Feeds

Apache open sourcers welcome Google's unwanted Wave

Mountain View orphan finds home

High performance access to file storage

Google's "clever" but misunderstood Wave is getting a fresh shot at life with open-sourcers at the Apache Software Foundation (ASF).

The Mountain View Chocolate Factory, Novell, and a handful of others have submitted client and server code to ASF for what's now called Wave in a Box (WIAB).

The code is available as an incubator project, a phase ASF projects pass through before becoming full-fledged projects. Apache uses the incubator phase to evaluate legal requirements of the code and help establish the project as a functioning community.

Those submitting WIAB said their immediate goals are to migrate the Wave code base off its current home on code.google.com and integrate it with Apache's management and build systems, to "quickly" reach a position where it's possible to continue development of WIAB, and to also add new committers to the project. The code.google.com site was due to be turned off by Google at the end of the year.

According to the submission document: "We anticipate early future committers coming from places like Novell, SAP, companies related to the US Navy's usage of wave, startups in the wave ecosystem, and many independent individuals."

Wave was killed off by Google in August citing a lack of interest, having only been unveiled by the ads and search giant in May 2009. Announcing Wave just the year before, Google had urged Wave was an "unbelievable" demonstration of what's possible in the browser.

The idea was Wave combined email, IM, and document-sharing in a threaded conversation model shared between users while also letting you drop in media like photos, videos and maps. These threads - called "waves" - could be embedded into blogs, wikis, and other webpages.

Wave didn't wash outside a few early adopters like Novel, SAP, and, er, the US Navy, and it looks like Google's still having trouble conveying exactly what Wave is and what it does. According to the Apache submission document, WIAB is a server that hosts waves. "The best analogy for this is a mail server with a web client," the document says.

Still struggling? You can read more here. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.