Risk
12/10/2010
06:24 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Chrome OS CR-48 Notebook Reviewed

Google's Chrome OS preview netbook is beautiful and full of promise, but the company's vision for the cloud isn't enough.

Google Chrome OS Promises Computing Without Pain
(click image for larger view)
Slideshow: Google Chrome OS Promises Computing Without Pain

Google's Cr-48 Chrome OS netbook provides the first glimpse of a "third choice in desktop operating systems," as Google CEO Eric Schmidt puts it. It's all the things Google boasts: speedy, simple, and secure. But there are things it cannot do, only some of which won't matter in time.

Chrome OS is not really a third choice because it's not a desktop operating system. It doesn't support direct file manipulation. It's a browser-based operating system, and comparing Chrome OS to a desktop operating system like Windows or Mac OS is a bit like comparing a motorcycle to a pickup truck. Both work as transportation but if you're hauling drywall, you're not going to want a motorcycle.

Chrome OS will be succeed because, for many circumstances, the Web is enough and the price point will be compelling.

It's appealing because it's not a hassle. I never have to worry about updating Chrome OS. That happens automatically, without the interruption of dialog boxes. It took me less than a minute to start up, establish an account, take my own picture, connect to my WiFi network, and load my iGoogle homepage. All my Google Docs files were there waiting for me, in the cloud. All my bookmarks were there, thanks to Chrome's synchronization capabilities.

With a traditional laptop, transferring files and loading applications takes a lot more time.

Previous
1 of 3
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.