Feeds

Google penetrates fake sex world with Lively

Watch clips of Sadville on virtual YouTube TV

Choosing a cloud hosting partner with confidence

It starts with a hug, then some petting on top of colored balls and before you know it you're down at some 3D sex club wielding a dildo.

Yes, Google has innocently wandered into the world of casual encounters with the launch of its own 3D reality alternative to Linden Lab's Second Life.

The internet's favorite search engine has launched Lively, a virtual world where you can create and personalize an online avatar and personal room.

Rather than re-create a reality in Linden Labs' world, though, Lively lets you tap your existing online presence. You can suck in content from elsewhere on the web and embed your Lively areas onto your web properties, such as a blog, MySpace or Facebook Page using Google widgets. You can also email others using a regular web address. What will they think of next?

According to Google, you can play YouTube videos in your virtual TV, put pictures in virtual picture frames inside your virtual rooms and have your Lively rooms run on your desktop, which may or may not be virtual.

Lively rooms embedded in web sites let people "interact" through animated actions, according to Google. "In our user research, we've been amazed at how much more poignant it is to receive an animated hug than seeing the text '[[hug]]'," according to Google's blog.

And that could be where the real problem starts. According to Indiana University's Edward Castronova, sex contributes to "a substantial portion, perhaps even the majority" of economic transactions in Second Life.

At least Mac users are protected. Lively only runs on Windows XP, although it supports Internet Explorer and Firefox.

Time to buy those fake genitals you've always wanted on Google Checkout.

Think we'll go down to the pub and receive a poignant punch in the face from a human.®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.