Feeds

Google Cr-48: Inside the Chrome OS 'unstable isotope'

Mountain View goes to extremes

Mobile application security vulnerability report

Offline non-access

It should also go without saying that Chrome OS is close to useless if you don't have an internet connection. Some apps do offer limited offline access, such as The New York Times new installable Chrome app, and these apps will likely become more prevalent. But for the most part, if you try to use the OS while offline, you get error messages. But you can still take screenshots:

Chrome OS offline message

The limitations of an all-browser OS (click to enlarge)

To mitigate this inconvenience, Google includes built-in 3G connectivity as well as WiFi. In the US, Mountain View has teamed with Verizon to offer 100MB of data per month for free for the first two years, and there's no longterm contract. But to get the free data, you have to provide a credit card. Plans providing additional data start at $9.99 a day.

The networking setup is almost seamless – and wonderfully simple. Chrome OS offers limited "settings" screen that handles not only networking but other basic needs, including the system clock, passwords, privacy, and security.

Google Chrome OS-equipped Cr-48: 'Under the Hood'

Under the hood. Sort of (click to enlarge)

Google takes a multilayered approach to security. Every webpage and app you visit is restricted to its own sandbox, and if malware escape the sandbox, Google does a verified boot at startup in an effort to detect system tampering. Plus, like the Chrome browser, Chrome OS is automatically updated with security patches. Google calls this "defense in depth," and it's one good reason to the use OS.

The question is whether it's reason enough.

Disposable laptop

Google also pitches its Chrome OS machine as a kind of disposable computer. If you lose it, you don't lose your data or your apps. Chrome OS includes a sync tool that saves your OS settings, data, and docs on Google's servers. When you log-in with a new machine, your setup is there waiting for you.

When you consider this alongside Google's guest mode and its multilayered security, Chrome OS begins to look mighty attractive. If you're a business. And you're not adverse to storing all your company data on Google servers.

If you're the average consumer, it's likely not for you. But it is in beta. Come back in, say, another five years. ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.