Google once considered issuing currency
- 29 February, 2012 05:52
Google once considered issuing its own currency, to be called Google Bucks, company Chairman Eric Schmidt said on stage in Barcelona at the Mobile World Congress Tuesday.
At the end of his keynote speech, Schmidt hit on a wide array of topics in response to audience questions. "We've had various proposals to have our own currency we were going to call Google Bucks," Schmidt said.
The idea was to implement a "peer-to-peer money" system. However, Google discovered that the concept is illegal in most areas, he said. Governments are typically wary of the potential for money laundering with such proposals. "Ultimately we decided we didn't want to get into that because of these issues," Schmidt said.
He also hinted that Google might be preparing for a battle in China once its acquisition of Motorola is complete. "Google's been willing to take on China pretty well," he said, in response to a question about whether Google expected to continue to ignore theft of Motorola intellectual property in China, as Motorola has been doing. The acquisition hasn't closed yet, Schmidt noted. "We've taken a pretty strong position on IP. We are well aware of the issues and we are considering your question," he said.
Google is still waiting for some government approvals of its proposed acquisition of Motorola.
Schmidt, who showed off the new Chrome browser that runs on Ice Cream Sandwich devices, said he expects Android smartphones to continue to get cheaper. Ice Cream Sandwich is the newest version of the Android OS. "We have many partners who are working on phones that will be in the $100 to $150 range," he said. Their goal is to reach $70. While Android phones may sell in the U.S. at about $150 with a two-year contract, they are often several hundred dollars without a contract.
Schmidt also said he hopes that some companies that are using Android but not adopting any Google products will change their minds. Products like Amazon's Kindle Fire use Android, which is available through an open-source license, but don't include the Android Market or other apps that make money for Google. "We hope that people who decided not to use the Android Market will see they'll be more successful if they do so, but it's their choice," he said.
After making prepared remarks that described a future where Internet access becomes a great leveler for even the most disadvantaged and oppressed people, Schmidt sounded only slightly apologetic to one questioner from Iran. The audience member noted that while Gmail is sometimes blocked by the Iranian government, Google itself blocks Android and Chrome from Iran. He asked Schmidt to remove that block.
"The answer is no, I'm sorry," Schmidt said. Due to U.S. policy, Google isn't able to allow those products, he said. "We can't violate U.S. law. I'm with you, but in prison there's no bandwidth," he joked.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
How Web Security Improves Productivity and Compliance
In this white paper, we will look at how secure web gateways, one type of information security technology, can provide benefits to many departments within any business or government agency. Download now.
Staying Ahead of the Data Explosion
The total volume of data being processed and stored by businesses is rising exponentially. IDC has estimated that the size of the "digital universe" will increase 29 fold between 2010 and 2020. Data storage technology has undergone a steady increase in capacity, along with a steady decline in the cost per unit to store information. Unfortunately, data storage capacity is not keeping pace with data growth and necessitating greater intelligence in the storage infrastructure. Read more.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.