Feeds

Buzz goes orienteering on Google Maps

Meta Web2.0rhea handed compass

High performance access to file storage

Google has slotted the mobile version of its privacy-lite Buzz feature into its Maps site in a move to make its creepy realtime Tweetbookish tech more popular.

The company announced the addition of a read-only Buzz layer in Google Maps yesterday. It’s now available from the “More” button located in the top right-hand corner of the map interface.

We’ve added a few screen shots from Google Maps with Buzz switched on to give our readers an idea of how easy it is to follow stalk someone’s location and latest meanderings via the site.

Buzz maps in Iceland - one lone soul

And not one mention of a certain volcano...

Mountain View is pushing Buzz via its Google Maps for Mobile offering in an effort to presumably encourage take up of the feature, however when we tested it out at Vulture Central, most of the, er, buzz appeared to be coming from Twitter.

And, based on a completely unscientific online hike across the globe, its worldwide usage is currently miniscule, 24 hours in.

Not much Buzz in Russia

Not much Buzz in that there Russia

"Find an interesting area like your neighborhood and select any available icon to see what’s going on there. In the post’s window, click on the name to see the author’s public profile, the timestamp to comment on the post, or the place to see it in Maps," said Google software wonks Ana Ulin and Evan Parker in a joint blog post.

The Chocolate Factory has approached this particular strategic Buzz play with an element of caution by making the feature read-only from the desktop, presumably while the company continues to lick its wounds over the privacy howler it made at launch of the product, which was bolted onto Gmail without Google consulting its users first.

Aussie Buzz tweet gets shirty with Facebook

Web2.0rhea eats itself in Oz

However, while two-way communication isn’t possible yet, it’s fair to assume that Google will eventually ramp this up in its Maps site. And even if it doesn’t, it's extremely easy to track any Buzz user gullible enough to leave their profile wide open for prying eyes. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.