Feeds

Only in a bubble is Google's web WP an Office-killer

'Lightweight, high-velocity and very connected'

Build a business case: developing custom apps

Webbing obscures view

Joe also predicts that Microsoft will never offer a hosted version of Microsoft Office, which is how Office Live is erroneously described, so often.

Citrix, which pioneered multi-user NT, is now offering a consumer hosting service of what it does best, in the shape of GoToMyPC, which is aimed at large enterprises as well as its primary market, SMBs. If we're using hosted services in five years' time, it'll be this, or something very much like it - with a full feature set, native clients at each end, and an internet connection between them.

Of course the last people to be wise to the deficiences of web software are the web evangelists themselves. It hasn't escaped anyone else's notice that even the simplest push technology (RSS) - the most rudimentary format of all - comes in a dozen incompatible formats.

This isn't to say Google doesn't want to host your documents. And make them searchable - and ad-ready. It does. A fortnight ago Google attempted to use its Google Desktop Search software to upload the contents of your LAN to Google servers. A built-in option uploaded a text version of your files where it would be held for 30 days.

And last week a note mistakenly made public illustrated Google's intentions all too clearly - "Store 100% of User Data ... With infinite storage, we can house all user files, including: emails, web history, pictures, bookmarks, etc and make it accessible from anywhere (any device, any platform, etc)".

Cheerleaders for Silicon Valley insist that today's web bubble isn't really a bubble because it's failed to persuade the public at large to part with their money in exchange for junk stocks. But that's only one definition of a bubble. A bubble is when people leave behind rational considerations, and enthusiastically make poor judgements which leave lasting consequences.

Given the inherent properties of the technology set - the network latencies, the angle-bracket incompatibilities, and the downtime, to name just three - the "web-based office" today is as practical a proposition as the Segway-based lifebelt.

Technically illiterate, and pumped up on junk science and pious New Age aphorisms - such s "collective intelligence" - today's "Web 2.0" kids promise to leave behind a legacy of disappointment.

Some bubbles exist entirely between the ears. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.