Feeds

Google Wave invites stack up - who's still playing?

Not waving, but...

A new approach to endpoint data protection

Comment Now that the hype about Google’s minimalist and actually quite fragile real-time collaboration tool has died down, the ad broker is readying common task extensions that might make it a little easier to fiddle with.

Google Wave is, of course, currently at an unstable, preview stage. But that didn't stop hordes of people last year trampolining on Twitter and elsewhere in the hope of getting that golden ticket invite to taste the Mountain View Chocolate Factory's latest gobstopper.

The company did a great job of hyping its tool even before many in the developer community could consider taking a permissions-lite Wave seriously. But that hippie, new age bullshit thing is, according to Google, an important feature of the email-IM-and-everything-else-Web-2.0-splatter-gun platform.

But not everyone gets it.

"What's the point of Google Wave? We all scrambled to play with it and now that I have my own account, lots of invites for me to send out to others are just hanging around collecting dust," noted one Reg reader late last week.

It's a reasonable question. After all, Google had the nerve to spin out a half-baked product as a preview for people to play with in the hope of creating lots of buzz about the firm's ad-funded technology. Unsurprisingly, this being Google, the gamble paid off - the company scored tons of ink from newspapers excited about the possibilities of Google Wave.

Since then the firm's wonks have been working on extension ideas for the tool, and reminding anyone that might want to listen that the likes of Novell and Salesforce.com have also been happily toying with it. But alas, Google Wave isn't even close to being ready yet for the average user, who might want to bring all his or her various methods of web messaging under one roof.

Meanwhile, Google will make hay while the sun shines, especially as anyone who wants to activate their Google Wave invite will need to do so with a Google account.

Surely, Mountain View isn't simply shepherding everyone into Gmail by pointing at this clever, real-time, "if email had been invented now" tool that isn't even ready yet, is it? ®

7 Elements of Radically Simple OS Migration

More from The Register

next story
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cloudy CoreOS Linux distro declares itself production-ready
Lightweight, container-happy Linux gets first Stable release
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?