Feeds

Android to offer iPhone-like App Store

Google: 'That's our job'

  • alert
  • submit to reddit

High performance access to file storage

Google I/O Google will offer an iPhone-like app store for Android, giving developers a central means of distributing applications on its soon-to-be-open-source mobile platform. At least, it looks that way.

Speaking at the Google I/O developer conference in San Francisco, Android project leader Andy Rubin didn't officially announce an Android app store, but he pretty much guaranteed it's on the way.

"It would be a great benefit to the Android community to provide a place where people can go to safely and securely download content and where a billing system would allow developers to get paid for their effort," he said. "We wouldn’t have done our job if we didn’t provide something that helps developers get distribution."

Of course, if Google opens an Android app store, there's no guarantee it will actually show on every Android phone. There's no guarantee any of Google's tools will actually show up on phones.

Google is already working with more than 30 mobile industry players on the development of its Linux-based mobile stack, including handset makers and service providers, and you can bet that some OEMs will closely follow Mountain View's lead. But when Google officially releases Android "sometime in the second half of this year," it plans on open sourcing the platform under a freewheelin' Apache license. This means third-parties can tinker all they like.

"They can add to it. They can remove from it. They make it their own," Rubin said. "They can rip out all the Google stuff and put in all Yahoo! stuff."

This goes for entire APIs (application programming interfaces) as well - an obvious a point of concern for some developers mulling apps for the platform. "I see Android and I see all its APIs. What's to stop someone from turning off all those APIs?" one developer asked Rubin.

There's nothing to stop them, Rubin said. But he indicated that Google will provide tools that enable developers to easily verify the make-up of each Android handset. "We're providing a piece of technology - I can't go into a great amount of detail - that tests the APIs," he explained. "This will be a script that you'll be able to run...and determine whether all the APIs are there." ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.