Feeds

Android goes virtual

Prepared to be assimilated

Build a business case: developing custom apps

As of today, Myriad's Dalvik virtual machine can run any Android application on the Maemo-based Nokia N900, with other platforms to follow soon.

The idea is to get manufacturers to preinstall Alien Dalvik, as the company calls its virtual machine, or licence the VM to developers who can bundle it with their applications.

It enables an unmodified Android app to be sold as a MeeGo app, complete with installer and native icon, rather than trying to port apps to competing platforms - making every smartphone an Android-compatible smartphone (except the iPhone of course).

Given Dalvik's Java heritage it's not very surprising that a portable VM is possible. Android applications are compiled into byte code that runs in a virtual machine, even on Android devices, so porting that virtual machine to another operating system shouldn't be a huge challenge. Myriad appears to have made a decent job of it.

Right now Alien Dalvik is limited to the Meamo platform, though MeeGo will come very soon and there's nothing (except Apple's obstructiveness) to prevent the emulator being ported to other platforms, which could make Android the only platform worth developing for.

Except that we've been here before - Java was supposed to work this way, but lacked key functionality, and Java followed numerous virtualised programming environments that were supposed to nullify platform dependencies. Dalvik is very functional, but it's hard to imagine it replacing native development.

Still, as a wrapper for those who don't want to port their applications it makes sense, especially if the performance remains so directly comparable to native apps. Alien Dalvik might not render other platforms obsolete - in fact it could help them by ensuring the most popular Android apps are rapidly made available across the board. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
Ancient pager tech SMS: It works, it's fab, but wow, get a load of that incoming SPAM
Networks' main issue: they don't know how it works, says expert
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.