Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:25 PM
Thomas Claburn
Thomas Claburn
Connect Directly

Why Chrome OS Will Succeed

Google's "third choice" of operating system will sell itself to businesses and schools.

Chrome OS and Android will also remain apart until a new usage paradigm emerges. Right now, touch-based interaction does not work well with keyboard interaction. It's hard to design apps that work equally well with touch input and keyboard/mouse input. Even if it can be made to work on a technical level, the apps behave in ways that users don't expect. It will take time to sort this out.

Chrome OS still has some problems to solve, but that's to be expected for software that hasn't even been officially released. Google Cloud Print will mature, there will be more support for peripherals (though vendors will look toward cloud connectivity rather than OS-specific drivers if they have any sense), and support for offline storage will arrive. There's even likely to be support for local applications (through Google Native Client) and alternate browser emulation (though a plug-in that, reversing the proposition of Google Chrome Frame, puts Internet Explorer or Firefox inside Chrome).

Chrome's success will not make traditional computers disappear any more than Apple's iPad will. PCs will just be used in scenarios where local computing resources make more sense than network-based computing resources. These use-cases include high-end gaming, high-performance storage and computation, and sophisticated content creation through applications like Maya and Photoshop. Buying a $2,000 cutting-edge computer to handle word processing and e-mail will become more and more unappealing when netbooks and other lightweight options are available, are just as functional, and are easier to maintain.

Even so, count on Google finding ways to make many of the more demanding computing tasks work in the cloud over time. Developers, for example, still mostly use local text editors and IDEs such as Eclipse rather than an online tools like Mozilla's Bespin. Expect Google to offer its own tools for cloud-based development.

Chrome OS, being simpler than Android, will be more secure. It will remain distinct from Android in 2011 and will start eating away at Microsoft's dominance in the workplace from below. The computer industry for years has sold businesses PCs that can be thought of as the equivalent of light trucks; many users, particularly at businesses, really just need something like a compact car. Google with Chrome OS will find that there's a market for something less powerful and less costly to operate.

Stallman's objection to software-as-a-service, restated in a recent Guardian article as an objection to Chrome OS, is the one that Google needs to consider and address more effectively. He worries that Chrome OS will encourage people to entrust their data to a third-party like Google, disempowering them in the process.

He put his objection to cloud computing thus in a previous essay on the subject: "The real meaning of 'cloud computing' is to suggest a devil-may-care approach towards your computing. It says, 'Don't ask questions, just trust every business without hesitation. Don't worry about who controls your computing or who holds your data. Don't check for a hook hidden inside our service before you swallow it.' In other words, 'Think like a sucker.' I prefer to avoid the term."

These concerns are exactly why Google built its infrastructure on open source software and commodity hardware: It didn't want to be subject to the whims of a specific vendor like Microsoft. Google wanted to control its destiny.

If Google really wants Chrome OS to be more than constrained computing for school kids or employees without any say in the matter, it needs to encourage legal reforms that recognize property rights in the cloud. Tenants in the cloud can be evicted far more easily than real world renters. Until life in the cloud is more secure, possession will continue to be nine-tenths of the law and those with any sense will maintain local servers, as least as a backup. Possession of data will remain a necessity for organizations and individuals that want actual rather than pretend control of their information.


Slideshow: Google Chrome OS Promises Computing Without Pain

Google Chrome OS CR-48 Notebook Reviewed

Google Chrome Gets Ready For Business

Google Chrome OS Hardware Vanishes In The Cloud

Google Launches Chrome OS Preview

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from t...