Developers to Google: We need platform unity for Nexus tablet
- 27 June, 2012 12:31
With the presumptive launch of Google's Nexus 7 tablet mere days or hours away, developers at Google I/O 2012 are emphasizing the need for a unified platform on which they can do their work.
PICTURES: What Google tablet might look like
According to MegaDevs co-founder Sebastiano Gottardo, the new Jellybean version of Android is a positive step.
"At the moment, I think tablet support [for Android] is not that bad, [however,] they should go that way further. With Jellybean, they're heading in the right direction," he says.
It's also important, according to Bryan Kelly and Jeff Sibbold of Detroit Labs, to make sure that developers have a "Nexus" environment to work with, independent of the OEM skins and overlays that are common to Android smartphones.
"They definitely need to make sure it's vanilla Android," Kelly says.
Both agreed, however, that the unity of the environment is also a critical concern.
"The biggest thing they could do is unify the platform," Sibbold says.
LG Electronics systems engineer Gyo-Seok Chu says specialized software developer kits and APIs for use with tablets will be helpful. "Most market apps are focused on phones," he says.
Jason Huff, founder of Atom Arcade, says documentation is a key. "Any type of examples of what the hardware can actually do," he says, will be crucial.
Support for Bluetooth, near-field communication and beam communication also made Huff's wish list, along with webkit functionality.
SendGrid developer Seth Ammons says that, in general, Google will have to overcome public perception issues and "get the word out" in order to make a dent in the iPad's market share.
"Everybody thinks 'iPad' when they think tablet," he says.
Email Jon Gold at email@example.com and follow him on Twitter at @NWWJonGold.
Read more about software in Network World's Software section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- A Holistic Approach to your BYOD Challenge
- Agentless Security for Virtual Environments
- Business Continuity Planning IT Survival Guide
- Guiding the Cloud Application Decision with the IBM Cloud Transformation Advisor
- A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.