Wednesday, September 29, 2010

Device That Allows Using the Arm As a Touchscreen

Chris Harrison at Carnegie Mellon University and Dan Morris and Desney Tan at Microsoft's research lab in Redmond, Washington, recently came up with their latest invention calledSkinput, which represents a skin-based interface that makes it possible for a person to use his or her palm as a touchscreen.

The Skinput can be used to play games, control various devices, make phone calls and surf the Internet. The invention features a keyboard, menu and a number of other graphics that appear of the user's palm and forearm. The graphics are generated by a pico projector that in incorporated in an armband.

When the user touches a certain point on his or her palm, the acoustic detector in the armband identifies the part that was activated and performs the respective action. Scientists explain that the differences in bone density, size and mass, along with filtering effects from a person's soft tissues and joints, imply that various locations on the user's skin have different acoustic features. It is worth mentioning that the acoustic detector used in this invention is able to identify five skin locations, registering an accuracy of about 95.5 percent.

Using wireless technology, the researchers' latest invention can convey the signals to a cell phone, iPod or computer. The system was tested by 20 volunteers who gave a positive response to the device and its ability to provide fast navigation.

Researchers look forward to present their latest invention in April at the Computer-Human Interaction conference which will take place in Atlanta, Georgia.

Tech That Converts Lip Motion Into Voice

One of thelatest inventions presented at the CeBIT (Centrum der Büro- und Informationstechnik; German for "Centre of Office and Information technology"), which is the largest computer exposition in the world is dubbed "silent sounds." The technology converts lip motion into acomputer-generated voice for the person on the other end of the phone.

It is worth mentioning that "silent sounds" tech was developed by the Karlsruhe Institute of Technology (KIT). This latest invention makes use ofelectromyography, monitoring small muscular motions that take place when a person speaks, transforming them into electrical pulses which are afterwards converted into speech.

According to its developers, the invention gives way to a lot of different application that can help people who lost their voice or allow users to inform confidential data via the cell phone without using their voice.

In addition, this latest invention can help you instantly translate words into another language, due to the fact that electrical pulses are universal. The users can convert these pulses into one of the languages currently supported by the technology: English, French and German. At the same time translation could be a problem for such languages as Chinese, in which one word could have a lot of meanings, depending on the tone used.

At this time, engineers managed to achieve 99 percent accuracy for their latest invention, which means that the person on the other end of the phone will get one word out of 100 wrong, said explained Michael Wand, from the KIT.

Latest Invention: High-Speed Scanner Scans 200-Page Book in 1 Minute

Scientists from Japan recently unveiled anultra-fast scanner that allows scanning a 200-page book in about a minute, eliminating the need of breaking up or flattening the book.

Headed by Professor Masatoshi Ishikawa, the group of researchers from the University of Tokyo managed to come up with a prototype scanner that can scan a book when you quickly flip its pages. The latest invention makes use of a high-speed camera that operates at a speed of 500fps and can generate images that boast a resolution of 1280x1024 pixels. The camera takes the pictures of a page along with its images and text under standard light.

Afterwards a laser projects lines on the book's pages, making it possible for the system to adjust for the distortion of the pages when these are turned. Thus the software is able to reproduce the image into a digitized picture of a standard book page, reports Physorg.com.

The current device is rather bulky, but researchers are looking for ways of miniaturizing it, so it would be possible to incorporate the device into various portable gadgets like smartphones. The Japanese scientists, however, faced certain issues with their latest invention. For instance, the image generated by the device may not be of high resolution and sometimes a person can skip some pages while flipping.


Tuesday, September 28, 2010

Latest Invention: Technology That Allows Users to See Through Walls and Melt Objects

Researchers from the University of South Australia in collaboration with Nokia started working on one of their latest inventions that would make it possible for users of cell phones to see through walls.

Their latest invention makes use ofaugmented reality (AR), being able to overlay graphics on top of real the video. The AR system comes in three types: X-ray Vision, Meltvision and Distortvision.

According to Dr Christian Sandor, Director of the Magic Vision Lab at UniSA, users prefer Meltvision over X-ray vision, due to a more appealing look, where structures appear to melt away. As for Distortvision, it changes the mobile video picture so that the objects that cannot be seen "bent" so the person could see them in the image.

It would be interesting to note that the researchers have also been working on an invention that would make it possible for users to see and sense virtual objects. The new technology is called Visuo-Haptic Augmented Reality and it allows an individual to manipulate a 3D object by making use of a head mounted screen and touch-based gadgets.

Dr Christian Sandor explains: "The current method for prototyping involves the development of a 3D design using a computer, which can be viewed on screen or printed out in what is a relatively static presentation."

Latest Invention: Tsunami Generator That Could Help Design Disaster-Proof Structures

A group of scientists from the University College London's Earthquake and People Interaction Centre (EPICentre) teamed up with consulting engineers at HR Wallingford One to come up with an invention that could explain how tsunamis work and in future help build disaster-proof buildings. Their latest invention is a wave-generating machine that is able to reproduce the activity of tsunamis.

Besides helping construct buildings that could resist tsunamis, the new machine will also allow develop better evacuation techniques.

Using the 148-foot-long wave channel, researchers were able to mimic the behavior of the first wave of the Boxing Day tsunami that was witnessed by the people of Thailand in 2004.

Although there are other wave simulators, most of them make use of piston-based system, but the new type of tsunami generator for the first time uses air-driven system in which fans along with control valves absorb water in the tank and then release it. Such system allows the machine to produce various tsunami conditions, like the draw-down phenomenon (when the sea is sucks out and then rushes back to the shoreline). Researchers hope their latest invention will be available in countries worldwide.

Latest Invention: Washing Machine That Doesn't Need Water

British company Xeros looks forward to conquer the American market with its latest invention, a new washing system able to save a lot of water using nylon beads. The beads tumble wash clothes using 90 percent less water than traditional washers.

In addition, the company's latest invention, which is currently in the development stage, requires less detergent. Xeros claims that there would be no need for tumble drying and if the homes in the United States would switch to the new system, the emissions of carbon dioxide would be considerably reduced. The result would be as though 5 million vehicles have been removed from the road. The company also says that the new washing machine will save 1.2 billion tons of water each year, which equals 17 million swimming pools.

The washing machines does its job using small nylon beads that eliminate stains off clothes and lock them into the molecular structure of the nylon. The beadscan be used for hundreds of washes and afterwards they can be easily recycled. The technology behind the new washing machine is the result of a research carried out at the University of Leeds. It has been used in a concept washing machine by the Cambridge Consultants.

After carrying out tests for over three years, Xeros, a spinout from the University, managed to achieve an agreement with Kansas City-based GreenEarth Cleaning, which intends to market Xeros' latest invention across North American continent in 2010. You can read more about the product on the company's website.

Top 3 Main Battle Tanks and Fighting Aircrafts of the World's Most Powerful Nations

Most will agree with the fact that currently the three most powerful nations in the world are the United States, Russia and China. Below you will find some of the most powerful tanks and battle aircraftsdeveloped by each of the three nations. This is of course our choice, so it's completely subjective. If you have any information on the topic that you could share, you are welcome and in the meantime you are free to read, compare and express your opinion.

Tanks

Russian Federation

T-90S

The T-90S represents one of the most advanced Russian tanks from the T-series. It features an improved firepower, mobility and protection. The tank was built at Uralvagonzavod, factory located in Nizhnyi Tagil, Russia. It is worth mentioning that the T-90S officially entered the service with the Russian armed forces in 1992.

The tank is developed for a crew of 3 people, its combat weight is 46.5 tons and it features a 4-stroke V-84ms diesel engine with 849hp. The fuel capacity of this battle machine is 1,600l. The range is 650km on paved roads and 500km on unpaved. The tank reaches a speed of 65 km/h.

The information provided by the American Foreign Policy Center says that Russia is currently working on upgrading its main battle tank to the new T-95 version. The features of the new generation battle tank are specified below:

  • -Diesel-electric propulsion
  • -135mm gun
  • -360° sensors and ECM and network-capability
  • -pro-active electric reactive armor
  • -Weight: over 55 tons
  • -ceramics-n-fiber armor, which would replace the usual steel armor
  • -virtual reality for the driver and gunner
  • -2 crew members will man the tank
  • -autoloader for 3 different types of ammo.

Read more on: Tanksim.com

Unites States

M1A2 Abrams

This MBT was developed by General Dynamics Land Systems, which produced the first M1 tank back in 1978, followed by the M1A1 tank, developed in 1985 and GDLS in 1986 by the M1A2. The latter is considered one of the best tanks in the world. However, it includes only a 120mm M256 smoothbore gun, which was manufactured by the German company Rheinmetall GmbH.

The tank is developed for a crew of 4 people, including driver, commander, gunner and loader. It weights 69.54 tons and its ground clearance is 430 meters. The tank reaches a speed of 67.72 km/h.

Read more on: Army-technology.com

People's Republic of China

Type 99/ZTZ99

This tank was developed by NORINCO and is currently the most advanced MBT in the People's Liberation Army. It entered the PLA service in 2001. The Chinese made a great improvement in the tank's firepower mobility, and protection. Due to the high unit price (about $1.9 million per tank in 1999) there were only about 200 ZTZ99 made.

The tank features a dual-axis stabilized 125mm/50-calibre ZPT98 smoothbore gun. It also carries Russian anti-tank missiles called 9M119 Refleks. These missiles are fired from a 125mm gun. ZTZ99 reaches a top speed of80km/h and its weight is about 54 tons.

Read more on: Sinodefence.com

Fighting Aircrafts

Russian Federation

Sukhoi Su-37 Terminator

When Su-37 was developed it was instantly shipped to the United Arab Emirates (UAE) air force as a multi-role version of Russia's previous generation Su-35. The aircraft has a number of features that make it different from other air fighters. It can make a preemptive hit at any air target, even those that are hard to spot. Su-37 has a multichannel redundancy and algorithmic security of all data and targeting systems. It can also hit ground targets at standoff range. The aircraft's all stages of flight and combat are automated.

Read more on: Enemyforces.com

United States

F-22 Raptor

This is one of the newest fighting aircrafts in the armed forces of the United States. The F-22 represents a fusion of stealth, supercruise, maneuverability, and incorporated avionics. It has an upgraded supportability and thus is a great step in warfighting capabilities. Raptor is a powerful weapon in both air-to-air and air-to-ground combats.

It is one of the main weapons of the Global Strike Task Force. F-22 was developed to stop enemy's battle aircrafts from accessing the Air Force, Army, Navy and Marine Corps.

Read more on: Fas.org

People's Republic of China

J-10 Multirole Fighter Aircraft

The J-10 is also called Jianji-10 or Jian-10. It features one engine and represents an all-weather multi-role battle aircraft. It was designed by Chengdu Aircraft Design Instituteand built by the Chengdu Aircraft Corporation(CAC). The Chinese started working on the J-10 project back in the 1980s in order to compete with the fighters from the West (F-16) and Soviet Union MiG-29.

After the end of the Cold War the Chinese moved towards creating a multi-role fighter, which would perform beyond-visual-range air-to-air fight and ground attack. China looked forward to create an air power that could show high defensive and offensive potential.

This aircraft represents one of the highest achievements of China in the aviation industry. During the 1990s the J-10 program included lots of new technologies, such as composite materials, computerized flight-control system dubbed "fly-by-wire", improved radar and cockpit electronics, as well as computer-aided design and many more.

Tuesday, September 21, 2010

Computers to be Tested on Intelligence

Six computers are going to compete in an experiment that aims to find out if a computer has a potential to think like human.

The experiment, where computers will communicate with human volunteers, is planned to take place on September 13 at the University of Reading. The six computer programs are called Alice, Brother Jerome, Elbot, Eugene Goostman, Jabberwacky and Ultra Hal.

Human interrogators will put the machines to the Turing test, developed to find a computer's ability to demonstrate intelligence. Each of the volunteers will start conversation with one unseen human and one computer program on any subject. After that the volunteers will be asked to tell which is which. The computer is considered to pass the test if the interrogator is unsure or guessed wrong.

The Turning test was developed by a mathematician Alan Turning in 1950 and was described in the article "Computing machinery and intelligence". The renowned scientist studied if it is possible for machines to think. Until now no computer has passed the test, while Turning expected that thinking machines will appear by the year 2000.

The designer of the computer that will succeed in an experiment will be awarded with 18-carat gold medal and $100,000 offered by the Loebner Prize in Artificial Intelligence. The Loebner Prize is organized annually to determine which of the computer systems will demonstrate the most human conversational behavior.

Swype Input Is Now Available For Nokia Phones

The long anticipating Swype input is now available for Nokia Phones.Currently, Swype for Nokia supports the following Nokia S60 5th Edition touch screen phones :-
  • Nokia 5800
  • Nokia 5230
  • Nokia X6
  • Nokia N97
  • Nokia N97mini

The Most Dangerous Computer Viruses in History

Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments.

Here are some of the most dangerous computer viruses in history:

Jerusalem - 1987

This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University.

Along with a number of other computer viruses, including "Cascade", "Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little knowledge of the existence of computer viruses.

Morris (a.k.a. Internet Worm) - November 1988

This computer virus infected over 6,000 computer systems in the United States, including the famousNASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.

To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.

Solar Sunrise - 1998

A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa - 1999

For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group alt.sex. Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.

Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet.

Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.

I Love You - May 2000

Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty.

The Code Red worm - July 2001

This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

Nimda - 2001

Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009

The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.

Thursday, September 16, 2010

Latest Invention: Technology that Allows People to Move Virtual Characters Using Own Movements

The New York City-based company called Organic Motion Inc. has recently presented its latest invention - OpenSTAGE platform that was unveiled at the Sony Wonder Technology Lab (SWTL) in Manhattan.

The company claims that its latest invention makes it possible for users to "bring Sony animated characters to life" by simply moving own body parts. In its statement the company said that its platform allows people to operate with virtual characterswithout the need to put on special body-tracking devices. Such technology could be widely used in a variety of fields, including medicine, sports and entertainment. Thus people could quickly pass through the system and easily obtain accurate body movement digitalized and uploaded to a computer for further analysis, reports TG Daily.

Chris Michaels, the spokesman for Organic Motions Inc. stated that the company used 14 cameras and advanced software to be able to make the accurate digital representation of a person. Comparing toMicrosoft's Project Natal, Michaels mentioned that the technology used by Organic Motions, unlike that used in Project Natal, is not "limited to a one-dimensional plane due to its single camera." You can read about Project Natal here at www.infoniac.com, the link can be found at the bottom of the article.

He noted that the software giant's project is very game-focused, while the latest invention of Organic Motions can be used for different applications. "Our systems are also used by various federal agencies to train emergency workers and by the military to prepare soldiers for combat," said Michaels.

Latest Invention: Cell Phone with Portable Microscope for Spotting and Tracking Diseases

A team of scientists from the United States developed a portable microscope that is connected to a camera phone. Their latest invention thus can be used to diagnose dangerous diseases in blood and sputum samples, the latter are obtained by coughing deeply, which allows expelling the substance from the lungs into a sterile cup.

It is worth mentioning that light microscopy is a very important tool that can be used to diagnose malaria, tuberculosis and other dangerous diseases. The digital images of cell samples, taken by camera-equipped lab microscopes can be transmitted via Internet to specialists at different health centers for additional studies.

Together with his colleagues from the University of California in San Francisco, Daniel Fletcher at theUniversity of California in Berkeley, though about exploiting the already existing technologies, widely used by people in everyday lives, such as cell phones, for medical reasons.

In this image you can see malaria-infected blood. According to one of the latest UN reports, about 60 percent of people around the globe use cell phones. The team realized that cell phone networks represent an inexpensive and fast way to convey medical information wirelessly. For their latest invention scientists used off-the-shelf parts to create an inexpensive and portable microscope attachment which connects to a Nokia N73phone camera.

Using microscope, researchers can identify objects that are only 1.2 micrometers across. Red blood cells are usually from 6 to 8 micrometers across. In order to take clear picture of medical sample natural light is quite enough. Still, scientists decided to add a battery-powered LED lamp and several filters so their gadget could also work as a fluorescent microscope, reports New Scientist.

Researchers tested their latest invention against several widespread diseases and conditions. They found the results promising, saying that pictures of malaria-infected blood were good enough to be able to diagnose the disease. Besides, the system could also help diagnose sickle-cell anaemia from blood samples, thus researchers will be able to spot the presence of tuberculosis.

"Cell counting is the main thing we have done. Additional things could include annotating an image to point out a problem or a question to be answered by a doctor at a central hospital," says Fletcher. Using the device combined with detailed information about the patient and location, could help track the spread of dangerous diseases.

Latest Invention: System that Converts Energy from Tramping Feet into Electricity

British scientists are working on their latest invention - a system able to use the "boot force" in order to power various electronic tools, including torches and radios used by military troops. The system would make the backpacks of soldiers considerably lighter. The devices currently developed by experts from the University of Leeds will generate electricity from the energy of flexing knees and tramping feet.

Their latest invention will eliminate the necessity to carry heavy batteries, thus reducing the weight of soldier's backpacks by up to 10 kilograms (a typical backpack weights about 75kg). The latest invention developed by the British scientists takes advantage ofhigh-tech piezoelectric transducers that produce electrical energy from mechanical stress. Besides the technology is eco-friendly. You can find more inventions here at www.infoNIAC.com - check the links at the bottom after the story.

The system, which is part of "battery free soldier" program, represents a two-year project supported by the Engineering and Physical Sciences Research Council (EPSRC) and the Defense Science and Technology Laboratory(DSTL). Researchers look forward to create similar technologies based on other alternative sources, such as solar power and body heat.

Latest Invention: Eco-Friendly Device that Detects Fire Outbreaks

Each year forest fires destroy huge territories and homes located in the vicinity and not all strategies to prevent fire function properly. This was the reason why the 24-year-olf engineering student from theUniversity of Nairobi, Kenya, decided to do something about it.

Pascal Katana came up with a special device that identifies fire outbreaks automatically. His latest invention features heat sensors that are programmed to identify temperatures that exceed 45 degrees Celsius. As soon as the device detects a fire outbreak, it sends information to the nearest forest station through a handheld phone.

The device is also environmentally-friendly, being powered by 5 volts solar panels. Before hitting the market, the fire outbreak detector must be tested and granted patent protection

Wednesday, September 15, 2010

Acoustic Ear-scanning Technology to Help Avoid Theft

Researchers managed to come up with a technology that could protect portable devices such as iPod and mobile phones from theft.

Their latest invention uses the acoustic fingerprint of the ear, which makes it impossible for other people to operate the device. Such technology could be also used to improve the safety features of bank accounts and passports.

Scientists found that it is possible to identify a person by the distinctive sounds of the ear chamber. In their study researchers used an earphone to send a weak tone in the ear in order to stimulate hair cells beyond the inner ear. Thus they hoped to make the hair cells produce their own sound. The sound is unique, with the person's eardrum, ear bones and ear shape playing a role in producing it.

The latest invention proposed by the researchers will allow a user's iPod or mobile phone to instantly identify the "fingerprint" of the owner. Thus with the help of anti-theft acoustic fingerprint detectorpeople will have the possibility to use their gadgets without worrying that it could be stolen.

Such technology could be used to pay bills or safely carry out different banking transactions by simply put on a set of headphones or a mobile phone to the ear. According to Arthur Rapos, electronics engineer at Elektra company, this technology could be a step towards creating microchips with biological information that could be implanted in humans.

"The sound the inside of our ear makes is not the only unique thing about an individual. Think of a tree where no two leaves are the same," said Mr Rapos.

ONION ROUTING

Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.

Onion routing was developed by Michael G. Reed, Paul F. Syverson, and David M. Goldschlag, and patented by the United States Navy in US Patent No. 6266704 (1998). As of 2009,Tor is the predominant technology that employs onion routing

Sunday, September 5, 2010

Two years on, Chrome reshapes browser market

It's been two years since the first public version of Chrome appeared, but in some ways, Google's browser remains a novelty.

On Thursday, Google released the sixth stable version of Chrome (Windows | Mac | Linux), though only the second for Mac OS and Linux users.

In others' hands, it would be called Chrome 6, but Google sees things differently.

To the company, a version number is a passing milestone on an indefinitely long road to improvement. By default, the browser is updated behind the scenes and automatically, downloading new versions and installing them after a browser restart. It sees the practice as similar to how Web applications are updated constantly, usually without the user being involved and often without even being told.

This update philosophy is one of several differences that has set Chrome apart since Google inadvertently scooped its own announcement by prematurely issuing comic books describing Chrome just before its launch.

Google has attracted millions of allies. It's grown steadily to account for 7.5 percent of global browser usage, according to Net Applications' most recent statistics.

Besides numberless versions, another departure from prevailing custom was Google's idea that the browser should be as minimal a frame as possible around the content or application it's delivering. Chrome's minimal menu buttons--shrunk from two to one by the new version--its top-mounted tabs, and its lack of real estate for a status bar or search box reflect that philosophy. Programmers working on Mozilla's Firefox 4 and Microsoft's Internet Explorer 9, the new versions of the world's most-used browsers, have adopted similar goals.

Another departure was Chrome's focus on performance in processing Web-based JavaScript programs, loading pages, and other matters. Performance was important to other browsers, but Chrome's initial near-instant launch and notable JavaScript speed that concept at the top of every browser's agenda and raised Web developers' expectations of what they could tackle.

Chrome also led the way with a new approach to extensions. Those who write the add-ons use a combination of Web technologies including JavaScript, HTML, and CSS for formatting--the same as in Firefox's upcoming Jetpack framework under development now and just introduced to Apple's Safari 5. The technology is designed to be easier to program as well as less disruptive for users to install or update.

Under the covers, Google broke with custom by isolating browser processes into separate memory compartments, too. That consumed more memory but added security and performance. And from a development perspective, Google aims for high velocity: a new "Canary" version changes even faster than the Chrome developer release, and Google plans to update the stable version of Chrome about every six weeks.

Finally, Google had an ambition to be different by transforming the browser into a full-fledged operating system called Chrome OS. Competitors agree that browsers should become a foundation for applications, but not quite to Chrome OS's extent. Google plans to release Chrome OS, which hides Linux under the covers for purposes of communicating with hardware, later this year for Netbooks, but it expects broader usage eventually.

Even without Chrome OS, Google's browser embodies the company's philosophy that the Web is the applications foundation of the future. That's because Google is building in not just faster JavaScript but also other potentially more powerful computing technology.

IE remains the dominant browser, but its share has slipped in the last year as Chrome rose.

IE remains the dominant browser, but its share has slipped in the last year as Chrome rose.

(Credit: Net Applications / Stephen Shankland/CNET)

First is WebGL, a 3D graphics interface that mirrors the OpenGL standard for accelerated hardware graphics. Second is Native Client, which Google hopes will let downloaded code run natively and therefore fast on a PC or smartphone processor. It's got safety mechanisms built in to counteract the risks associated with running arbitrary software downloaded over the Net, and Google has made progress convincing at least some that it's safe to use.

To those who were baffled by Google's announcement of a browser two years ago, this type of work perhaps shows best the advantage Google gets out of Chrome. By largely controlling the development, Google can develop new technology and build it into a widely used if not dominant browser for testing and promotion. It also gives Google new clout in shaping new Web standards.

Google, of course, also has servers at the other end of the browser's Net connection. That lets the two work harmoniously. For example, Google is trying to develop a technology called SPDY that seeks to speed up the basic protocol used to request and send Web pages. It requires browsers and servers to cooperate, and Google's got both under its control. It's trying to standardize SPDY, but in the meantime Chrome can give a fast track to Google services.

When Chrome launched, it was a bare-bones browser missing all kinds of basic and advanced features other browsers possessed--anything to do with bookmark management, for example. Google has fleshed that out, though some relatively basic features such as print preview are still absent. At the same time, Google has added some useful basic features still missing in rival browsers.

One is tab-to-search, which lets keyboard-oriented folk quickly launch site-specific searches at Amazon, Google, Yahoo, Bing, Wikipedia, CNET, and other sites by typing the site address, then tab, then the search term. Another is automatic translation using Google's multilanguage services.

Google has several challenges. One big one is convincing skeptics that Google, with its ever-wider sprawl of services on the Net, is a safe place for personal data. Chrome's address box, called the omnibox, sends data as it's typed to Google servers that suggest search results straight from the box. That's convenient but raises some hackles.