First Look: Google Goggles tries to ID your world
Google's latest lab experiment lets you send it photos for identification.
Computerworld - On Monday, Google announced, along with its new real-time search feature, a photo-based search it is calling Google Goggles (which is hard to say without -- sorry -- giggling). Goggles lets you send photos of a business card, book cover or even bar code from your Android-based smartphone to Google for quick identification and data manipulation.
What does it do? Once installed, the process is pretty simple: You snap a photo by centering your image in the Goggles screen and pressing a small camera icon at the bottom of the screen. Goggles then scans the image, analyzes it and identifies it. If the image is of a business card, Goggles separates the information into fields and lets you put it into your Google Contacts database. If it's a book, the app offers to let you purchase or research it. If it's a store or a landmark, Goggles fetches Google search info about the location. (Objects such as cars, animals or people aren't, according to the instructions, really identifiable yet.)
What's cool about it? Well, let's face it -- pointing your smartphone at anything, clicking a button and having all the information about that object immediate appear is extremely cool.
How well does It work? As soon as my partner and I heard about Goggles, we immediately grabbed our Droids, installed the app and started clicking away at business cards, books and barcodes. Results were mixed, depending on what we were aiming at.
Goggles did pretty well on books, identifying most, but not all, of the covers we tested it with. For example, Goggles had no trouble with books such as an old copy of R.A. Lafferty's Past Master, or a new book like John Joseph Adams' The Improbable Adventures of Sherlock Holmes, but there were also several it couldn't handle. When Goggles did recognize a book, it offered links to price comparisons and previews of the book at Google Book Search; it also showed Web search results.
Results were more mixed when we tried it on business cards. While it did well on one or two extremely simple cards, for the most part, Goggles wasn't terribly efficient. It recognized some of the data as phone numbers and e-mail addresses, but on the whole, did a far worse job than most current business-card scanners I've tried.
Trying to identify a storefront was an interesting exercise. While I focused on a local florist's shop, the names of several nearby restaurants drifted back and forth on tiny tags along the bottom of the screen -- no doubt picked up by Google Latitude and/or Maps. If I clicked on one of the tags, I was brought to a series of Web entries for that restaurant. But when I took a photo of stores that were not suggested by the tags, Goggles was not able to identify any of them -- although it tried. The florist's shop, for example, brought up some search entries for an obscure medical condition.
What needs to be fixed? Right now, Goggles is very much a beta, and even sticking to those types of queries that Google suggests, the results are distinctly mixed. As a result, it's currently more a game or an experimental toy than a practical app. But that will change. And, for now at least, it works only on Android phones.
Final verdict: Google Goggles is simultaneously intriguing and just a bit scary. The range of items you can ID is still very limited, and its accuracy level is still very tentative, but both of those are bound to be corrected as soon as the folks at Google Labs continue to tweak this. So what's scary? The day when you can quickly point your smartphone at a person in the street and know within seconds that person's name and particulars may not be all that far off.
- Google updates the Maps Explore Nearby feature -- for some users
- Chrome gets sharp after dumping 30-year-old Windows technology
- Google moves closer to selling smart contacts
- Google goes mum on Glass release plans
- Samsung Gear Live vs. LG G Watch: A real-world evaluation
- Android Wear deep-dive review: A smart start to smartwatch software
- Google's Larry Page talks of killing the 40-hour work week
- Google terminates Quickoffice apps on Android, iOS
- Google I/O looks to be about more than Android
- Google eyes 3D vision tech for experimental tablet
Read more about Networking in Computerworld's Networking Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Topic Center White Papers | Webcasts