Android 3.0 'Honeycomb' to rely on input gestures, designer says
The OS will be used on a variety of mobile devices, not just tablets
Computerworld - Google has big plans for its Android 3.0 OS, code-named "Honeycomb," including its use in a variety of mobile devices, not just tablets, that are driven by gestures without hardware or even soft buttons.
Those details about Honeycomb came from top Honeycomb designer Matias Duarte in an interview at All Things Digital.
Google will undoubtedly unveil some of its vision for Honeycomb at a Wednesday event in Mountain View, Calif. Computerworld blogger JR Raphael noted that the Motorola Xoom running Honeycomb will probably be demonstrated. Another possibility: a demo of Honeycomb on a smartphone.
According to Duarte, Honeycomb supports various devices of differing designs, since it no longer relies on physical hardware buttons for input. Some of those devices might look like a laptop, but others won't have even have hardware or soft buttons, he said in the interview posted today. They "might be purely gesturally driven," Duarte said in the interview, adding that hardware makers may well create designs beyond what Google expects.
Future creations could mean Android running on a refrigerator or used to run a table-top computer similar to Microsoft's Surface. "I can imagine that," Duarte said, stressing the flexibility Honeycomb allows developers and designers.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt's RSS feed. His e-mail address is firstname.lastname@example.org.
Read more about iOS in Computerworld's iOS Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All iOS White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!