Feeds

Nope, it's not a Gphone

Memories of Java

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

"Google with Android and the Open Handset Alliance, however, may blow open a marketplace through a common open platform that can then provide a lot more content, apps, data, media, and services. And that will feed the demand by developers, users, and ultimately advertisers that open platforms be provided on mobile devices."

Gardner speculates that the atmosphere around Android reminds him of the early days of Java with its idealistic goal of write once, run anywhere. He adds that the connection is more than coincidence as Google CEO Eric Schmidt lead development of Java while at Sun prior to 1997.

We certainly have no shortage of gripes with US mobile carriers: reliance on a mishmash of standards that are largely incompatible with the rest of the world; coverage that is arguably inferior to that of any other developed nation; and restriction of choices that trap customers by linking hardware and software to carrier and wireless plan. As compute platforms opened up, the market for software exploded; the emergence of smarter mobile platforms combined with new bandwidth could certainly work similar wonders in the mobile space.

But lets get off our soapbox for a moment and back to reality. Google simply announced an open source mobile platform yesterday. It's not the first time that an open platform has been proposed for the mobile world (recall the Javaphone?).

We feel that the excitement over Google's announcement yesterday was a bit overblown, as there is no assurance yet, FCC decision or not, that a Google-style open mobile market will actually materialize. But the measure of the excitement over this rather modest announcement reflects the reality that there is significant pent up demand for mobile service beyond the gimmicks like your circle of five.

This article originally appeared in onStrategies.

Copyright © 2007, onStrategies.com

Tony Baer is the principal with analyst onStrategies. With 15 years in enterprise systems and manufacturing, Tony specialises in application development, data warehousing and business applications, and is the author of several books on Java and .NET.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.