Feeds

Driving some value into Google's Street View

The Reg calls on Google to open Street View

High performance access to file storage

So Googlers are driving their cars around the UK at the moment snapping pictures of every bit of every road and everyone and everything around them - and causing a bit of a privacy hoopla.

Perhaps Google should pay some penance for its evil. As luck would have it, we’ve got a lovely idea for how it can redeem itself.

But first, some back story.

Mapping is a murky business. UK taxpayers have the pleasure of supporting Ordnance Survey’s activities to create maps of the entire UK. Ordnance Survey then gleefully sells these maps back to us, so we can actually use the maps we helped pay to create. Google Maps might be free to you, at the point of service, but behind the scenes Google are handing over cash for the rights to use those maps. It is similar to what it is doing with YouTube and all those pesky video "rights holders".

As The Guardian notes: "Nearly half of the OS's revenue comes from selling its data to the public sector, and the public sector is funded by us, the taxpayers."

Back in 2004 a small bunch of rebels came along and set up Open Street Map. This is the mapping equivalent of Wikipedia. Take your GPS and go walk, cycle or drive around a bit. Upload the data from the GPS to your computer, drop it into the Open Street Wiki Map and, bam!, instant "open source" Map 2.0 of the UK for everyone to use. And no annoying royalties to pay for the privilege. Plus permissive licences to use the data as you see fit.

Nice idea, right? Here’s what they had achieved by May 2006, almost two years after starting:

May 2006. Click for larger

Amazingly, two years later, they had this:

July 2008. Click for larger

The live map lets you explore further.

After a little more detail? Try the festive city of Edinburgh in May 2006:

May 2006. Click for larger

Compared to two years later, July 2008:

July 2008. Click for larger

Again, the live map has more.

A lot happened in two years, but the progress has much more to do with pictures from space than it does with geeks wandering the streets with GPS trackers.

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.