Feeds

Google Wave relies on kindness of strangers

Copy our cloud, please

Secure remote control for conventional and virtual desktops

Dreamforce 09 Google has been stumping for its Wave real-time collaboration system among the Salesforce.com faithful.

Wave lead business development manager Jeff Eddies told Dreamforce the search behemoth needs their support for Wave to succeed.

Unveiled in May, Wave is still in an embryonic state. Google's manager told Salesforce.com developers and users Thursday that it needs lots of people either running Google Wave, building their own versions of Wave using the 40,000 lines of code Google has open-sourced, or interoperating between the Google Wave and their own Waves.

By way of incentive, Google said it plans to deliver a stable set of specification and a reference implementation of the Wave client and server code and the all-important Federation Protocol, open-source the "lions' share" of the client and server code, and ship an open port of the federation protocol. There were no dates.

Dreamforce attendees were also directed to the Google Wave Federation Protocol web site to participate in building the specification to help get Wave finished.

"What we would really love to do, for it [Wave] to really succeed, is to have to have lots of people running Google Wave, or have things that look like Google Wave or interoperate between the two systems," the business development manger told Dreamforce.

"We are also thinking very hard about companies that might want to do that in a very secure way. It's one thing to say: 'We are all open, let's collaborate,' but it makes CIO's very nervous. Hopefully we've got a way to get around that."

Salesforce.com technology architect Quinton Wall used the event to demonstrate building a Wave robot to talk to the Salesoforce.com platform. Robots are a part of the Google Wave API that automate common tasks, such as spelling correction or translations. Gadgets are the other part of the API and are embedded in web pages and can be shared. Robots can access Gadgets.

Salesforce.com is a big Google partner and fellow cloud evangelist. On the more traditional business-user front, Novell has so-far stepped up with Pulse, its implementation of Wave with features added for the use by the enterprise. SAP, meanwhile, has built a prototype plug-in to Wave called Gravity to work with the enterprise giant's business process modeling functionality. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.