Feeds

Google drops cash on virtual currency firm Jambool

Yet another wink at Web2.0 wench

Top three mobile application threats

Google has bought a virtual currency software firm as part of its latest effort to build a Web 2.0 empire by scooping up social networking outfits.

Jambool confirmed on Friday that it had joined “the Google family”. However, financial terms of the deal were kept quiet.

The company started life as a social collaboration platform in 2006. A year later it began building applications on social networks that allowed the firm to punt virtual currency and goods to any brave soul willing to part with cash online.

“Social Gold has grown by leaps and bounds since it went live in 2008. In the first half of 2010, we've processed more than double the entire payment volume we processed in all of 2009,” said Jambool.

“When the opportunity arose to join forces with Google… we couldn't pass it up. We are thrilled to bring the Social Gold platform to Google's global users.”

Last week Google bought social network tech outfit Slide for an undisclosed sum in its latest effort to tackle Facebook’s Web 2.0 dominance.

That buy came just 48 hours after Google killed its Wave tool, which made a splash landing in May 2009. But within a year of its birth, the email-IM-and-everything-else-Web-2.0-splatter-gun platform had proved itself to be an unpopular product that no one wanted to play with.

Google’s latest efforts to bolt on social network startups to its portfolio simply represent the company’s latest desire to out-Facebook Facebook. But it’s failed so far to come anywhere near unseating boydroid Mark Zuckerberg and his crew. ®

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.