service will go up against Apple's Facetime app, which was launched alongside the iPhone 4 last year, as well as third part apps such as Skype and Fring. Google has the advantage of integrating its video chat software with users' Gmail contacts list,
"You can now video or voice chat with your friends, family and colleagues right from your Android phone, whether they're on their compatible Android tablet or phone, or using Gmail with Google Talk on their computer," Google said.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Google doodles William-Kate's royal wedding

Google on Friday marked the wedding of Prince William and Catherine Middleton with a doodle that features a London street scene and the royal carriage carrying the newlyweds in a shower of confetti.
After their marriage, Prince William and Kate will become The Duke and Duchess of Cambridge. This is Google's first doodle honouring a wedding.
The Google logo on Friday was replaced by the picture of the ornate horse-drawn wedding carriage, Westminster Abbey, a princess's castle and the London Eye in the background amidst a shower of red and white confetti.
Google doodles William-Kate's royal wedding
The image takes users to search results for the British royal wedding with the top entry leading in to a live screening of the ceremony.
Wedding guests in elegant attire filed into Westminster Abbey and royal fans lined the streets of London by the thousands, hoping to snatch a glimpse of history as Prince William weds Kate Middleton in a marriage expected to revitalize the royal brand.
A third of the planet was forecast to be watching Friday as the future king and queen of England start their lives as husband and wife with the two simple words "I will," ending months of buildup with the most public of spectacles.
Google doodles have gained immense popularity over the past few years and the Google team has put out commemorative doodles on events ranging from news events, civic milestones, birthdays, death anniversaries and important dates in history.
Doodles have celebrated the Fourth of July, the Olympics, and John Lennon's 70th birthday. Google estimates it has created more than 900 doodles since 1998, with 270 of them running in 2010. Some appear globally, and others are tailored for local markets outside the US, such as Kenya Independence Day.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Sony's missteps through the years

Sony is a venerable name in the world of consumer electronics. This is, after all, the company that invented the CD, the Walkman, the Blu-ray Disc, and has made a deep impression on the tech world and mainstream culture.
That's why when Sony screws up--something a company is apt to do every now and again while in business more than half a century--it's notable. Sometimes it's a singular event, other times it's a product with high expectations that ends up being a dud.
The latest mistake, the hacking of PlayStation Network customers' personal data, is a big one, though when put in the context of past events, it may not actually be the worst thing ever to befall Sony.
In light of the latest misstep this week, we've rounded up some of Sony's most memorable blunders. Did we forget any? Leave them in the comments below.
PSN Hack
Anyone can be the target of a malicious hacking on the Web, but when it's a company like Sony, and 75 million names, e-mail addresses, birth dates, and addresses are at stake, it's big news.
Sony still hasn't said who hacked into its PlayStation Network and got access to the personal data of its customers, but it has said it's fairly sure credit card numbers were not exposed.
Sony's PS3
(Credit: Sony)
Still, what's angered most customers has been the lack of communication from the company--it took Sony a week after finding out about the security breach to inform customers--and the revelation that names, e-mail addresses, birth dates, and passwords were not encrypted.
Sony has still not said how it plans to compensate customers. At least one has an idea: an Alabama man is suing the company for free credit reporting services, as well as monetary damages for having his personal information illegally accessed.
Rootkit Scandal 
Sony got into trouble in November 2005 when it was discovered that the company used a rootkit on music CDs to limit the number of copies a person could make of the CD and to prevent making MP3 files from the music.
The rootkit was a bad idea for several reasons. It hid from the user the fact that Sony had placed this copy protection, it sent information about the CD being played to Sony, and it had a loophole that a hacker could use to hide a virus that could take over someone's computer. There was also no easy way to uninstall it.
As far as betraying customers' trust goes, that's pretty high up there on the list of things that are hard to recover from.
Faulty Lithium-ion batteries
Just a year later, another controversy exploded. Literally. Though Sony is a relatively small player in selling PCs, it does a big business selling laptop batteries to basically all of its competitors.
In the summer of 2006, reports of laptops smoking or bursting into flames began to crop up. Turns out a pretty big batch of Sony's lithium-ion batteries, which all the flaming laptops were using, were defective. The problem came to light when Dell was forced to recall more than 4 million laptop batteries made by Sony. Eventually Apple issued a recall for 1.8 million notebook batteries, as did Gateway (now part of Acer), Toshiba, Lenovo, Fujitsu, and obviously Sony itself.
Original PS3: late and expensive
Though it's a certifiable hit today--obviously the PSN story wouldn't have quite the impact if there weren't legions of customers--you might recall that when the PlayStation 3 finally hit store shelves, it did so under a cloud. It was delivered months later than originally planned, and by the time it was available, a cheaper Xbox had beaten it to market.
At $599, the 60GB PS3 was expensive--and Sony was said to be losing a lot of money on the console. Plenty of people lined up for it, but at first it was to cash in on the limited availability and resell the gadgets at insane prices. Many first customers who were avid PlayStation gamers were sorely disappointed by the lack of backward compatibility between the PS3 and many original PlayStation and PS2 games--a lack made worse by what these people saw as a dearth of compelling PS3 titles.
Failure to Connect
Sony's first attempt to build an iTunes competitor, known as Connect, did not go well. Begun in 2005, the 14-month-long project was, as one Sony insider put it, an unmitigated disaster. Because no one was happy with the final product, it was never set for official release in the U.S.--only Europe and Japan. Connect also highlighted the deep disconnects between the different silos within the company--a problem Chairman and CEO Sir Howard Stringer is still working to rectify.
Addiction to proprietary formats
This one is an ongoing problem for Sony: the company's insistence on using proprietary formats in its electronics. Sony is obviously not the only company to use proprietary technology, but Sony has been around for so long that the pattern has become apparent.
The Wi-Fi enabled DSC-G3 camera.For example, when it originally debuted, the PlayStation Portable came with a new format for portable games: UMD (universal media disc). Not a terrible move. But Sony stumbled when it then tried to push UMD as a new way of buying movie content. While UMD had enough storage to hold a video game, it wasn't big enough to compete with the amount of content a studio could squeeze onto a DVD. You also couldn't write to the disc to copy your own content onto it, and there was no way of outputting the video to a television.
Eventually most movie studios declined to re-up their participation in UMD, and when the updated PSP was released in 2009 Sony ditched the format altogether.
Other proprietary formats, like Memory Stick (Sony's version of an SD card), seemed like a way to boost one Sony business (storage) with another (requiring it for use in cameras or portable devices). It didn't make nearly the headway that SD cards did. Sony finally threw up the white flag on that battle at CES 2010 when it announced its cameras would accept SD cards in addition to Memory Stick, and even that Sony would manufacture SD cards itself.
The Wi-Fi enabled DSC-G3 camera
(Credit: Sarah Tew/CNET)
For more format losers, see also HiFD ("the floppy disk of the 21st century!") and Blu-spec CD (what is that, you ask? Exactly).
Great specs, lousy implementation: the Wi-Fi camera
The Cybershot DSC-G3 Wi-Fi camera was the centerpiece of Sony's camera marketing bonanza at CES 2009, but it's largely now considered a dud. True, we here at CNET awarded the 10-megapixel, 4X zoom G3 the Best of CES award in the camera category that year, based on its impressive specs and Wi-Fi access that purported to allow easy wireless uploading of photos directly to the Web.
But the $499 price point, combined with the lack of 3G and only Wi-Fi, meant there wasn't always a guarantee you'd be within range of a connection that would let you upload your pictures. Plus the actual experience of using the Wi-Fi feature was a disappointment. So while it was a product packed with arguably great specs, it hasn't by any means caught on with customers.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Five questions for Sony about PSN breach

After a week of PlayStation users wondering why they couldn't access PlayStation Network, Sony dropped the bomb yesterday: someone had gained access illegally to the personal information of more than 75 million of its users, forcing the company to shut down PlayStation Network and rebuild it, along with the related media download service Qriocity.
Sony had issued a few brief updates late last week and over the weekend acknowledging the service's outage and then an "external intrusion," but it didn't explain the consequences until yesterday.
The information exposed includes customer names; addresses; e-mail addresses; birthdays; PlayStation Network and Qriocity passwords and usernames; as well as online user handles. Sony says there is "no evidence" that credit card information was compromised, but the company advised customers to monitor their credit cards for erroneous charges anyway.
Making matters worse for customers nervous about their personal information being in the hands of someone who shouldn't have it, the service will continue to be unavailable for at least another week. And until then users have no way of resetting their password, or deleting their credit card information. Customers are, understandably, apoplectic.
So while Sony has (finally) given us useful information about the breach, there are still some big questions the company needs to answer. Here's what we'd still like to know.
Who did this and how were they able to access our information?
It's fairly basic, but it's the question on everyone's mind. How was anyone able to worm their way inside Sony's system? Was the security that poor? And even though someone was able to get the data, were our names, birthdates, addresses, and passwords not encrypted?
In regard to who did this, Sony's statement yesterday used the singular when describing the breach as being the work of "an unauthorized person." One person was able to do a lot of damage.
The company has said it is basically rebuilding its PlayStation Network from the ground up to beef up security. Without more answers, all of this calls into question Sony's security and whether the company can be trusted with this type of information again.
Why did it take a week to inform customers their credit card information may have been exposed?
Sony has told us the company found out on April 19, a Tuesday, that someone had accessed user information on PSN. The company did not inform the 75 million registered users of PSN and Qriocity that their personal information had been exposed until April 26, the following Tuesday. Customers are understandably angry, and some are even suing.
Sony did offer this explanation late Tuesday night: When the company found out on April 19 about the hack, it hired a private security firm to do a "forensic analysis" to figure out what, if any personal data, had been stolen or exposed.
But a week is a long time. If the company was even thinking that personal information, and especially credit card information, was in the hands of someone illegally, customers would obviously want to know.
Most states have laws that require companies to notify customers when sensitive personal information has been exposed, including social security numbers and credit card numbers, which could be used for financial and identity fraud. But since Sony has said it "has no evidence" that credit card information was exposed, it doesn't appear the company has violated any state laws by waiting to tell customers.
The timing of Sony's informing its customers has also attracted the attention of Sen. Richard Blumenthal, a Connecticut Democrat who yesterday wrote a letter to Jack Tretton, president and chief executive of Sony Computer Entertainment America, saying he was troubled that the company had not notified customers sooner about the breach. He also called for Sony to provide affected customers with financial data security services, including free access to credit reporting services for two years to protect against identity theft.
Have you contacted law enforcement?
The company has so far refused to answer this question. In response to a query from CNET, Sony issued this statement: "To ensure the confidentiality and effectiveness of this investigation, we cannot discuss details at this time."
How is Sony compensating customers?
While it's free to sign up for PlayStation Network, much of the content that can be downloaded requires a separate subscription to use, and every day that customers can't access that content, they're essentially losing money for something they've prepaid for. And it's not just games.
Other examples include the Netflix app that can be downloaded from the PSN Store and used to access Netflix's Watch Instantly subscription feature; MLB.TV's $100-per-season game package, which lets users watch MLB games on a TV via the PS3; the paid version of Hulu, Hulu Plus; and more.
PSN Plus customers are also losing money, since they pay for year or several month blocks of time to access exclusive content from PSN. As of now, they are also unable to play some games they've already downloaded because PSN has to be operational to play.
What happens to files stored in PSN Plus cloud backup service?
In March, Sony introduced a new feature of PSN Plus that lets gamers store 150MB of saved game data on their PSN account. In other words, users who paid for it could back up game data already saved to their console remotely to this cloud storage service as well.
But now that Sony has shut down PSN and is "rebuilding" it, will all of that data still be there when the service is restored next week?
We'll update this story when we get more information.
  • While credit card data was encrypted, personal information of customers was not. "But (it) was, of course, behind a very sophisticated security system that was breached in a malicious attack," wrote Sony spokesman Patrick Seybold.
  • Sony says it's working with law enforcement but has yet to disclose which branch or agency.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

John James Audubon and the “Birds of America” celebrated by Google Doodle

John James Audubon Google DoodleGoogle’s John James Audubon Doodle “catalogued.”

Google is celebrating the 226th birthday of French-American Ornithologist and painter John James Audubon today, with a very simple and minimalist tweaked logo. Apparently, the popular logo of the search engine giant is hidden inside the Audubon doodle.
According to John James Audubon’s Wikipedia entry, he’s still popular today after cataloguing and describing a lot of birds of North America “in a manner far superior to what had gone before.” From Snowy Heron, Brown Pelican to Wild Turkey, a total of 435 continent-native birds were beautifully drawn by Audubon.
I checked a popular online store to see if there are available Audubon books and I found few versions of  ”Birds of America” sporting different tag prices and different covers. The most expensive is worth $260, while the cheapest is around $116. There are also coloring books for kids worth $3.95 each.
Last week, Google also tweaked their logo to celebrate the Earth Day.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Samsung countersues Apple over patents

Hit by a lawsuit from Apple last week, Samsung returned the favor yesterday, countersuing the iPhone and iPad maker over claims of patent infringement.
In its suit filed in Seoul Central District Court, Samsung claims that Apple is violating five different patents. Samsung has also filed a suit in Tokyo, citing two patent infringements, and another in Manheim, Germany, citing three instances of infringement.
A statement on the Samsung Web site says that the company is "responding actively to the legal action taken against us in order to protect our intellectual property and to ensure our continued innovation and growth in the mobile communications business."
More specifically, Samsung is claiming that Apple has violated several key patents. A Samsung spokesman told CNET that the infringements cited in the legal filing include:
• HSPA telecommunications technology for transmission optimization and the reduction of power usage during data transmission,
• WCDMA telecommunications technology for reducing date transmission errors, and
• technology for tethering a mobile phone to a PC to enable the PC to utilize the phone's wireless data connection.
Last week, Apple launched its case against Samsung, claiming that Samsung's smartphones and new tablet violate Apple's intellectual property rights in the design of mobile devices. Apple's suit is targeting Samsung's Galaxy phones and Galaxy Tab tablet, as well as some of the company's other smartphones, claiming that Samsung has copied Apple's user interface and design.
"Apple is quite annoyed by Samsung's fast rise in a market which it virtually created," James Song, an analyst at Daewoo Securities, told Reuters today. "It's quite threatening to see how quickly Samsung plays catchup, and Apple might have felt a strong urge to put a brake on its march just when Samsung is set to roll out a new smartphone in May ahead of its new iPhone."
Samsung is due to release its new Galaxy S II smartphone at the beginning of May. Currently, the company offers a range of phones as part of its Galaxy lineup, including the Galaxy S 4G, the Galaxy Indulge, and the Galaxy Prevail.
The company is also lining up new editions of its Galaxy Tab to join its current 7-inch tablet. In the works are a 10.1-inch dual-core edition and two "thin" models, one with an 8.9-inch display and the other with a 10.1-inch display.
The legal parry and thrust could jeopardize the relationship between the two companies, notes Reuters, as Apple leans heavily on Samsung to supply chips and LCD displays for the iPhone and iPad. The two also reportedly have a huge deal in the works in which Apple would secure $7.8 billion worth of displays and processors from Samsung.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Verizon shares in iPhone love

Verizon Wireless raked in valuable new wireless subscribers in the first quarter of 2011 as the company launched the Apple iPhone and introduced its first 4G LTE phone.
The carrier said today that it more than doubled the number of customers it added on service contracts compared to last year with 906,000 new postpaid wireless subscribers. In total the company added 1.8 million new wireless subscribers. Rival AT&T yesterday announced that it had added 2 million new wireless subscribers, but only 62,000 of those customers were on contract.
At the end of the quarter, Verizon had 104 million total wireless connections, which includes 88.4 million retail customers.
Verizon reported overall earnings of 51 cents per share in the first quarter. And revenue was up slightly to $26.99 billion, from $26.91 billion a year ago. Equity analysts had expected Verizon to earn 50 cents a share on sales of $26.9 billion.
When the iPhone made its debut on the Verizon network in February, the company was quick to trumpet that the Apple smartphone produced the most successful first-day sales in Verizon Wireless history. And during the remainder of the quarter, the company sold 2.2 million iPhones. By contrast, AT&T said yesterday that it sold 3.6 million new iPhones in the first quarter of 2011.
Verizon Chief Financial Officer Fran Shammo said during a conference call with investors that the bulk of iPhone subscribers were existing Verizon subscribers who upgraded their devices. But nearly a quarter (about 22 percent) of the new iPhone subscribers were also new subscribers to Verizon.
Shammo wouldn't say when a new Apple iPhone would hit the market or whether the next version will be a 4G LTE device. But he did say that the new device will be a "world" phone, which means it will also include a GSM radio for overseas roaming. The current iPhone 4 on Verizon only has a CDMA radio, which means it is unable to roam onto GSM networks in Europe and other places in the world.
Shammo also touted the company's 4G network. Verizon launched the 4G LTE network in 36 markets in the fourth quarter. And it has quickly grown the network. Shammo said that during the first quarter, Verizon sold 500,000 4G devices, including 260,000 HTC Thunderbolts. The Thunderbolt is the first of several 4G smartphone handsets to launch on Verizon's network. It just went on sale two weeks ago.
Shammo added that new 4G handsets from Samsung and LG, which had been announced at the Consumer Electronics Show in January, will hit the market by the end of the second quarter. But he did not mention when the Motorola Droid Bionic will launch--the Wall Street Journal reported this week that it will be delayed until the third quarter.
Altogether Verizon saw strong sales in its smartphone business. In fact, Shammo said that smartphones made up 60 percent of new device sales during the quarter. This is key because smartphone customers also tend to be postpaid subscribers on contract.
Contract customers are important for wireless companies, because they tend to spend more money per month. And they do not leave the service as readily. Verizon announced that it had a churn rate, or the rate at which users leave its service, of 1.01 percent for customers who are on contract. Total churn for all wireless services was about 1.33 percent.
But the iPhone and other smartphones come at a cost in terms of profit margins. Verizon must spend money to subsidize these phones, which cuts into margins. During the first quarter, Verizon had profit margin of 43.7 percent. A year ago, it posted margins of 46 percent.
Still, Verizon and other carriers believe that selling high-end smartphones is worth the dip in margins, because these customers generate more revenue over the life of their contract.
In terms of its wireline business, total revenue revenue fell 2.2 percent to $10.14 billion. But the company did add more Fios customers, including 207,000 FiOS TV customers and 192,000 FiOS Internet customers.
Verizon has largely remained neutral about the proposed $39 billion merger between AT&T and T-Mobile USA. During the call, Shammo reiterated the company's stance, but he said that the company would oppose restrictions or conditions put on the merger that would mandate further Net neutrality regulations and force roaming arrangements.
Sprint Nextel, the third largest nationwide wireless operator, has been forcefully opposing the merger, stating that it would kill competition and stifle innovation in wireless.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Google Toolbar for IE goes Instant

While Google Toolbar 7 for Firefox launched several months ago, the Internet Explorer version (download) went live just this week. It brings Google Instant to the popular toolbar, along with more robust privacy options and a cleaner interface.
Although the support for Google Instant search is the most notable feature improvement in version 7, what appears most interesting is the way that the toolbar lets you know that features like Instant that require tracking to work actually do track you. While this might not be news to some, it's a strong reminder that many of the data-rich features that people love do come at a cost to personal privacy.
Enabling the features is easy. After installation, which unfortunately requires a reboot of all your open browsers, the toolbar walks you through activating Instant and opens a tab with Google's toolbar tutorial video. If you choose to install without activating Instant, you can do it later by going to the Options menu. The Option menu is now accessible from the Wrench icon, just as it is in Chrome. The Options menu is also where you can toggle privacy features after installing, under the Privacy tab. A new hot key combo, Alt+G, will jump you directly into the toolbar's search box.
For people who want to have a different default search engine in Internet Explorer, this can be a clever way to have two search engines accessible directly from the keyboard.
Along with the Wrench icon, much of the toolbar's look has been tweaked to make it look more like Chrome. App icons are identical to those used for Chrome extensions, and the vertical tab choices in the Options menu also resemble the current Chrome menu.
One excellent feature in Internet Explorer 9 is that it tells you what kind of performance impact your add-ons have on the browser. My installation of Google Toolbar 7 impacted browser start time by zero seconds, according to IE's add-on management window. That is a massive improvement for a toolbar's reputation, when most are notorious for slowing down the browser launch.
It's important to note that the Internet Explorer Google Toolbar installer will also install the Google Toolbar for Firefox. You must later go into Firefox and disable it, if you only want it in one browser.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Android data tied to users? Some say yes

Location tracking compared Google acknowledged today that it collects location information from Android devices, but downplayed concerns about privacy by saying the information is not "traceable to a specific user."
That claim, it turns out, depends on the definition of "traceable."
According to detailed records provided to CNET by a security researcher, Android phones regularly connect to Google.com and disgorge a miniature data dump that includes time down to the millisecond, current and recent GPS coordinates, nearby Wi-Fi network addresses, and two 16-letter strings representing a device ID that's unique to each phone.
Apple, which came under fire this week after reports that approximate location data is stored in perpetuity on iPhones, also collects such data through the Internet. It acknowledged (PDF) to Congress last year that "cell tower and Wi-Fi access point information" is "intermittently" collected and "transmitted to Apple" every 12 hours, but has refused to elaborate. (See CNET's FAQ on the topic.)
(Credit: Declan McCullagh)
Assembling a database of locations can raise privacy concerns. While Android's device ID isn't a name or phone number, it uniquely identifies each phone and is linked to its whereabouts, which means Google might be able to trace the location of an Android phone over months or even years. Less is known about what data Apple collects, including whether a unique device ID is transmitted.
A Google representative said she would not immediately be able to respond to a list of questions posed by CNET this afternoon. The company's statement says: "We provide users with notice and control over the collection, sharing, and use of location in order to provide a better mobile experience on Android devices. Any location data that is sent back to Google location servers is anonymized and is not tied or traceable to a specific user."
"It's not tied to a user," says Samy Kamkar, who provided the Android connection logs to CNET. "But it is a unique identifier to that phone that never changes unless you do a factory reset."
An Android setup screen references these ongoing location updates, saying that choosing to enable location services allows Google to "collect anonymous location data," even when "no applications are running." But that disclosure does not acknowledge that a unique device ID is transmitted. (See a screen snapshot.)
It's difficult to know how significant the privacy risks are. That depends in large part on whether Google anonymizes the location information and device ID that it collects from Android devices--and, especially, how long data is kept.
Excerpts from Android connection-logging done by Samy Kamkar. CNET has redacted his device ID and Wi-Fi MAC address.
Marc Rotenberg, executive director of the Electronic Privacy Information Center, is skeptical of Google's claim that the data is not "traceable" to a specific person. "If you can link a person's address with their activity," he says, "bingo! It's personal data."
Excerpts from Android connection-logging done by Samy Kamkar. CNET has redacted his device ID and Wi-Fi MAC address. Click for a larger image.
Requesting cell phone location information from wireless carriers has become a staple of criminal investigations, often without search warrants being sought. It's not clear how often legal requests for these records have been sent to Google and Apple, or whether the companies have required a judge's signature on a search warrant, the most privacy-protective approach, or settled for less.
The Android device ID can be tied to a person without a minimum of number-crunching, said Kamkar, a onetime hacker with a colorful past. Google can determine that "this is probably their home address because they're there at 3 a.m. every single day," he said. And "this is probably their work address because they're there between 9 a.m. and 5 p.m. every day."
Even though police are tapping into the locations of mobile phones thousands of times a year by contacting AT&T, Verizon, and other carriers, the legal ground rules remain unclear, and federal privacy laws written a generation ago are ambiguous at best. The Obama Justice Department has claimed that no warrant is required for historical location information. (CNET was the first to report on warrantless cell tracking, in 2005.)
"I think it's important that people know what's happening" inside their phones, Kamkar said.
Like iOS devices, Android phones do collect location information in a local file. But they seem to erase it relatively quickly instead of saving it forever. Swedish programer Magnus Eriksson has highlighted a portion of the Android source code suggesting a maximum of 50 cell tower locations are retained, which a source close to Google indicates is correct.
Here are the questions, still unanswered, that CNET posed to Google this afternoon:
I've been looking into this a bit more. It appears that Android phones send an HTTP POST data packet to Google, specifically this URL: http://www.google.com/loc/m/api
Included in the POST packet are a series of strings, including:
- carrier name
- time packet was sent, down to the millisecond
- MAC address, name, signal strength of the Wi-Fi network in use
- MAC address, name, signal strength for other visible Wi-Fi networks
- lat/long GPS coordinates of the phone
- other lat/long pairs and times associated with them (showing motion)
- Two 16-byte strings that are uniquely tied to that Android device
The last field is the important one. It doesn't include a name or phone number, but it is traceable to a specific user. If I'm at a certain home address every evening, and at a certain work address every day from 9 a.m.-5 p.m., it's pretty clear who I am.
So my questions are:
- Why doesn't Google randomize those two 16-byte strings (let's call them the device ID) on an hourly or daily basis?
- Given a street address or pair of GPS coordinates, is Google able to produce the complete location logs associated with that device ID, if legally required to do so?
- Given a device ID, is Google able to produce the complete location logs associated with it, if legally required to do so?
- Given a MAC address of an access point, is Google able to produce the device IDs and location data associated with it, if legally required to do so?
- How long are these location logs and device ID logs kept?
- If they are partially anonymized after a certain time, how is that done, and can those records be restored from a backup if Google is legally required to do so?
- How many law enforcement requests or forms of compulsory process have you received for access to any portion of this database?
- Why have you assembled this location and device ID database? My current theory is that it shows traffic on Google Maps where street data would be otherwise unavailable (a very useful feature, but one that doesn't appear to require keeping fixed device IDs).
- How are the device ID strings calculated?
- Did Alma Whitten approve this form of device ID logging? If not, what internal process did you use to vet any possible privacy concerns?
- If Google knows that a Gmail user is connecting from a home network IP address every evening, it would be trivial to link that with an Android phone's device ID that also connects via that IP address. Does Google do that?
- Does Android store only a maximum of 50 cell records and 200 Wi-Fi records?
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Charlie Chaplin Google Doodle

With a video starring workers of the same company, Google paid ​​an entertaining tribute to actor Charles Chaplin (1889 -1977)who would have turned 122 years on Friday.The video uses the aesthetics of the first black and white film. This is a short silent film in which Charlie Chaplin’s double is reading a’Google’ newspaper and an artist is painting a still life of the Google logo.
This is not the first  time Google changes its logo on a special date.Generally, Google celebrates birthdays,anniversaries and global events like the World Cup,with alterations in the design of its official logo.These changes of logos are known as’doodles’and are custom logos used by Google to commemorate dates.
Special days such as Christmas,Halloween,Valentine’s Day and St. Patrick’s Day have also had their own logos.
In a video doodle,Google also celebrated what would have been John Lennon’s 70th birthday.This video can be seen on YouTube.”
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Facebook fixes bug affecting Hotmail users

Facebook has fixed a bug in the site's password reset feature that could have been exploited to expo
se passwords of a small number of users who also use Hotmail.
"We can access password of any facebook user who uses hotmail email address as their facebook account," Turkish security researcher Serkan Gencel, wrote in an e-mail to CNET this weekend. "If you have any hotmail account and if it is used as facebook account, we can change and send you your new password:)."
A Facebook spokesman released a statement today confirming the bug and saying it had been fixed.
"We were notified of this vulnerability by a Turkish security researcher via our white hat queue, and we worked to quickly resolve the problem," the statement said.
"When properly notified, we will quickly investigate all legitimate reports of security vulnerabilities and fix potential problems, and have adopted a responsible disclosure policy to encourage notifications," the statement said. "We encourage security researchers who identify security problems to embrace the practice of notifying Web site security teams of problems and giving them time to fix the problems before making any information public."
The company also thanked the researchers for "bringing this to our attention, and demonstrating the value of responsible disclosure."
The problem was covered on this Turkish news Web site.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

'Twilight' fans targeted in Facebook scam

New scam tricks people into thinking they will get to play a new game related to "Twilight" teen vampire movies.
New scam tricks people into thinking they will get to play a new game related to the "Twilight" teen vampire movies.
(Credit: Sophos)
Fans of the "Twilight" movies are falling prey to a scam that can end up hijacking their accounts and sending the scam on to unsuspecting friends.
Facebook updates are circulating that look like promotions of a game related to the upcoming teen vampire movie, "Twilight Breaking Dawn," according to this Sophos blog post.
The link leads to what looks like a Facebook page with a "play now" button that when clicked surreptitiously "likes" the link and spreads it on a visitor's Facebook account.
It doesn't stop there. A dialog box pops up asking for permission for a third-party application to access the victim's Facebook account to post messages and photos, Sophos said. And then the victim is asked to fill out a survey to "verify" their account. The scammer makes money off every survey completed. (This Sophos video shows how to clean up a computer after being scammed.)
It's unclear how widespread the scam is as a Facebook spokesman said the company does not comment on the volume of attacks or specific cases. However, he did tell CNET in an e-mail that: "We are currently tracking this scam and are working to shut down the spammy vectors + remediate any users who have been affected."
Facebook also offers these tips on its Security page:
  1. Don't click on strange links, even if they're from friends, and notify the person if you see something suspicious.
  2. Don't click on friend requests from unknown parties.
  3. Review your security settings and consider enabling log-in notifications. They're in the drop-down box under Account on the upper right-hand corner of your FB home page.
  4. If you come across a scam, report it so that it can be taken down.
  5. Don't download any applications you aren't certain about.
  6. For using Facebook from places like hotels and airports, text "otp" to 32665 for a one-time password to your account.
Victims are tricked into spreading the scam.
Victims are tricked into spreading the scam.
(Credit: Sophos)

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Report: U.S. to issue terror alerts via Facebook, Twitter

The Department of Homeland Security plans to replace its color-coded, five-level system of terrorism alerts with a new two-tiered approach later this month and will issue some public alerts via Facebook and Twitter, according to a report.
The Associated Press reported today that it had obtained a confidential, departmental document outlining the plan, which, though not yet finalized, is set to go into effect by April 27.
According to the AP, the new plan will ditch the notoriously perplexing, green-to-red, low-to-severe-risk system put in place in 2002 with a two-level system that labels threats as either "elevated" or "imminent."
The department is hoping to make the system more usable and accessible. And it seems to be responding, in part, to recommendations such as those made in a report issued in 2009 by the Homeland Security Advisory Council.
At that time, hacker Jeff Moss, organizer of the Defcon hacking conference and a then-new appointee to the advisory council, told CNET's Elinor Mills that the council had suggested, among other things, that Homeland Security:
  • Reduce the number of threat levels.
  • Localize warnings and include more details (without jeopardizing law-enforcement. efforts)
  • Automatically lower a status level if no terrorist activity had occurred.
  • Use various avenues, including social media, to spread the word.
Moss said at the time:
Let's say there's another [Hurricane] Katrina, a huge weather alert, or a terrorist attack, and you want to get the information out to everybody. Right now the only way to do that is to activate the whole emergency broadcast system or the emergency action system and have everybody's radio tell you--which they didn't even use during the World Trade Center attacks...
I have one of those emergency weather radios because we get a lot of storms [in Seattle], and my radio is constantly going off telling me about specific storms. [But] it doesn't go off when there's a terrorist attacking my country? I just turned it off and threw it away. It's useless.
So what if you could have a feed coming from DHS and other government agencies, say, to Twitter or Facebook or MySpace or whatever? And you subscribe to that channel or that feed? End users would know it's still the official word; it hasn't been modified or changed. There has to be some official ways of distributing this alert information in many different ways.
In criticizing the current style of alert, Moss asked, "How does it give [civilians] any actionable information? How should we change our behavior based on it?"
The AP report suggests that the department is trying to address such questions. The news service said that in addition to cutting the number of levels and tapping social media for alerts "when appropriate," the department plans to make its warnings more specific and to issue them to more-specific audiences. If, for example, a plot was discovered to hide bombs inside backpacks at airports, instead of issuing a blanket alert, DHS would limit the warning to airports and ask travelers to be extra vigilant in reporting unattended baggage.
The AP said the new "elevated" threat level "would warn of a credible threat against the U.S. It probably would not specify timing or targets, but it could reveal terrorist trends that intelligence officials believe should be shared in order to prevent an attack." And it said the "imminent" level would be reserved for a "credible, specific, and impending terrorist threat or an ongoing attack against the U.S."
Both levels of alert would be called off if no terrorist activity ensued: the elevated level would expire after no more than 30 days, the imminent level after no more than 7. Both, however, could be extended if necessary.
Any public warnings issued using Facebook, Twitter, or other such outlets would first be communicated to federal, state, and local officials. And some might not be issued to the public at all, if doing so would undermine efforts to head off any attacks, the AP reported.
Again, though, the plan could be modified before its implementation. Homeland Security spokeswoman Amy Kudwa told the AP, "The plan is not yet final, as we will continue to meet...with our partners to finalize a plan that meets everyone's needs."
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Google, DOJ sign deal to approve ITA acquisition

Google has won regulatory approval for its $700 million deal to buy ITA Software, but the Justice Department intends to keep a close eye on the search giant.
The proposed settlement, which still must be approved by a federal judge, requires Google to continue licensing ITA's travel technology to rivals for five years on "reasonable and nondiscriminatory" terms. Some of those rivals, such as Kayak and Hotwire, formed FairSearch.org to oppose the deal.
While that provision was expected, the agency also required Google to forward to it any complaints the company receives from travel competitors upset about where they land in Google's search rankings. It's short of forcing Google to alter its search algorithms, something the company would be loath to do. But it does put the government one step further into Google's core business.
"This is a signal that the department remains concerned about Google's general power on the Internet," said Tom Barnett, former head of the antitrust division of the U.S. Justice Department and a lawyer for Expedia. The travel site is a member of FairSearch.org.
The deal, announced today, requires Google to continue to license software from the Cambridge, Mass., company--which feeds the most popular travel Web sites data--on reasonable terms. That's important to companies such as Expedia, Kayak, and Hotwire, which worry that Google will set up a rival site and not give them information necessary to compete.
The settlement also calls for Google to erect a firewall to prevent unauthorized use of competitively sensitive information and data gathered from ITA's customers.
"The Department of Justice's proposed remedy promotes robust competition for airfare Web sites by ensuring those Web sites will continue to have access to ITA's pricing and shopping software," Joseph Wayland, deputy assistant attorney general of the Justice Department's antitrust division, said in a statement. "The proposed settlement assures that airfare comparison and booking Web sites will be able to compete effectively, providing benefits to consumers."
Google said it is pleased with the outcome. In a blog post, the company said it intends for ITA to operate "with business as usual." The company has also committed to letting ITA's customers extend contracts into 2016.
"We're confident that by combining ITA's expertise with Google's technology we'll be able to develop exciting new flight search tools for all our users," Jeff Huber, Google's senior vice president of commerce and local, wrote in the blog post.
While the bulk of the agreement focused on providing rivals with fair and reasonable access to ITA's software, the provision requiring Google to forward complaints to regulators may be interesting. It promises increased regulatory oversight of the company.
"It gives the Department of Justice some periodic insight into what people think of Google's conduct," said Bruce McDonald, an antitrust lawyer at Jones Day and a former Justice Department antitrust division deputy assistant attorney general. "It could give the department information about complaints that it wouldn't otherwise have."
And that could lead to more action from trustbusters.
The Justice Department also filed a complaint to block the merger in the event that the settlement is not approved. In that complaint, the agency alleges that, "The acquisition of ITA by Google is likely to lessen competition substantially in the market for comparative flight search services in the United States."
That's because Google seems likely to use ITA's technology for its own flight search service, something that would put it in direct competition with the Expedias and Kayaks of the world. "After acquiring (ITA's technology), Google will have the ability and incentive to foreclose competing (travel Web sites') access to (ITA's technology) and thereby weaken the ability of its rivals to compete," according to the complaint.
While Google's travel rivals opposed the deal, they welcomed the settlement that will ultimately allow the acquisition to go through. FairSearch.org hailed the new oversight and enforcement tools as a "clear win for consumers." The group, though, cautioned regulators to continue to monitor Google's behavior. "While this enforcement action is an important victory, Google's abuse of its search dominance still threatens competition and consumers in many critical areas of online services," the organization wrote in a blog post. "Antitrust enforcers and lawmakers in the U.S. and elsewhere must remain vigilant in their investigation of these larger concerns and take whatever further enforcement actions are needed to protect consumers."
With the new reporting mechanism, it's clear that Google's dealings with regulators will only grow. Three years ago, the Justice Department planned to file a suit against Google's proposed search advertising partnership with Yahoo, which led Google to kill the deal. Google also suffered a loss last month when a federal judge shot down a settlement the company struck with authors and publishers in a bid to digitize every book ever published, citing antitrust concerns, among others.
Google is also tangling with regulators in Europe. In November, the European Commission opened an investigation into complaints that it was skewing search results against rivals. Last week, Google's biggest rival, Microsoft, filed a formal complaint with European regulators, alleging that Google unfairly walls off access to content and data from competitors.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Facebook hopes to spur data-center innovation

In order to meet the extreme demands put on its servers, Facebook has designed its own servers and data-center setup. Now, with a project called the Open Compute Project, it's sharing those plans with partners and competitors alike in the hopes that it will help push the evolution of data-center design. Here are a few photos from today's event, held in Palo Alto, Calif. For more details on the project

Facebook's new three-column data center, which holds 90 servers.Amir Michael shows off a view inside one of Facebook's data centers, where he chose to use 7-cent-apiece blue LED lights instead of the cheaper 2-cent-apiece green LED lights, just because he thought it looked better.

Mark Zuckerberg introduces the team who developed new integrated server and data centers in Palo Alto today.One of the new servers on display at Facebook's HQ in Palo Alto. A small team of Facebook engineers spent the past two years tackling a big challenge: how to scale the massive computing infrastructure in the most efficient and economical way possible.At a panel on data-center development at Facebook today (from left): Lanham Napier, chief executive officer of Rackspace Hosting; Frank Frankovsky, director of hardware design and supply chain at Facebook; Mike Locatis from the Department of Energy; Jason Allen, chief technical officer of Zynga; and Forrest Norrod, vice president and general manager for worldwide server platforms at Dell.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Privacy dispute tests Obama's earlier promises

An emerging dispute over electronic privacy is testing whether President Obama will live up to his promise to protect Americans' online rights.
Earlier this week, the U.S. Department of Justice criticized changes backed by Internet companies and privacy groups that would update a 1986 federal law to extend greater legal protections to cloud-computing and mobile-device users.
Yet strengthening privacy laws is precisely what Obama pledged during the 2008 presidential campaign. He told CNET at the time that: "I will work with leading legislators, privacy advocates, and business leaders to strengthen both voluntary and legally required privacy protections."
Well, that was then. Now the Obama administration has come under fire for neglecting to honor the president's commitment, even though the Digital Due Process coalition has been active and advocating for reform for more than a year. Members include Amazon.com, AOL, eBay, Google, Microsoft, Intel, AT&T, the ACLU, and Americans for Tax Reform.
The odd ways a 1986 privacy law provides less (or more) protection to an e-mail message, depending on what stage it's in.
"You're not doing what you said you're going to do," says Brad Jansen, head of the Center for Financial Privacy and Human Rights and a coalition member. "A lot of us had higher expectations for President Obama, so there's a bit of disappointment."
The odd ways a 1986 privacy law provides less (or more) protection to an e-mail message, depending on what stage it's in.
(Credit: Ryan Radia/CEI)
Obama's privacy promise was a cornerstone of his technology platform. His campaign Web site pledged that as president, he would "strengthen privacy protections for the digital age." (PDF)
The coalition is hoping to update the 1986 Electronic Communications Privacy Act, or ECPA, which is notoriously convoluted and difficult even for judges to follow. Under ECPA, Internet users enjoy more privacy rights if they store data locally, a legal hiccup that coalition members fear could slow the shift to cloud-based services unless it's changed to require police to obtain a search warrant to access private communications.
In addition, they say that search warrants supported by the Fourth Amendment's requirement of probable cause should be required to track locations of mobile devices--a requirement that's not always the case today. 
But the Justice Department has now laid out a point-by-point rejoinder to three of the coalition's four principles, which it says would, if adopted, have an "adverse impact" on investigations. Last year, federal prosecutors told an appeals court that Americans enjoy no reasonable expectation of privacy in their--or their mobile device's--location.
Another way to put it, perhaps, is that law enforcement concerns are where pro-privacy initiatives go to die.
The White House did not immediately respond to a request for comment.
James Baker, an associate deputy attorney general, told the Senate Judiciary Committee on Wednesday that the administration has not yet figured out where it stands on reforming ECPA. "We don't have a cleared position yet from the administration on these proposals," he said.
One reason is that the Commerce Department has advocated a more pro-business perspective in discussions that have been taking place behind closed doors. The department's general counsel, Cameron Kerry, said the discussions are ongoing and they're "moving as quickly as we can toward an administration white paper."
James Baker, the associate deputy attorney general, says proposed privacy amendments could endanger 'human life' Kerry, the younger brother of former presidential candidate John Kerry, and Assistant Attorney General Christopher Schroeder last October were named co-chairmen of an interagency subcommittee on privacy. It's charged with developing a "public policy direction" for the entire administration; other members represent the Treasury Department, the Department of Homeland Security, and White House cybersecurity staff.
"It takes time to sort through those views and come to a consensus," said Greg Nojeim, senior counsel at the Center for Democracy and Technology, which is coordinating the Digital Due Process coalition. It's not too late for Obama to take a leadership role on electronic privacy, says Ryan Radia, a technology analyst at the Competitive Enterprise Institute, also a member of the coalition. "Instead of devoting his political capital to imposing a 'Do Not Track' regulatory regime," Radia says, "the president's top priority should be to instruct the Justice and Commerce departments to support extending the probable cause requirement to cover law enforcement access to the contents of electronic communications and cell (location) information."
This week, a group of conservative and libertarian groups sent a letter to senators urging them to move "immediately" to "extend the Fourth Amendment's protections against the unreasonable search and seizure of digital documents and other electronic information." (PDF) It was signed by groups including the Competitive Enterprise Institute, TechFreedom, FreedomWorks, and the Liberty Coalition.
History suggests that it can take years to reach an agreement on privacy when law enforcement's views are diametrically opposed to those of businesses and civil libertarians. Perhaps the closest parallel was the political trench warfare over encryption regulations in the 1990s, during which the FBI successfully blocked attempts to reform the Cold War-era laws that were supported by a similarly broad coalition of consumer groups and technology companies.
There was no rhetorical mountain too steep for then-FBI director Louis Freeh to climb. In 1997, Freeh told a Senate panel that "uncrackable encryption will allow drug lords, terrorists, and even violent gangs to communicate with impunity." He predicted that relaxing federal regulations would let crypto "proliferate to the point where any kidnapper or any drug dealer could purchase it off the shelf and connect up with a network which would make all of those activities covert."
It took the better part of a decade for the White House to side with privacy interests over law enforcement. In an echo of the Digital Due Process coalition today, the Clinton administration's eventual decision was catalyzed by the Americans for Computer Privacy lobby group, which brought together the leading tech companies of the era: Microsoft, Netscape, and Oracle. The Center for Democracy and Technology helped to organize it, as it has helped to coordinate the Digital Due Process coalition, and the ACLU and the Electronic Frontier Foundation also lent a hand.
"The real test is how Obama as president will referee these institutional vested interests," says Brad Jansen of the Center for Financial Privacy and Human Rights. "He could choose not to choose--in which case he's essentially siding with the Department of Justice as opposed to updating the laws and taking new technologies into consideration."

Here's how the Justice Department's testimony squares with the coalition's principles:
Digital Due Process Coalition Principle No. 1 An Internet or telecommunications provider may "disclose communications that are not readily accessible to the public only with a search warrant issued based on a showing of probable cause."
Justice Department's response (PDF): A warrant is too restrictive because "if a person stores documents in her home, the government may use a subpoena to compel production of those documents." In addition, "not all federal agencies have authority to obtain search warrants." Finally, there's the potential "adverse impact on criminal as well as national security investigations if a probable cause warrant were the only means to obtain such stored communications."
Digital Due Process Coalition Principle No. 2: Police may access "prospectively or retrospectively, location information regarding a mobile communications device only with a warrant."
Justice Department's response: For less precise information from cell towers, a "requirement of probable cause has hampered the government's ability to obtain important information in investigations of serious crimes." A warrant should be used only for "prospective E-911 Phase II geolocation data," typically "derived from GPS or multilateration."
Digital Due Process Coalition Principle No. 3: Police should be allowed to access "prospectively or in real time, dialed number information, e-mail to and from information, or other data currently covered by the authority for pen registers and trap and trace devices only after judicial review and a court finding" that specific and articulable facts show it's relevant and material to an ongoing criminal investigation. That's a lower standard than a search warrant's probable cause requirement, but in practice perhaps not that much lower.
Justice Department's response: It "makes sense that a person using a communication service should be able to consent to another person monitoring addressing information associated with her communications." (In a 2006 brief to the Sixth Circuit in Warshak, the Justice Department argued there could be a terms-of-service exemption: "The Fourth Amendment allows a third party to consent to the search of another's container when the owner expressly authorize[s] the third party to give consent...Any expectation of privacy can be waived, even in a service available to the public.")

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Microsoft: Office 2010 SP1 coming this summer

Microsoft plans to deliver the first service pack for Office 2010 this summer, as scheduled.
"We are on track for delivering Office 2010 SP1 and SharePoint 2010 SP1 in mid-summer 2011," the Microsoft Office Sustained Engineering Team wrote in a blog post.
The company will release more details about the service pack, including a tentative release schedule, at its TechEd North America conference in mid-May in Atlanta.
The service pack will include language updates for 40 different localized versions of the productivity suite of software. It will also feature a collection of security fixes that have dribbled out since the product was introduced last May, and a few other security updates as well.
Office 2010 is the fastest selling version of the productivity suite. Microsoft also plans its first service pack for its SharePoint 2010 collaboration software as well this summer.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Google begins tablet version of Chrome OS

A Google mock-up from last year of a Chrome OS tablet is coming to fruition. 

A Google mock-up from last year of a Chrome OS tablet is coming to fruition. (Credit: Google)
Details in Google's source code reveal that company programmers have begun building a tablet version of Chrome OS, its browser-based operating system.
The work isn't a surprise, given that Google created mock-ups of a Chrome OS tablet more than a year ago. But it does indicate that a tablet incarnation of Google's Web-app operating system is a near-term priority, not just an idea.
Google acknowledged the tablet version of Chrome OS but wouldn't discuss details such as when the project's first version will be done. "We are engaging in early open-source work for the tablet form factor, but we have nothing new to announce at this time," the company said in a statement.
Chrome OS tablets, though, are not first on the list, the company said: "Chrome OS was designed from the beginning to work across a variety of form factors. We expect to see different partners build different kinds of devices based on Chrome OS, but for this initial release we are targeting the notebook form factor."
Chrome OS has been evolving since Google announced it in 2009. Initially it was aimed at Netbooks, the small, low-end laptops. But the first incarnation of Chrome OS--a pilot release intended for developers and testers rather than ordinary customers--arrived in a more polished laptop package called the Cr-48.
A tablet version of Chrome OS, though, raises a big question about Google's strategy, because the company's tablet version of the Android operating system, Honeycomb, is just now arriving on the market with Motorola's Xoom and other products designed to compete with the leader of the tablet market, Apple's iPad.

Signs of Chrome OS for tablets
A number of changes in Chrome and Chrome OS source code that arrived in March and April reveal the tablet work. Among them:
• The "user-agent string" text that browsers supply so Web servers can deliver the appropriate version of a Web site--for touch user interfaces. The string includes the term "CrOS Touch," not just CrOS as before.
"This lets Web sites that are already customizing for tablet experiences easily adapt to support tablet ChromeOS devices," the programming change log notes.
• A "virtual keyboard" with a number of keys--tab, delete, microphone, return, and shift, for example--drawn in SVG so they can be shown by a browser. Screen keyboards are, of course, a necessity with tablets.
• A variety of moves to make the browser more touch-friendly, for example by increasing the space around items to make it easier to select them with a touch interface.
• A revamped new-tab page (which people see when they open a new, blank tab) that's "optimized for touch." The current page shows an array of Web applications downloaded from the Chrome Web Store, but the modified version adds multiple screens of icons in the style of iOS devices.
The orientation of the new-tab page, but not its size, will change when the device is rotated, according to the new-tab page's coding annotations. "Note that this means apps will be reflowed when rotated (like iPad)," the annotation said.
The CSS code for the new-tab page also indicates that programmers would like to be able to move icons around the page, preferably with animation.

Pick a tablet, any tablet
So with Android and Chrome OS tablet software under development, what's Google's top tablet priority?
Clearly, the answer today is Android. It's at the forefront of Google's mobile strategy and is a commercial success, at least in phones. Tens of thousands of Android applications are available today, and even Google rivals such as Yahoo and Microsoft are offering software.
Chrome OS, by comparison, is immature and conceptually a greater leap from prevailing software development patterns. That's because Chrome OS solely runs apps on the browser, not on its underlying Linux operating system embedded under the covers.

There are abundant Web sites and Web apps that Chrome OS users can use today, of course, and some, like Google's Gmail site optimized for Apple's iPad, are designed with a touch user interface already. But the tools for building advanced, interactive, high-performance Web apps today just don't match what's possible with apps that run natively on a mobile device or computer, and most people today aren't ready to live solely in the cloud.
Timing also isn't on Chrome OS's side. The project had been set to launch in 2010, but has been delayed to midway through this year, though the Chrome Web Store used to bookmark and purchase Web apps is live.
Google can let both tablet projects duke it out internally and in the market. Or, if Google co-founder Sergey Brin is to believed, Android and Chrome OS might merge into a single project.
It's not a simple matter of some internal Darwinian process within Google to let the be best product survive, though. That's because there are external parties involved: hardware partners, developers, retailers, and customers.
Each of these groups must be won over, persuaded that the new ecosystem is worth their investment of time and money.
Google's modus operandi--release early and iterate often--is a lot harder to pull off when others are involved. Web applications and native Android applications are by no means mutually exclusive, but developers with finite resources can't be blamed for trying to figure out where to place their bets.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS