Yes, the number of users alone means nothing in terms of security. The way to 'prove' Android is more secure than iPhone (if true) would be compare breaches, percentage-wise. That's not what Schmidt did.
Google's systems, if breached, would indeed mean digital disaster. Cloud systems working in close association with Google would be in a wreck and nobody would trust cloud based services anymore. Moreover with the lawsuit that has been going on, Google has had the harsh end of the argument. Though it may not be true that the Android may be more secure than the iOS, android is a power packed platform constantly on the upgrade and it sure will claw its way back into fighting the "who is more secure" skirmish.
@ Mitch Wagner, Internet of things and permanence of data are definitely making privacy issues complex, if not completely irrelevant. It is also worth considering how much privacy could be sacrificed for security. But it is still debatable which security concerns and privacy concerns are real. No doubt there are lots of grey areas in this subject.
It would have been a lot better if Schmidt had come up with some comparative statistics. More than one billion android users don't necessarily mean Android is more secure than any other operating system. He had better told the number of iOS users and specific security features of Android which make it more secure than iPhone.
You are right, Mashka. The US -- and US companies -- have swapped-out Russia as the bogeyman and replaced it with China. Used to be they'd blame everything on Russia during the height of the Cold War. Now, they simply place China instead. But China is not the US' sole enemy. There are many nations who would like to see capitalism, in general, and the US, specifically, fail. And there are companies within the US that could be targeting other US companies. Not all American businesses are ethical! Enron, anyone?!
It's always a bit personal for me, when China is to be blamed. I live in this country, I love this country and these people. On the other way, being a Russian, I know very well, that people and state are two different things.
Ok, I keep asking the same question again and again.Why China? Why is it alsways China who is to be blamed and suspected? It's not Russia, Iran, Saudi Arabia, Japan, American competitors... I am not saying, that China isn't trying to hack Google, but is China really the only one that would benefit of hacking Google?
The ThinkerNet does not reflect the views of TechWeb. The ThinkerNet is an informal means of communication to members and visitors of the Internet Evolution site. Individual authors are chosen by Internet Evolution to blog. Neither Internet Evolution nor TechWeb assume responsibility for comments, claims, or opinions made by authors and ThinkerNet bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
No, China is not responsible for every act of cyberwar or cyber-spying that takes place. After all, we know the United States and Israel are quite capable of engaging in cyber-guerilla activities of their own.
US counterterrorism expert Richard Clarke, who came to prominence with his prescient warnings before the 9/11 attacks, tells Smithsonian Magazine the US was responsible for the Stuxnet supersmart worm that attacked parts of nuclear reactors in Iran – and in the process, has given away one of the world's most sophisticated cyberweapons.
As smartphones and tablets forge into the mainstream, vendors can begin work on the next big wave: wearable devices. Apple and Google are two of the heavyweights reportedly investing time, effort, and money here. This broad category spans the range from devices that can be worn like watches to computers integrated with people's clothing.
More than any other company, Research in Motion has been hurt by the runaway success of Apple’s iPhone and Google’s Android systems. Though it is losing a significant share of the smartphone market, RIM has found a way to possibly stay afloat with "Mobile Fusion," its plan to expand its robust enterprise management functions to other devices.
Law enforcement agencies are poised to use iPhones as facial recognition systems in the coming months. The technical advance promises efficiency but has created a backlash among civil liberties proponents.
It's not Apple or Google "tracking" us that we have to worry about, it's their app developers and their policies on disclosing just what phone data they grab for their apps, and what they do with it. Apple and Google need to force them to disclose.
You've heard the expression, "Out of the frying pan, into the fire?" Amazon lives in the fire. The e-tailer wins by keeping things hot for its competitors, employees, and itself, according to a new book.
Positec, a manufacturer of power tools for homes and commercial applications, achieves greater customer service flexibility and cuts hold times in half by using a cloud-based service to manage its call center.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?